CN106778294A - Information protecting method and device - Google Patents
Information protecting method and device Download PDFInfo
- Publication number
- CN106778294A CN106778294A CN201611064352.9A CN201611064352A CN106778294A CN 106778294 A CN106778294 A CN 106778294A CN 201611064352 A CN201611064352 A CN 201611064352A CN 106778294 A CN106778294 A CN 106778294A
- Authority
- CN
- China
- Prior art keywords
- information
- matrix
- finger print
- encryption
- secret key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of information protecting method and device, the method includes:When the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into coding information, coding information is converted into document matrix information according to default first matrix conversion condition, and determine document matrix number in document matrix information;The current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;According to MD5 value scramble fingerprint matrices, the scrambled matrix information that generation scrambled matrix number is matched with document matrix number;According to scrambled matrix information and document matrix information generation secret key, and it is encrypted according to secret key pair confidential information to be added, encryption information is obtained, by encryption information storage in the encryption information set associated with finger print information.Finger print information the invention allows to be based on user is directly treated encryption information and is encrypted, so as to realize conveniently protecting the confidential information to be added stored in mobile terminal.
Description
Technical field
The present invention relates to data encryption technology field, more particularly to a kind of information protecting method and device.
Background technology
At present, in order to protect the privacy information stored in the mobile terminals such as mobile phone, panel computer, user can be by the 3rd
Square encryption software is encrypted to the privacy information of the mobile terminal, but encryption and decryption step complexity are cumbersome, behaviour
Make extremely inconvenient.
The content of the invention
It is a primary object of the present invention to propose a kind of information protecting method and device, it is intended to which realization is conveniently protected
The privacy information stored in mobile terminal.
To achieve the above object, a kind of information protection device that the present invention is provided, the information protection device includes:
First modular converter, for when the first encrypted instruction for treating encryption information triggering is detected, by secret letter to be added
Breath is converted into coding information, and coding information is converted into document matrix information according to default first matrix conversion condition, and really
Determine document matrix number in document matrix information;
First computing module, for parsing the current finger print information for collecting, generates fingerprint matrices, and calculate fingerprint matrices
MD5 values;
First generation module, for according to MD5 value scramble fingerprint matrices, generation scrambled matrix number and document matrix number
The scrambled matrix information of matching;
Encrypting module, for generating secret key according to scrambled matrix information and document matrix information, and treats according to secret key
Encryption information is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information.
Alternatively, the encrypting module includes:
First generation unit, for according to scrambled matrix information and document matrix information generation security coding information;
Second generation unit, for generating secret key according to security coding information, wherein, the generation of the security coding information
Formula is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described
PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, described information protection device also includes:
Display module, for when the first decryption instructions are detected, the finger print information of the current collection of identification to show and fingerprint
The encryption information set of information association;
Parsing module, for detecting the second decryption instructions triggered based on the encryption information in encryption information set
When, the secret key associated with encryption information stored in mobile terminal is obtained, and parse secret key and obtain corresponding security coding information;
Second modular converter, for security coding information to be converted into secret key square according to default second matrix conversion condition
Battle array information, and determine cipher key matrix number in secret key matrix information;
3rd computing module, for parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
Second generation module, for the fingerprint matrices according to MD5 value scrambles, generates scrambled matrix number and cipher key matrix
The scrambled matrix information of number matching;
Deciphering module, for according to scrambled matrix information and secret key matrix information generation coding information, believing with to encryption
Breath is decrypted.
Alternatively, the generation formula of the coding information is:
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiFor close
I-th secret key matrix in spoon matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, described information protection device also includes:
Output module, for when fingerprint preservation instruction is detected, calculating the first discrimination of the finger print information of collection, and
Output is input into the prompt message of previous finger print information again;
4th computing module, for when previous finger print information input instruction is detected, gathering the previous finger being input into again
Line information, and calculate the second discrimination of the previous finger print information being input into again;
Judge module, for judging the first discrimination and the second discrimination whether more than default discrimination;
Preserving module, for when the first discrimination and the second discrimination are more than the default discrimination, preserving the finger
Line information.
Additionally, to achieve the above object, the present invention also proposes a kind of information protecting method, and the information protecting method includes:
When the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into coding information,
Coding information is converted into document matrix information according to default first matrix conversion condition, and determines document matrix information Chinese
Part matrix number;
The current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
According to MD5 value scramble fingerprint matrices, the scrambled matrix letter that generation scrambled matrix number is matched with document matrix number
Breath;
According to scrambled matrix information and document matrix information generation secret key, and added according to secret key pair confidential information to be added
It is close, encryption information is obtained, by encryption information storage in the encryption information set associated with finger print information.
Alternatively, it is described to be included according to the step of scrambled matrix information and document matrix information generation secret key:
According to scrambled matrix information and document matrix information generation security coding information;
Secret key is generated according to security coding information, wherein, the generation formula of the security coding information is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described
PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, it is described that secret key is generated according to scrambled matrix information and document matrix information and to be added according to secret key pair
Confidential information is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information
Also include after step:
When the first decryption instructions are detected, the finger print information of the current collection of identification, what display was associated with finger print information adds
Confidential information set;
When the second decryption instructions triggered based on the encryption information in encryption information set are detected, obtain it is mobile eventually
The secret key associated with encryption information stored in end, and parse secret key and obtain corresponding security coding information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, and determines secret key
Cipher key matrix number in matrix information;
Parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
The fingerprint matrices according to MD5 value scrambles, the encryption square that generation scrambled matrix number is matched with cipher key matrix number
Battle array information;
According to scrambled matrix information and secret key matrix information generation coding information, it is decrypted with to encryption information.
Alternatively, the generation formula of the coding information is:
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiFor close
I-th secret key matrix in spoon matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, it is described detect treat encryption information triggering the first encrypted instruction when, confidential information to be added is converted into
Coding information, is converted into document matrix information, and determine file square by coding information according to default first matrix conversion condition
Battle array information in document matrix number the step of before also include:
When fingerprint preservation instruction is detected, the first discrimination of the finger print information of collection is calculated, and output is input into again
The prompt message of previous finger print information;
When previous finger print information input instruction is detected, the previous finger print information that collection is input into again, and calculate again
Second discrimination of the previous finger print information of input;
Judge the first discrimination and the second discrimination whether more than default discrimination;
When the first discrimination and the second discrimination are more than the default discrimination, the finger print information is preserved.
The present invention by when mobile terminal receives user and treats the first encrypted instruction that encryption information is triggered, according to treating
Encryption information generation document matrix information, and the finger print information of user is gathered, scrambled matrix information is generated according to finger print information, and
Document matrix information is generated according to confidential information to be added, according to scrambled matrix information and document matrix information generation secret key, and root
It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and by encryption information storage in adding for being associated with finger print information
In confidential information set, enabling the finger print information based on user is directly treated encryption information and is encrypted, so as to realize conveniently
The confidential information to be added for efficiently being stored in protection mobile terminal.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing the optional mobile terminal of each embodiment one of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the high-level schematic functional block diagram of the first embodiment of information protection device of the present invention;
Fig. 4 be information protection device of the present invention second embodiment in encrypting module refinement high-level schematic functional block diagram;
Fig. 5 is the high-level schematic functional block diagram of the 3rd embodiment of information protection device of the present invention;
Fig. 6 is the high-level schematic functional block diagram of the fourth embodiment of information protection device of the present invention;
Fig. 7 is the schematic flow sheet of the first embodiment of information protecting method of the present invention;
Fig. 8 is according to the thin of scrambled matrix information and document matrix information generation secret key in information protecting method of the present invention
Change the schematic flow sheet of step;
Fig. 9 is the schematic flow sheet of the second embodiment of information protecting method of the present invention;
Figure 10 is the schematic flow sheet of the 3rd embodiment of information protecting method of the present invention;
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use
For represent element such as " module ", " part " or " unit " suffix only for being conducive to explanation of the invention, itself
Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement
Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration for realizing one optional mobile terminal of each embodiment of the invention is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180, power subsystem 190,
First modular converter 10, the first computing module 20, the first generation module 30 and encrypting module 40 etc..Fig. 1 is shown with each
The mobile terminal of component is planted, it should be understood that being not required for implementing all components for showing.Can alternatively implement more
Or less component.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system
Or the radio communication between network.For example, wireless communication unit 110 can include broadcasting reception module 111, mobile communication mould
At least one of block 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB)
The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast
Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111
Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video
Broadcast-hand-held (DVB-H), forward link media (MediaFLO@) Radio Data System, received terrestrial digital broadcasting integrated service
Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice
Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
ToothTM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybeeTMEtc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module
Typical case be GPS (global positioning system).According to current technology, GPS module is calculated from three or more satellites
Range information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude and
Highly accurately calculate three-dimensional current location information.Currently, three satellites are used for calculating the method for position and temporal information
And the position calculated by using other satellite correction and the error of temporal information.Additionally, GPS module can lead to
Carry out calculating speed information after Continuous plus current location information in real time.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121
Microphone 122, the static images that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus
Or the view data of video is processed.Picture frame after treatment may be displayed on display unit 151.Processed through camera 121
Picture frame afterwards can be stored in memory 160 (or other storage mediums) or sent out via wireless communication unit 110
Send, two or more cameras 1210 can be provided according to the construction of mobile terminal.Microphone 122 can telephone calling model,
Sound (voice data) is received via microphone in logging mode, speech recognition mode etc. operational mode, and can be by this
The acoustic processing of sample is voice data.Audio (voice) data after treatment can be converted in the case of telephone calling model
The form that mobile communication base station can be sent to via mobile communication module 112 is exported.Microphone 122 can be implemented various types of
Noise eliminate (or suppress) algorithm eliminating (or suppression) in the noise for receiving and producing during sending audio signal or
Interference.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input
Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch
Plate (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape
State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal
The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed
The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know
Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from
The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00
One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity
Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it
It is transferred to the path of mobile terminal.Be can serve as recognizing that mobile terminal is from the various command signals or electric power of base input
The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio and/or tactile manner
Go out signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include display
Unit 151, dio Output Modules 152 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit
151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving
Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect touch
Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal reception pattern, call mode, logging mode,
It is that wireless communication unit 110 is received or in memory 160 when under the isotypes such as speech recognition mode, broadcast reception mode
The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement
The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is performed.
Dio Output Modules 152 can include loudspeaker, buzzer etc..
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke
Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And
And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal
Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many
Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection
The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data
Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers
The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or can be structured as and control
Device 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein
At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180.
For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation
Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language
Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 1 00 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any
Line and wireless communication system and satellite-based communication system are operated.
The communication system that mobile terminal wherein of the invention can be operated is described referring now to Fig. 2.
Such communication system can use different air interface and/or physical layer.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base station (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link.
If any one in the interface that back haul link can be known according to Ganji is constructed, the interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system can include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction
Each subregion of line covering is radially away from BS270.Or, each subregion can be by two or more for diversity reception
Antenna is covered.Each BS270 may be constructed such that the multiple frequency distribution of support, and the distribution of each frequency has specific frequency spectrum
(for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersects can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver
System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single
BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed
It is multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system
100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT295
Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals
At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful
Location information.Location information module 115 as shown in Figure 1 is generally configured to coordinate desired to obtain with satellite 300
Location information, the typical case of the location information module 115 is GPS.Substitute GPS tracking techniques or GPS tracking techniques it
Outward, it is possible to use other technologies of the position of mobile terminal can be tracked.In addition, at least one gps satellite 300 can be selective
Ground or the extraly transmission for the treatment of satellite dmb.
Used as a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminal 1s 00
Signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of the reception of certain base station 270 is anti-
Processed in specific BS270 to link signal.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides call
Resource allocation and the mobile management function of the coordination including the soft switching process between BS270.The number that BSC275 will also be received
According to MSC280 is routed to, it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with
MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 correspondingly controls BS270 with by forward link signals
It is sent to mobile terminal 1 00.
Based on the hardware configuration of above-mentioned mobile terminal 1 00 and communication system, the present invention provides a kind of information protection device.
Reference picture 3, Fig. 3 is the high-level schematic functional block diagram of the first embodiment of information protection device of the present invention.
In the present embodiment, described information protection device includes:First modular converter 10, the first computing module 20, first
Generation module 30 and encrypting module 40.
First modular converter 10, for when the first encrypted instruction for treating encryption information triggering is detected, will treat
Encryption information is converted into coding information, and coding information is converted into document matrix according to default first matrix conversion condition believes
Breath, and determine document matrix number in document matrix information;
In the present embodiment, user is wanted when to this, certain information to be encrypted is encrypted, and the sustainable pressing of user should
To be encrypted information 5-10 seconds, triggers the first encrypted instruction.When the first modular converter 10 receives user to this in mobile terminal
During the first encrypted instruction of encryption information triggering, the finger print information of user is gathered, and confidential information to be added is converted into coding information,
The confidential information to be added is read with binary system, binary sequence B, such as binary sequence B " 10010111 ", the i.e. coding letter is obtained
Breath can be understood as binary sequence B, and coding information is converted into document matrix according to default first matrix conversion condition believes
Breath, will binary sequence B insert the binary matrix Part of n 64 × 64bit line by line respectively in units of 4096bit1~
PartnIn, obtain document matrix informationThe size of n determines by the actual size of file to be encrypted, for example,
File is 128.3KB, because the size of data of each circular treatment is 4096bit, 128KB files can be at 256 times before institute
Processed in circulation, and remaining 0.3KB also needs to a circulation and is processed, therefore, n=256+1=257.
First computing module 20, for parsing the current finger print information for collecting, generates fingerprint matrices, and calculating refers to
The MD5 values of line matrix;
First computing module 20 parses the current finger print information for collecting, and generates fingerprint matrices, and calculate fingerprint matrices
MD5 values, for example, when the finger print information is collected, the finger print information of user are read by fingerprint reader, produce one 64 ×
The binary matrix Z of 64bit, calculates the MD5 values of Z, such as MD5 values " 1234 ".
First generation module 30, for according to MD5 value scramble fingerprint matrices, generation scrambled matrix number and file square
The scrambled matrix information of battle array number matching;
The encrypting module 40, for generating secret key according to scrambled matrix information and document matrix information, and according to close
Spoon is treated encryption information and is encrypted, and obtains encryption information, by encryption information storage in the encryption information associated with finger print information
In set.
When the MD5 values of fingerprint matrices are calculated, the MD5 disorder methods of fingerprint matrices of the first generation module 30 are by fingerprint
Matrix scrambling, and the scrambled matrix information matched with document matrix number by chain algorithm conversion generation scrambled matrix number, such as
The scrambled matrix information of generation includes K1~KnN scrambled matrix altogether.Encrypting module 40 is according to scrambled matrix information and text
Part matrix information generates secret key Key, and is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption is believed
Breath storage is in the encryption information set associated with finger print information.
It should be noted that mobile terminal can create different encryption information set, the encryption to different finger print informations
Comprising all encryption information created based on the finger print information in information aggregate, for example, mobile terminal is created to finger print information A adding
Confidential information set A, comprising all encryption information created based on finger print information A in encryption information set A, is created to finger print information B
Encryption information set B is built, is believed comprising all encryption information created based on finger print information B, and the encryption in encryption information set B
Breath set is hiding, and the encryption information that the encryption information set is included is stored classifiedly, can be according to the category of encryption information
Property classification or classified according to the encryption times of encryption information, for example, by attribute for the encryption information of picture is stored in text
In part folder A, and by attribute for the encryption information of application program is stored in file B.
The present embodiment by mobile terminal receive user treat encryption information trigger the first encrypted instruction when, according to
Confidential information generation document matrix information to be added, and the finger print information of user is gathered, scrambled matrix information is generated according to finger print information,
And document matrix information is generated according to confidential information to be added, according to scrambled matrix information and document matrix information generation secret key, and
It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption information storage is being associated with finger print information
In encryption information set, enabling the finger print information based on user is directly treated encryption information and is encrypted, so that the side of realization
Just the confidential information to be added for efficiently being stored in protection mobile terminal.
Further, based on above-mentioned first embodiment, the second embodiment of information protection device of the present invention is proposed, in this reality
Apply in example, reference picture 4, the encrypting module 40 includes:First generation unit 41, the second generation unit 42.
First generation unit 41, for according to scrambled matrix information and document matrix information generation security coding letter
Breath;
Second generation unit 42, for generating secret key according to security coding information, wherein, the security coding information
Generation formula be:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described
PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
First generation unit 41 generates security coding information Key' according to scrambled matrix information and document matrix information D,
Second generation unit 42 adds BMP, the original document suffix of confidential information to be added on the file header of security coding information Key'
The original document length of name and confidential information to be added, that is, the secret key Key for being needed so that realize according to scrambled matrix information and
Document matrix information generation secret key Key.
The present embodiment generates security coding information by according to scrambled matrix information and document matrix information, according to secret key
Coding information generates secret key so that treat the encrypting step simple and fast of encryption information, improves Consumer's Experience.
Further, based on above-mentioned first embodiment, the 3rd embodiment of information protection device of the present invention is proposed, in this reality
Apply in example, reference picture 5, described information protection device also includes:Display module 50, parsing module 60, the second modular converter 70,
Three computing modules 80, the second generation module 90 and deciphering module 100.
The display module 50, for when the first decryption instructions are detected, the finger print information of the current collection of identification to show
The encryption information set associated with finger print information;
In the present embodiment, when first class paper information corresponding by the encryption information with the head of a household, triggering first is decrypted
Instruction, the first class paper information can be understood as the general act information corresponding to the encryption information, for example, working as the encryption information
During for pictorial information, the first class paper information of the pictorial information is photograph album (or mutually thin), after user opens the photograph album, and
During the project column of family Continued depression photograph album 5-10 seconds, the first decryption instructions are triggered;When the encryption information is application program, should
The first class paper information of application program is desktop, and when user's Continued depression desktop blank space 5-10 second, triggering first was decrypted and referred to
Order.When mobile terminal receives the first decryption instructions of user's triggering, display module 50 gathers the finger print information of user.Display
The encryption information set associated with the finger print information, the encryption information set can be understood as below the first class paper information
Second level fileinfo, one or more encryption information is included in the second level fileinfo, for example, when first order text
Part information is photograph album, and the second level fileinfo is the fileinfo being hidden in the photograph album, in the fileinfo being hidden
Comprising one or more encryption picture, such as after user opens the photograph album, and the family Continued depression photograph album project column 5-10
During the second, the multiple encryption pictures being hidden in the photograph album are shown;When first fileinfo is desktop, the second level fileinfo
Be comprising one or more encryption application program in the fileinfo being hidden on the desktop, the fileinfo being hidden,
Such as user's Continued depression desktop blank space 5-10 seconds, shows the multiple encryption application programs being hidden on the desktop.
If it is understood that in the mobile terminal, what the encryption information was associated is the finger print information of user's forefinger, then
The mobile terminal only detect user input be the finger print information of forefinger when, place can be just decrypted to the encryption information
Reason.Different finger print informations associates different encryption information set, for example, the finger print information of different user associates different encryptions
Information aggregate, and the different finger print informations of same user associate different encryption information set.
The parsing module 60, for detecting the second solution triggered based on the encryption information in encryption information set
During close instruction, the secret key associated with encryption information of storage in mobile terminal is obtained, and parse secret key and obtain corresponding secret key volume
Code information;
When mobile terminal shows the encryption information set associated with the finger print information, the user can be from the encryption information collection
The encryption information that decryption is wanted in selection is closed, when user's Continued depression encryption information 5-10 second, the second decryption instructions of triggering.
When detecting the second decryption instructions triggered based on the encryption information in encryption information set, parsing module 60 obtains the movement
The secret key Key associated with the encryption information prestored in terminal, and remove BMP of secret key Key, log file suffix name and text
After the file header of part size, the corresponding security coding information of secret key Key is obtained.
Second modular converter 70, for security coding information to be converted into according to default second matrix conversion condition
Secret key matrix information, and determine cipher key matrix number in secret key matrix information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, for example, second
Security coding information is filled into modular converter 70 the n binary system of 64 × 64bit respectively in units of the data volume of 4096bit
Matrix K ey1~Keyn, binary matrix Key1~KeynComposition secret key matrix information, the size of the n is by security coding information
Actual size determine.For example, the file size recorded in security coding information is 128.3KB, and preceding 128KB security codings are believed
Breath has been processed in being circulated at 256 times, and remaining 0.3KB also needs to a circulation and processed, so, n=256+1=
257。
3rd computing module 80, for parsing finger print information, generates fingerprint matrices, and calculate the MD5 of fingerprint matrices
Value;
Second generation module 90, for the fingerprint matrices according to MD5 value scrambles, generation scrambled matrix number with it is close
The scrambled matrix information of key matrix number matching;
3rd computing module 80 parses finger print information, generation fingerprint matrices, and calculates the MD5 values of fingerprint matrices, for example,
When collecting the finger print information, the finger print information of user is read by fingerprint reader, produce a binary system square of 64 × 64bit
Battle array Z, calculates the MD5 values of Z, and MD5 values are the character string of 128.When the MD5 values of fingerprint matrices are calculated, the second generation module
90 with the MD5 disorder methods of fingerprint matrices by fingerprint matrices scramble, and by chain algorithm conversion generation scrambled matrix number with it is close
The scrambled matrix information of key matrix number matching, the scrambled matrix information of such as generation includes K1~KnN scrambled matrix altogether.
The deciphering module 100, for according to scrambled matrix information and secret key matrix information generation coding information, with right
Encryption information is decrypted.
Deciphering module 100 generates coding information according to the scrambled matrix information and the secret key matrix information, with to encryption
Information is decrypted.I.e. according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the encryption information
Coding information, i.e., according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the encryption information
Binary sequence B, the generation formula of the coding information is as follows:
Wherein, the KeyiIt is i-th secret key matrix, the K in the secret key matrix information1It is i-th encryption in the scrambled matrix
Matrix, the i=1,2,3 ... n, n is positive integer.
When coding information (the binary sequence B) is obtained, the coding information (binary sequence B) is write into movement end
The disk at end, you can obtain original document, so as to realize being decrypted the encryption information.
The present embodiment is by the way that when mobile terminal receives the first decryption instructions that user triggers, the fingerprint for gathering user is believed
Breath, the encryption information set that display is associated with finger print information, when mobile terminal receives the second decryption instructions of user's triggering,
The encryption information in encryption information set is decrypted according to finger print information, enabling the finger print information based on user is direct
The encryption information stored in decrypting mobile terminal, so that decrypting process is convenient and swift, safe and reliable.
Further, based on above-mentioned first embodiment, the fourth embodiment of information protection device of the present invention is proposed, in this reality
Apply in example, reference picture 6, described information protection device also includes:Output module 200, the 4th computing module 300, judge module 400
And preserving module 500.
The output module 200, for when fingerprint preservation instruction is detected, calculating the first knowledge of the finger print information of collection
Not other rate, and export the prompt message for being input into previous finger print information again;
4th computing module 300, for when previous finger print information input instruction is detected, gathering what is be input into again
Previous finger print information, and calculate the second discrimination of the previous finger print information being input into again;
The judge module 400, for judging the first discrimination and the second discrimination whether more than default discrimination;
The preserving module 500, for when the first discrimination and the second discrimination are more than the default discrimination, preserving
The finger print information.
In the present embodiment, firstly, it is necessary to carry out the fingerprint collecting of user.Fingerprint capturer is arranged at and is easy to contact user
At the position of finger print information, such as Home key, mobile phone back, mobile phone frame position, mainly for gathering the fingerprint letter of contact person
Breath.User is finger print or the collection that fingerprint is carried out by way of long of rubbing.Because mobile terminal is to each hand of user
Refer to that the discrimination of fingerprint is different, in order to improve the accuracy of fingerprint recognition, the fingerprint of multiple fingers can be gathered, pick out identification
The fingerprint of rate highest finger, for subsequent calls., it is necessary to the identification for carrying out user fingerprints is distinguished after user fingerprints have been gathered
Recognize.Output module 200 can show the finger print information of correlation after fingerprint has been gathered, and calculate the first discrimination of finger print information,
Now, the 4th computing module 300 exports the prompt message for being input into previous finger print information again, and user can select corresponding fingerprint
Information is recognized.During user is recognized, the second discrimination of the finger print information that calculating is input into again,
Judge module 400 judges that whether the first discrimination and being more than for the second discrimination preset discrimination, when the first discrimination and second
Discrimination more than default discrimination when, preserving module 500 preserve the finger print information.User for acquiring multiple fingerprints can
To select discrimination highest fingerprint to carry out encryption and decryption.And the fingerprint not high for discrimination, user can re-start fingerprint
Collection.For example, when mobile terminal collects the index fingerprint of user, the first discrimination for calculating the index fingerprint is
80%, now, mobile terminal output is input into the prompt message of index fingerprint again, and index fingerprint is input into again when user is detected
When after information, it is 90% to calculate the second discrimination of the index fingerprint information being input into again, due to first discrimination and
Second discrimination is both greater than default discrimination (if default discrimination is 60%), therefore preserves the index fingerprint information, and right
In discrimination fingerprint not high, user can re-start fingerprint collecting, for example, work as detecting user input index fingerprint information
When afterwards, it is 50% to calculate first discrimination (or second discrimination) of the index fingerprint information of input, due to first knowledge
Rate (or second discrimination) is not less than default discrimination (if default discrimination is 60%), and now, mobile terminal can be pointed out
User is input into index fingerprint information again, or mobile terminal can also point out user to abandon the guarantor to the index fingerprint information
Deposit, and point out user to select to preserve the finger print information of other fingers.
The present embodiment exports the prompting letter of input finger print information again by calculating the first discrimination of finger print information
Breath, when the finger print information input instruction of user's triggering is detected, the finger print information that collection user is input into again, and calculate again
Second discrimination of the finger print information of input, judges that whether the first discrimination and being more than for the second discrimination preset discrimination, when
First discrimination and the second discrimination more than default discrimination when, preserve finger print information, improve the accuracy of fingerprint recognition,
Ensure the Stability and veracity of later stage encryption and decryption.
Present invention further propose that information protecting method each embodiment.
Reference picture 7, Fig. 7 is the schematic flow sheet of the first embodiment of information protecting method of the present invention.
Step S10, when the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into compile
Code information, is converted into document matrix information, and determine document matrix by coding information according to default first matrix conversion condition
Document matrix number in information;
In the present embodiment, user is wanted when to this, certain information to be encrypted is encrypted, and the sustainable pressing of user should
To be encrypted information 5-10 seconds, triggers the first encrypted instruction.When mobile terminal receives user triggers to the encryption information
During one encrypted instruction, gather the finger print information of user, and confidential information to be added be converted into coding information, by the confidential information to be added with
Binary system reads, and obtains binary sequence B, and such as binary sequence B " 10010111 " is that the coding information can be understood as two and enter
Sequence B processed, document matrix information is converted into by coding information according to default first matrix conversion condition, will binary sequence
B inserts the n binary matrix Part of 64 × 64bit line by line respectively in units of 4096bit1~PartnIn, obtain file square
Battle array informationThe size of n is determined by the actual size of file to be encrypted, for example, file is 128.3KB, because
The size of data of each circular treatment is 4096bit, and 128KB files have been processed in being circulated at 256 times before institute, and remaining
0.3KB also need to a circulation and processed, therefore, n=256+1=257.
Step S20, the current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
The current finger print information for collecting of parsing, generates fingerprint matrices, and calculates the MD5 values of fingerprint matrices, for example, adopting
When collecting the finger print information, the finger print information of user is read by fingerprint reader, produce a binary matrix of 64 × 64bit
Z, calculates the MD5 values of Z, and MD5 values are the character string of 128.
Step S30, according to MD5 value scramble fingerprint matrices, what generation scrambled matrix number was matched with document matrix number adds
Close matrix information;
Step S40, according to scrambled matrix information and document matrix information generation secret key, and according to secret key pair secret letter to be added
Breath is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information.
When the MD5 values of fingerprint matrices are calculated, with the MD5 disorder methods of fingerprint matrices by fingerprint matrices scramble, and by
The scrambled matrix information that chain algorithm conversion generation scrambled matrix number is matched with document matrix number, such as scrambled matrix of generation
Information includes K1~KnN scrambled matrix altogether.According to scrambled matrix information and document matrix information generation secret key Key, and
It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption information storage is being associated with finger print information
In encryption information set.
It should be noted that mobile terminal can create different encryption information set, the encryption to different finger print informations
Comprising all encryption information created based on the finger print information in information aggregate, for example, mobile terminal is created to finger print information A adding
Confidential information set A, comprising all encryption information created based on finger print information A in encryption information set A, is created to finger print information B
Encryption information set B is built, is believed comprising all encryption information created based on finger print information B, and the encryption in encryption information set B
Breath set is hiding, and the encryption information that the encryption information set is included is stored classifiedly, can be according to the category of encryption information
Property classification or classified according to the encryption times of encryption information, for example, by attribute for the encryption information of picture is stored in text
In part folder A, and by attribute for the encryption information of application program is stored in file B.
The present embodiment by mobile terminal receive user treat encryption information trigger the first encrypted instruction when, according to
Confidential information generation document matrix information to be added, and the finger print information of user is gathered, scrambled matrix information is generated according to finger print information,
And document matrix information is generated according to confidential information to be added, according to scrambled matrix information and document matrix information generation secret key, and
It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption information storage is being associated with finger print information
In encryption information set, enabling the finger print information based on user is directly treated encryption information and is encrypted, so that the side of realization
Just the confidential information to be added for efficiently being stored in protection mobile terminal.
Further, Fig. 8 is referred to, is the schematic flow sheet of the refinement step of step S40 in first embodiment of the invention,
This includes according to scrambled matrix information and document matrix information generation secret key:
Step S41, according to scrambled matrix information and document matrix information generation security coding information;
Step S42, secret key is generated according to security coding information, wherein, the generation formula of the security coding information is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described
PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
According to scrambled matrix information and document matrix information D generation security coding information Key', in security coding information
Plus BMP, the original document length of the original document suffix name of confidential information to be added and confidential information to be added on the file header of Key',
The secret key Key for being needed, so as to realize according to scrambled matrix information and document matrix information generation secret key Key.
The present embodiment generates security coding information by according to scrambled matrix information and document matrix information, according to secret key
Coding information generates secret key so that treat the encrypting step simple and fast of encryption information, improves Consumer's Experience.
Further, based on above-mentioned first embodiment, Fig. 9 is referred to, is the of information protecting method proposed by the present invention
The schematic flow sheet of two embodiments, in this second embodiment, after S40, the information protecting method includes:
Step S50, when the first decryption instructions are detected, the finger print information of the current collection of identification shows and finger print information
The encryption information set of association;
In the present embodiment, when first class paper information corresponding by the encryption information with the head of a household, triggering first is decrypted
Instruction, the first class paper information can be understood as the general act information corresponding to the encryption information, for example, working as the encryption information
During for pictorial information, the first class paper information of the pictorial information is photograph album (or mutually thin), after user opens the photograph album, and
During the project column of family Continued depression photograph album 5-10 seconds, the first decryption instructions are triggered;When the encryption information is application program, should
The first class paper information of application program is desktop, and when user's Continued depression desktop blank space 5-10 second, triggering first was decrypted and referred to
Order.When mobile terminal receives the first decryption instructions of user's triggering, the finger print information of user is gathered.Display and fingerprint letter
The encryption information set of association is ceased, the encryption information set can be understood as the second level file below the first class paper information
Information, one or more encryption information is included in the second level fileinfo, for example, when the first class paper information is phase
Volume, the second level fileinfo is the fileinfo being hidden in the photograph album, in the fileinfo being hidden comprising one or
The multiple encryption pictures of person, such as after user opens the photograph album, and during project column 5-10 second of the family Continued depression photograph album, show this
The multiple encryption pictures being hidden in photograph album;When first fileinfo is desktop, the second level fileinfo is on the desktop
Comprising one or more encryption application program in the fileinfo being hidden, the fileinfo being hidden, such as user continues
Pressing desktop blank space 5-10 seconds, shows the multiple encryption application programs being hidden on the desktop.
If it is understood that in the mobile terminal, what the encryption information was associated is the finger print information of user's forefinger, then
The mobile terminal only detect user input be the finger print information of forefinger when, place can be just decrypted to the encryption information
Reason.Different finger print informations associates different encryption information set, for example, the finger print information of different user associates different encryptions
Information aggregate, and the different finger print informations of same user associate different encryption information set.
Step S60, when the second decryption instructions triggered based on the encryption information in encryption information set are detected, is obtained
The secret key associated with encryption information stored in mobile terminal is taken, and parses secret key and obtain corresponding security coding information;
When mobile terminal shows the encryption information set associated with the finger print information, the user can be from the encryption information collection
The encryption information that decryption is wanted in selection is closed, when user's Continued depression encryption information 5-10 second, the second decryption instructions of triggering.
When detecting the second decryption instructions triggered based on the encryption information in encryption information set, obtain and prestore in the mobile terminal
The secret key Key associated with the encryption information, and remove BMP of secret key Key, the text of log file suffix name and file size
After part head, the corresponding security coding information of secret key Key is obtained.
Step S70, secret key matrix information is converted into by security coding information according to default second matrix conversion condition, and
Determine cipher key matrix number in secret key matrix information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, for example, will be close
Spoon coding information is filled into the n binary matrix Key of 64 × 64bit respectively in units of the data volume of 4096bit1~Keyn,
Binary matrix Key1~KeynComposition secret key matrix information, the size of the n is determined by the actual size of security coding information.
For example, the file size recorded in security coding information is 128.3KB, and preceding 128KB security codings information can be followed at 256 times
Processed in ring, and remaining 0.3KB also needs to a circulation and is processed, so, n=256+1=257.
Step S80, parses finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
Step S90, the fingerprint matrices according to MD5 value scrambles, generation scrambled matrix number is matched with cipher key matrix number
Scrambled matrix information;
Parsing finger print information, generates fingerprint matrices, and calculates the MD5 values of fingerprint matrices, for example, collecting fingerprint letter
During breath, the finger print information of user is read by fingerprint reader, produce a binary matrix Z of 64 × 64bit, calculate the MD5 of Z
Value, MD5 values are the character string of 128.When the MD5 values of fingerprint matrices are calculated, will be referred to the MD5 disorder methods of fingerprint matrices
Line matrix scrambling, and the scrambled matrix information matched with cipher key matrix number by chain algorithm conversion generation scrambled matrix number,
Scrambled matrix information such as generation includes K1~KnN scrambled matrix altogether.
Step S100, according to scrambled matrix information and secret key matrix information generation coding information, enters with to encryption information
Row decryption.
According to the scrambled matrix information and secret key matrix information generation coding information, solved with to encryption information
It is close.I.e. according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the coding letter of the encryption information
Breath, i.e., according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the binary system sequence of the encryption information
Row B, the generation formula of the coding information is as follows:
Wherein, the KeyiIt is i-th secret key matrix, the K in the secret key matrix information1It is i-th encryption in the scrambled matrix
Matrix, the i=1,2,3 ... n, n is positive integer.
When coding information (the binary sequence B) is obtained, the coding information (binary sequence B) is write into movement end
The disk at end, you can obtain original document, so as to realize being decrypted the encryption information.
The present embodiment is by the way that when mobile terminal receives the first decryption instructions that user triggers, the fingerprint for gathering user is believed
Breath, the encryption information set that display is associated with finger print information, when mobile terminal receives the second decryption instructions of user's triggering,
The encryption information in encryption information set is decrypted according to finger print information, enabling the finger print information based on user is direct
The encryption information stored in decrypting mobile terminal, so that decrypting process is convenient and swift, safe and reliable.
Further, based on any of the above-described embodiment, Figure 10 is referred to, is the of information protecting method proposed by the present invention
The schematic flow sheet of three embodiments, in the 3rd embodiment, before S10, the information protecting method includes:
Step S200, when fingerprint preservation instruction is detected, calculates the first discrimination of the finger print information of collection, and export
The prompt message of previous finger print information is input into again;
Step S300, when previous finger print information input instruction is detected, the previous finger print information that collection is input into again, and
Second discrimination of the previous finger print information that calculating is input into again;
Whether step S400, judge the first discrimination and the second discrimination more than default discrimination;
Step S500, when the first discrimination and the second discrimination are more than the default discrimination, preserves the fingerprint letter
Breath.
In the present embodiment, firstly, it is necessary to carry out the fingerprint collecting of user.Fingerprint capturer is arranged at and is easy to contact user
At the position of finger print information, such as Home key, mobile phone back, mobile phone frame position, mainly for gathering the fingerprint letter of contact person
Breath.User is finger print or the collection that fingerprint is carried out by way of long of rubbing.Because mobile terminal is to each hand of user
Refer to that the discrimination of fingerprint is different, in order to improve the accuracy of fingerprint recognition, the fingerprint of multiple fingers can be gathered, pick out identification
The fingerprint of rate highest finger, for subsequent calls., it is necessary to the identification for carrying out user fingerprints is distinguished after user fingerprints have been gathered
Recognize.The method can show the finger print information of correlation after fingerprint has been gathered, and calculate the first discrimination of finger print information, now,
And the prompt message for being input into previous finger print information again is exported, user can select corresponding finger print information to be recognized.
During user is recognized, the second discrimination of finger print information that calculating is input into again, judge the first discrimination and
Second discrimination whether more than default discrimination, when the first discrimination and the second discrimination are more than default discrimination, guarantor
Deposit the finger print information.User for acquiring multiple fingerprints can select the discrimination highest fingerprint to carry out encryption and decryption.And it is right
In discrimination fingerprint not high, user can re-start the collection of fingerprint.For example, the forefinger that mobile terminal collects user refers to
During line, it is 80% to calculate the first discrimination of the index fingerprint, and now, mobile terminal output is input into carrying for index fingerprint again
Show information, when detecting user and being input into again after index fingerprint information, calculate the of the index fingerprint information being input into again
Two discriminations are 90%, because first discrimination and second discrimination are both greater than default discrimination (such as default discrimination
For 60%), therefore the index fingerprint information is preserved, and the fingerprint not high for discrimination, user can re-start fingerprint and adopt
Collection, for example, when detecting after user input index fingerprint information, calculating the first discrimination of the index fingerprint information of input
(or second discrimination) is 50%, because first discrimination (or second discrimination) is less than default discrimination (as preset
Discrimination is that 60%), now, mobile terminal can point out user to be input into index fingerprint information again, or mobile terminal also may be used
To point out user to abandon the preservation to the index fingerprint information, and user is pointed out to select to preserve the finger print information of other fingers.
The present embodiment exports the prompting letter of input finger print information again by calculating the first discrimination of finger print information
Breath, when the finger print information input instruction of user's triggering is detected, the finger print information that collection user is input into again, and calculate again
Second discrimination of the finger print information of input, judges that whether the first discrimination and being more than for the second discrimination preset discrimination, when
First discrimination and the second discrimination more than default discrimination when, preserve finger print information, improve the accuracy of fingerprint recognition,
Ensure the Stability and veracity of later stage encryption and decryption.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row
His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and
And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words
The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of information protection device, it is characterised in that described information protection device includes:
First modular converter, for when the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added being turned
Change coding information into, coding information is converted into document matrix information according to default first matrix conversion condition, and determine text
Document matrix number in part matrix information;
First computing module, for parsing the current finger print information for collecting, generates fingerprint matrices, and calculate fingerprint matrices
MD5 values;
First generation module, for according to MD5 value scramble fingerprint matrices, generation scrambled matrix number to be matched with document matrix number
Scrambled matrix information;
Encrypting module for generating secret key and to be encrypted according to secret key pair according to scrambled matrix information and document matrix information
Information is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information.
2. information protection device as claimed in claim 1, it is characterised in that the encrypting module includes:
First generation unit, for according to scrambled matrix information and document matrix information generation security coding information;
Second generation unit, for generating secret key according to security coding information, wherein, the generation formula of the security coding information
For:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the Parti
It is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
3. information protection device as claimed in claim 2, it is characterised in that described information protection device also includes:
Display module, for when the first decryption instructions are detected, the finger print information of the current collection of identification to show and finger print information
The encryption information set of association;
Parsing module, for when the second decryption instructions triggered based on the encryption information in encryption information set are detected,
The secret key associated with encryption information stored in mobile terminal is obtained, and parses secret key and obtain corresponding security coding information;
Second modular converter, believes for security coding information to be converted into secret key matrix according to default second matrix conversion condition
Breath, and determine cipher key matrix number in secret key matrix information;
3rd computing module, for parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
Second generation module, for the fingerprint matrices according to MD5 value scrambles, generates scrambled matrix number and cipher key matrix number
The scrambled matrix information of matching;
Deciphering module, for according to scrambled matrix information and secret key matrix information generation coding information, entering with to encryption information
Row decryption.
4. information protection device as claimed in claim 3, it is characterised in that the generation formula of the coding information is:
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiIt is secret key square
I-th secret key matrix in battle array information, the i=1,2,3 ... n, n is positive integer.
5. the information protection device as described in claim any one of 1-4, it is characterised in that described information protection device is also wrapped
Include:
Output module, for when fingerprint preservation instruction is detected, calculating the first discrimination of the finger print information of collection, and export
The prompt message of previous finger print information is input into again;
4th computing module, for the previous fingerprint letter that when previous finger print information input instruction is detected, collection is input into again
Breath, and calculate the second discrimination of the previous finger print information being input into again;
Judge module, for judging the first discrimination and the second discrimination whether more than default discrimination;
Preserving module, for when the first discrimination and the second discrimination are more than the default discrimination, preserving the fingerprint letter
Breath.
6. a kind of information protecting method, it is characterised in that described information guard method includes step:
When the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into coding information, will compiled
Code information is converted into document matrix information according to default first matrix conversion condition, and determines file square in document matrix information
Battle array number;
The current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
According to MD5 value scramble fingerprint matrices, the scrambled matrix information that generation scrambled matrix number is matched with document matrix number;
According to scrambled matrix information and document matrix information generation secret key, and it is encrypted according to secret key pair confidential information to be added,
Encryption information is obtained, by encryption information storage in the encryption information set associated with finger print information.
7. information protecting method as claimed in claim 6, it is characterised in that described according to scrambled matrix information and file square
The step of battle array information generation secret key, includes:
According to scrambled matrix information and document matrix information generation security coding information;
Secret key is generated according to security coding information, wherein, the generation formula of the security coding information is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the Parti
It is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
8. information protecting method as claimed in claim 7, it is characterised in that institute is according to scrambled matrix information and document matrix
Information generates secret key, and is encrypted according to secret key pair confidential information to be added, obtains encryption information, by encryption information storage with finger
Step in the encryption information set of line information association also includes:
When the first decryption instructions are detected, the finger print information of the current collection of identification, the encryption letter that display is associated with finger print information
Breath set;
When the second decryption instructions triggered based on the encryption information in encryption information set are detected, in obtaining mobile terminal
The secret key associated with encryption information of storage, and parse secret key and obtain corresponding security coding information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, and determines secret key matrix
Cipher key matrix number in information;
Parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
The fingerprint matrices according to MD5 value scrambles, the scrambled matrix letter that generation scrambled matrix number is matched with cipher key matrix number
Breath;
According to scrambled matrix information and secret key matrix information generation coding information, it is decrypted with to encryption information.
9. information protecting method as claimed in claim 8, it is characterised in that the generation formula of the coding information is:
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiIt is secret key square
I-th secret key matrix in battle array information, the i=1,2,3 ... n, n is positive integer.
10. the information protecting method as described in claim any one of 6-9, it is characterised in that described to detect to letter to be encrypted
When ceasing the first encrypted instruction of triggering, confidential information to be added is converted into coding information, by coding information according to default first square
Battle array switch condition is converted into document matrix information, and the step of determine document matrix number in document matrix information before also wrap
Include:
Detect fingerprint preserve instruction when, calculate collection finger print information the first discrimination, and export be input into again it is previous
The prompt message of finger print information;
When previous finger print information input instruction is detected, the previous finger print information being input into again is gathered, and calculating is input into again
Previous finger print information the second discrimination;
Judge the first discrimination and the second discrimination whether more than default discrimination;
When the first discrimination and the second discrimination are more than the default discrimination, the finger print information is preserved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611064352.9A CN106778294A (en) | 2016-11-25 | 2016-11-25 | Information protecting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611064352.9A CN106778294A (en) | 2016-11-25 | 2016-11-25 | Information protecting method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106778294A true CN106778294A (en) | 2017-05-31 |
Family
ID=58901846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611064352.9A Pending CN106778294A (en) | 2016-11-25 | 2016-11-25 | Information protecting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778294A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766703A (en) * | 2017-11-09 | 2019-05-17 | 北京京东尚科信息技术有限公司 | Information processing system, method and apparatus |
CN110378139A (en) * | 2019-07-25 | 2019-10-25 | 江苏芯盛智能科技有限公司 | A kind of data key guard method, system and electronic equipment and storage medium |
CN111310513A (en) * | 2018-12-11 | 2020-06-19 | 上海耕岩智能科技有限公司 | Biological feature recognition structure, system and method under coding mask type screen |
CN113055184A (en) * | 2021-03-22 | 2021-06-29 | 中国工商银行股份有限公司 | Data encryption and decryption method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236930A (en) * | 2013-04-27 | 2013-08-07 | 深圳市中兴移动通信有限公司 | Data encryption method and system |
US20150089665A1 (en) * | 2013-09-24 | 2015-03-26 | Kyocera Document Solutions Inc. | Document Management Server That Reduces Information Leakage of Non-Public Document Information |
-
2016
- 2016-11-25 CN CN201611064352.9A patent/CN106778294A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236930A (en) * | 2013-04-27 | 2013-08-07 | 深圳市中兴移动通信有限公司 | Data encryption method and system |
US20150089665A1 (en) * | 2013-09-24 | 2015-03-26 | Kyocera Document Solutions Inc. | Document Management Server That Reduces Information Leakage of Non-Public Document Information |
Non-Patent Citations (1)
Title |
---|
林文峰等: "基于指纹的数字信息加密算法", 《计算机工程》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766703A (en) * | 2017-11-09 | 2019-05-17 | 北京京东尚科信息技术有限公司 | Information processing system, method and apparatus |
CN109766703B (en) * | 2017-11-09 | 2021-01-26 | 西安京迅递供应链科技有限公司 | Information processing system, method and device |
CN111310513A (en) * | 2018-12-11 | 2020-06-19 | 上海耕岩智能科技有限公司 | Biological feature recognition structure, system and method under coding mask type screen |
CN110378139A (en) * | 2019-07-25 | 2019-10-25 | 江苏芯盛智能科技有限公司 | A kind of data key guard method, system and electronic equipment and storage medium |
CN113055184A (en) * | 2021-03-22 | 2021-06-29 | 中国工商银行股份有限公司 | Data encryption and decryption method and device |
CN113055184B (en) * | 2021-03-22 | 2022-11-29 | 中国工商银行股份有限公司 | Data encryption and decryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104732133B (en) | Electronic contract signs method and system | |
CN105160264B (en) | Photo encryption device and method | |
CN104808944B (en) | Touch operation inducing method and device | |
CN105099669B (en) | Recording encipher-decipher method and device | |
CN104915119B (en) | Terminal desktop icon method of adjustment and device | |
CN105893866A (en) | Screen capture method and device | |
CN106817377A (en) | A kind of data encryption device, decryption device and method | |
CN105681326A (en) | Multilink data transmission device and method | |
CN106778294A (en) | Information protecting method and device | |
CN106453056A (en) | Mobile terminal and method for safely sharing picture | |
CN104915606A (en) | File encryption and decryption methods and devices | |
CN106982273A (en) | Mobile terminal and its control method | |
CN104732162A (en) | File encryption processing method and device | |
CN106453652A (en) | Log file uploading method and system | |
CN106570365A (en) | Application management device, mobile terminal and method | |
CN105578459B (en) | Data encryption device and method under cellular network | |
CN105095705B (en) | A kind of information processing method and device | |
CN106856541A (en) | A kind of terminal and method for secret protection | |
CN105101187A (en) | Method and system for processing encrypted information | |
CN106919840A (en) | The detection method and device of a kind of Malware | |
CN104980436B (en) | A kind of encryption transmission system, method, terminal and intermediate server | |
CN106548081A (en) | A kind of end message display packing and device | |
CN106535181A (en) | Mobile terminal and information management method thereof | |
CN105282155A (en) | Authority control method, device and system for interaction among terminals | |
CN106570424A (en) | Shooting file security management device and method, and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |