CN106951797A - file locking method, device and terminal - Google Patents
file locking method, device and terminal Download PDFInfo
- Publication number
- CN106951797A CN106951797A CN201610010362.8A CN201610010362A CN106951797A CN 106951797 A CN106951797 A CN 106951797A CN 201610010362 A CN201610010362 A CN 201610010362A CN 106951797 A CN106951797 A CN 106951797A
- Authority
- CN
- China
- Prior art keywords
- file
- locking
- user
- access
- print information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
A kind of file locking method, device and terminal, file locking method include:Gather the finger print information of finger;Based on the locking operation to file, the file is locked using the finger print information;The access to the file is monitored to operate.The file locking method, device and terminal improve the security of file encryption;Meanwhile, with regard to the previous step locked during file generated, improve the convenience of file locking.
Description
Technical field
The present invention relates to data safety management field, more particularly to a kind of file locking method, device and end
End.
Background technology
With the development of science and technology, terminal device is more and more intelligent, and the function of possessing is also more and more.
User can produce various types of during using terminal for various application programs in intelligent terminal
E-file, such as text document, photo and video.Wherein, use has been usually contained in these files
The personal information at family, in order to prevent beyond user other people maliciously use these files, reveal privacy,
Usual user can select that these files are encrypted in terminal, protect the safety of e-file.
In the prior art, it usually needs operation individually is encrypted in different application programs in user.Plus
The close method generally used for:File where filesselected, then sets password to file, and
Password is generally the combination of numeral and letter, and no password is not opened then file, so as to reach protection text
The purpose of part;It can also be encrypted by the way of displacement, i.e., the file to be encrypted is put into hidden folder,
File will not be shown, so as to reach the purpose of protection file.
But, in the prior art, hidden file is safe, but hidden file easily can not find or
Lose, operationally user is brought inconvenience;Conventional use pin mode encryption, is easily cracked, text
Part security is low, and in the case where heap file needs to encrypt, user needs to remember substantial amounts of password, no
Facilitate user to remember and handle, cause the workload of user to greatly increase.
The content of the invention
Present invention solves the technical problem that being the security and convenience for how improving file encryption.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of file locking method, file locking
Method includes:
Gather the finger print information of finger;
Based on the locking operation to file, the file is locked using the finger print information;
The access to the file is monitored to operate.
Optionally, carrying out locking to the file includes:
The file is moved to secure memory location from original storage position, wherein, the safety storage
Position is other storage locations different from the original storage position;
The substitute files of the file are put into the original storage position, the substitute files have and institute
File identical presentation mode is stated, is realized by monitoring the operation of the access to the substitute files to the text
The monitoring of the access operation of part.
Optionally, the file locking method also includes:Monitor it is described access operation after, point out into
Row fingerprint is authenticated.
Optionally, the fingerprint authentication includes:
The checking finger print information of the user for accessing operation is implemented in collection;
When the checking finger print information is consistent with the finger print information, it is allowed to the access operation of the user,
Otherwise the access operation of the user is refused.
Optionally, after the access operation of the user is allowed to, the file is from the secure memory location
The access that the original storage position is moved back to receive the user is operated.
Optionally, the file locking method also includes:After the access operation cycle of the user terminates,
The file is re-moved to the secure memory location, and re-establishes the substitute files.
Optionally, after the access operation is allowed to, if the display device of the file is locked,
When accessing operation next time, prompting again carries out fingerprint authentication.
Optionally, the finger print information includes one or more of:Fingerprint image and fingerprint binding key assignments.
Optionally, key assignments is bound by the fingerprint and confirms that the locking to the file is operated.
Optionally, the file locking method also includes:Fileinfo after locking is recorded and protected
Deposit.
Optionally, the file locking method also includes:The fileinfo is subjected to backup preservation.
Optionally, the fileinfo includes one or more of:File name, file path and text
Part form.
In order to solve the above technical problems, the embodiment of the invention also discloses a kind of file locking device, it is described
File locking device includes:
Collecting unit, the finger print information suitable for gathering finger;
Unit is locked, based on the locking operation to file, the file is carried out using the finger print information
Lock;
Monitoring unit, monitors the access to the file and operates.
Optionally, the locking unit includes:
Shift unit, secure memory location is moved to by the file from original storage position, wherein, institute
It is other storage locations different from the original storage position to state secure memory location;
Unit is replaced, the substitute files of the file, the replacement text are put into the original storage position
Part have with the file identical presentation mode, it is real by monitoring the operation of the access to the substitute files
The monitoring that now access to the file is operated.
Optionally, the file locking device also includes:Tip element, suitable for monitoring the access
After operation, point out to carry out fingerprint authentication.
Optionally, the file locking device also includes:Authentication unit, implements described access in collection and grasps
After the checking finger print information of the user of work, when the checking finger print information is consistent with the finger print information,
Allow the access of the user to operate, otherwise refuse the access operation of the user.
Optionally, the shift unit is after the access operation of the user is allowed to, and the file is from institute
Secure memory location is stated to be moved back to the original storage position to receive the access operation of the user.
Optionally, the file locking device also includes:The shift unit is grasped in the access of the user
Make after end cycle, the file is re-moved to the secure memory location, and re-establish described replace
Valsartan part.
Optionally, after the access operation is allowed to, if the display device of the file is locked,
When accessing operation next time, the Tip element points out to carry out fingerprint authentication again.
Optionally, the finger print information includes one or more of:Fingerprint image and fingerprint binding key assignments.
Optionally, the unit that locks binds locking behaviour of the key assignments confirmation to the file by the fingerprint
Make.
Optionally, the file locking device also includes:Recording unit, the fileinfo after locking is entered
Row record and preservation.
Optionally, the file locking device also includes:Backup units, the fileinfo are carried out standby
Part preserves.
Optionally, the fileinfo includes one or more of:File name, file path and text
Part form.
In order to solve the above technical problems, the embodiment of the invention also discloses a kind of terminal, the terminal includes
The file locking device.
Compared with prior art, the technical scheme of the embodiment of the present invention has the advantages that:
Finger print information of the invention by gathering finger, gathers finger print information, what is locked is preposition in advance
Step;Based on the locking operation to the file, the file is locked using the finger print information;
Monitor the access to the file to operate, so as to obtain the read-write state of file in real time.By using
Finger print information is locked to the file so that implement access operation user finger print information with it is described
When finger print information is inconsistent, it is impossible to carry out the access of file, using the uniqueness feature of fingerprint, improve
The security of file encryption;Meanwhile, with regard to the previous step locked during file generated, improve
The convenience of file locking.
Further, key assignments is bound by the fingerprint and confirms that the locking to the file is operated, once detection
Key assignments is bound to the fingerprint, the locking for carrying out file is operated, operation is locked by binding key assignments control,
Further increase the convenience of file locking.
Brief description of the drawings
Fig. 1 is a kind of file locking method flow diagram of the embodiment of the present invention;
Fig. 2 is another file locking method flow diagram of the embodiment of the present invention;
Fig. 3 is a kind of structural representation of file locking device of the embodiment of the present invention;
Fig. 4 is the structural representation of another file locking device of the embodiment of the present invention.
Embodiment
As described in the background art, in the prior art, hidden file is safe, but hidden file holds
Easily it can not find or lose, operationally user is brought inconvenience;Conventional use pin mode encryption,
Easily crack, file security is low, in the case where heap file needs to encrypt, user needs to remember big
The password of amount, it has not been convenient to which user remembers and handled, and causes the workload of user to greatly increase.
In technical solution of the present invention, by the use of fingerprint as biological property there is uniqueness the characteristics of, by it
Identification and file encryption for identity.Fingerprint recognition is used for identity authentication and file encryption is advantageous in that:
It is easy to use;Biological characteristics is difficult to replicate, safer for identification technology.Meanwhile, pass through monitoring
Access operation to file, realizes the read-write state for obtaining file in real time, and only refer to be verified
After the identification of line passes through, its could be allowed to access file data, the security and just of file encryption is improved
Victory.
It is understandable to enable the above objects, features and advantages of the present invention to become apparent, below in conjunction with the accompanying drawings
The specific embodiment of the present invention is described in detail.
Fig. 1 is a kind of file locking method flow diagram of the embodiment of the present invention.
Fig. 1 is refer to, file locking method includes:Step S101, gathers the finger print information of finger.
In the present embodiment, finger print information can be obtained by gathering typing in advance, wherein, the fingerprint
Information can be one or more.File can also be carried out using finger and based on touch action in user
During operation, for example, can be modification edit operation, the foundation of file and the generation operation to file,
Gather the finger print information of the finger.By way of finger print information being gathered while in operation so that follow-up base
Become rapid and convenient in the locking operation of fingerprint.
In specific implementation, the finger print information can include one or more of:Fingerprint image and fingerprint
Bind key assignments.Wherein, the image that fingerprint image is formed for the fingerprint of finger, with uniqueness, to text
Then it is to be based on the fingerprint image, when fingerprint image to be verified with adopting in advance during the access rights identification of part
When one or more fingerprint images of collection are consistent, then by identification, otherwise identification failure.Fingerprint is tied up
Determine the key assignments of button that key assignments refers to associate with the finger print of collection registration, the finger each registered can be with
Bound with corresponding key assignments, for example, can be, thumb binding F1, forefinger binding F2 etc., to file
It is when fingerprint to be verified binds above-mentioned fingerprint binding key assignments, then no by identification when access rights are identified
Then identification failure.
In addition, fingerprint binding key assignments can be used for simply and quickly sending the instruction for confirming to lock operation.
Furthermore, during being operated to file, detect that fingerprint is tied up by the finger print information of collection
Determine key assignments, associated if the fingerprint binds key assignments with locking operation, directly send the instruction for locking operation
And locked, without carrying out extra operation again.For example, the key assignments of thumb binding is F1, forefinger
The key assignments of binding is F2, and F1 with lock operation associate, F2 with lock operate onrelevant, then with
When thumb is operated (such as setting up, change) to file, directly locking of the triggering to file is grasped
Make, " locking " button without the operation bidirectional of user, for example, is clicked in a menu;And with forefinger pair
When file is operated, because key assignments F2 is unrelated with locking operation, then locking operation would not be triggered,
User is if it is intended to locking, then need extra operation, such as click " locking " button in a menu.
It is understood that the fingerprint binding key assignments can carry out adaptability according to actual applied environment
Configuration.
Step S102, based on the locking operation to file, is carried out using the finger print information to the file
Lock.
In the present embodiment, described to lock the judgement that operation performs can in user's select file and eject
Context menu, or selection is locked when entering the actions menu of next stage, file locking method is according to phase
The instruction answered carries out locking operation, and using the finger print information as lock file checking information.It is described
The lock operational control of going of file can lock the deterministic process of operation with analogy.
In specific implementation, carrying out locking to the file includes:The file is moved from original storage position
Move to secure memory location, wherein, the secure memory location is different from the original storage position
Other storage locations.Then the substitute files of the file are put into the original storage position, it is described to replace
Valsartan part has and the file identical presentation mode.For example, substitute files have with original file
Identical file name, file icon etc., enable a user to the substitute files being recognized as original
File.
In the present embodiment, after finger print information is collected, it is possible to use the finger print information is to the file
Locked.Wherein, after fingerprint image is collected, it can be confirmed by the fingerprint image to described
The locking operation of file, if fingerprint image locks fingerprint image to be default, corresponding locking is called in control
Application programming interface (Application Programming Interface, API) is locked to file
Operation.After fingerprint binding key assignments is collected, key assignments is bound by the fingerprint and confirmed to the file
Operation is locked, if fingerprint binding key assignments is default locking key assignments, control is corresponding to lock application program
DLL carries out locking operation to file.
It is understood that the locking mode of the file can also be realized by way of file is replicated,
Realized for example with the cp orders in (SuSE) Linux OS.Cp orders are used for one or more source documents
Part or catalogue copy to the purpose file specified or catalogue, and single source file can be copied into by cp orders
Under the specific file or a catalogue existed of one specified file name.Cp orders are also supported simultaneously
Replicate multiple files.
It is understood that the locking mode for file can also be by way of changing file attributes
To realize, for example, file owner or superuser are caused by the chmod orders in (SuSE) Linux OS
File access mode could be changed.It can also be that directly file is encrypted using AES, may be used also
To delete original document by rm orders, spurious document is put into original storage position, spurious document can be individual
The inactive file of soft link or destruction.
Step S103, monitors the access to the file and operates.
In the present embodiment, the visit to the file is realized by the access operation monitored to the substitute files
Ask the monitoring of operation.Lock after the completion of operation, the fileinfo after locking is recorded and preserved, institute
One or more of can be included by stating fileinfo:File name, file path and file format.Also
The fileinfo can be subjected to backup preservation, it is ensured that terminal of the information of lock file in storage file
It will not be lost after hanging electricity.Realize that the access operation to all lock files is supervised based on the fileinfo
Survey.
In specific implementation, after the access operation is monitored, point out to carry out fingerprint authentication.And gather reality
Apply the checking finger print information of the user for accessing operation;Believe in the checking finger print information and the fingerprint
When ceasing consistent, such as fingerprint image to be verified locks fingerprint image or fingerprint to be verified binding key assignments to be default
During for default locking key assignments, it is allowed to the access operation of the user, otherwise refuse the access of the user
Operation.Wherein, when being verified to fingerprint image, fingerprint authentication device can be called, is referred to to be verified
Print image is judged with the default fingerprint image uniformity that locks, and exports judged result, to conduct interviews
The judgement of operating right., can be with without calling fingerprint authentication device when being verified to fingerprint binding key assignments
Corresponding key assignments systematic function is opened, the checking fingerprint correspondence of the user for accessing operation is implemented in generation
Key assignments, and the judgement for the operating right that conducted interviews according to the key assignments of generation.
In specific implementation, after the access operation is monitored, Access Events can be based on by corresponding text
Part information notifies upper layer application by readjustment, and upper layer application opens fingerprint authentication device, points out to carry out fingerprint
Authentication.
In specific implementation, after the access operation of the user is allowed to, the user, which possesses, accesses file
Temporary visit authority, current file authority is opened temporarily, and the file is moved back to from the secure memory location
The original storage position is operated with the access for receiving the user.In the access operation cycle of the user
After end, the operation cycle can be that display device screen bright screen is closed to dark screen, or File Open to file
The time interval closed, the temporary visit authority of user is withdrawn, and the file is re-moved to the safety and deposited
Storage space is put, and re-establishes the substitute files.When user access next time and operated, point out again
Carry out fingerprint authentication.
It is understood that file access rights open after, can allow user and it is every other should
With file can be accessed, until the temporary authority of file is closed.Current accessed application can also only be allowed
Or user accesses, other application there is not permission to access.The life span of temporary authority is configurable to file
Display device go out screen after terminate.
In specific implementation, if the display device of the file is locked, for example, can be, display device
Screen is locked or screen secretly falls, and the temporary authority of file is closed, then when accessing operation next time, weight
New prompting carries out fingerprint authentication.
The embodiment of the present invention is locked by using finger print information to the file so that implement to access behaviour
The user of work is not when finger print information is met, it is impossible to carry out the access of file, special using the uniqueness of fingerprint
Point, improves the security of file encryption;Meanwhile, it is preposition with regard to what is locked during file generated
Step, improves the convenience of file locking.
Fig. 2 is another file locking method flow diagram of the embodiment of the present invention.
Fig. 2 is refer to, file locking method includes:Step S201, gathers the finger print information of finger.
Step S202, judges whether to lock, if it is, into step S203, otherwise into step S204.
In the present embodiment, the finger print information can include one or more of:Fingerprint image and fingerprint
Bind key assignments.It is described that to lock the judgement that operation performs can in user's select file and eject context
Menu, or selection is locked when entering the actions menu of next stage, file locking method is according to finger accordingly
Order carry out locking operation, and using the finger print information as lock file checking information.
In specific implementation, it can judge whether to lock operation based on the finger print information collected.It is based on
The fingerprint image, when fingerprint image is consistent with preset fingerprint image, then triggering locks operation, otherwise not
Triggering locks operation.Or, key assignments is bound based on the fingerprint, when fingerprint binding preset fingerprint binding key
Value, then triggering locks operation, and locking operation is not otherwise triggered.Wherein, the preset fingerprint image and pre-
If binding key assignments can be configured by User Defined, for controlling to lock operation.
Step S203, secure memory location is moved to by file.
Step S204, no operation.
In the present embodiment, locking operation is carried out based on qualification result.Qualification result shows to wrap in finger print information
When fingerprint image and fingerprint the binding key assignments contained is respectively the preset fingerprint image or default binding key assignments,
File is moved to secure memory location, otherwise without any operation.
In specific implementation, carrying out locking to the file includes:The file is moved from original storage position
Move to secure memory location, wherein, the secure memory location is different from the original storage position
Other storage locations.Then the substitute files of the file are put into the original storage position, it is described to replace
Valsartan part has and the file identical presentation mode.
Step S205, the substitute files of the file are put into original storage position.
In the present embodiment, the substitute files have and the file identical presentation mode.
In specific implementation, when file type is media file, e.g. picture or during video, due to
Media application can produce index file, and user can point out unblock when accessing media application, if user cancels
Unblock, unblock message can be pointed out repeatedly, and Consumer's Experience is bad.The file locking method of the embodiment of the present invention
Substitute files, index file (thumbnail) the storage position of original document are put into using original storage position
Put into substitute files index.
In specific implementation, substitute files and alternate index file can be pre-configured with before operation is locked,
When user requires to lock, original document can be moved to security catalog, original document is by substitute files
Substituted, the index file of original document is substituted by alternate index file.Substitute files are deleted during unblock
Fall, the original document in security catalog is moved to original storage position.
Step S206, monitors the access to the substitute files and operates.
Step S207, judges whether to monitor to access operation, if it is, into step S208, otherwise after
Continuous step S206.
Step S208, carries out fingerprint authentication.
In the present embodiment, the visit to the file is realized by the access operation monitored to the substitute files
Ask the monitoring of operation.After the access operation is monitored, point out to carry out fingerprint authentication.And gather implementation
The checking finger print information of the user for accessing operation, carries out it with locking the comparison of finger print information.
Step S208, judges whether to authenticate successfully, if it is, into step S210, otherwise into step
S211。
Step S210, it is allowed to the access operation of the user.
Step S211, refuses the access operation of the user.
In the present embodiment, when the checking finger print information is consistent with the finger print information, it is allowed to the use
The access operation at family, otherwise refuses the access operation of the user.
In the present embodiment, it is allowed to which user conducts interviews operation to file, file is in the state of temporary Authorization
When, user can be checked and be edited to file.The synchronous monitoring of file content can be carried out, when with
Family is edited after the original document of mandate, the content change of original document, carries out file content simultaneously operating,
The file after editor is moved to secure memory location again.
In specific implementation, monitor after file modification operation, based on file modification event, carry out in file
Hold simultaneously operating, original document can be set to dirty (dirty) state, and again the file after editor
It is moved to secure memory location.
It is preferred that, user includes in the method that terminal is taken pictures and locked to picture:User utilizes
When camera is taken pictures, user fingerprint image is gathered, and opens fingerprint authentication device, judges that fingerprint image is
No is preset fingerprint image, if it is, carrying out locking operation to the picture for generation of taking pictures, can be passed through
The corresponding application programming interface that locks is called to carry out locking operation to file.
It is preferred that, user includes in the method that terminal is taken pictures and locked to picture:Open camera
The virtual key systematic function of application, when user is taken pictures using camera, gathers user fingerprint image, such as
Really described fingerprint image binding virtual key, then whether after end of taking pictures, it is default to judge virtual key
Key assignments is locked, the picture of generation carries out locking operation if it is, control is taken pictures, can be corresponding by calling
Locking application programming interface to file carry out locking operation.
The embodiment of the embodiment of the present invention can refer to foregoing corresponding embodiment, and here is omitted.
Fig. 3 is a kind of structural representation of file locking device of the embodiment of the present invention.
Fig. 3 is refer to, file locking device includes:Collecting unit 301, locking unit 302 and monitoring are single
Member 303.
Wherein, collecting unit 301, the finger print information suitable for gathering finger.
Unit 302 is locked, based on the locking operation to file, the file is entered using the finger print information
Row is locked.
Monitoring unit 303, monitors the access to the file and operates.
In the present embodiment, finger print information is used by collecting unit 301, unit 302 is locked based on described
Finger print information is locked to the file.In monitoring unit 303 after monitoring to access operation, checking
When implementing the finger print information of the user of access operation, finger print information to be verified and inconsistent locking finger print information,
The access of file can not be carried out, using the uniqueness feature of fingerprint, the security of file encryption is improved;
Meanwhile, with regard to the previous step locked during file generated, improve the convenience of file locking.
Fig. 4 is the structural representation of another file locking device of the embodiment of the present invention.
Fig. 4 is refer to, file locking device includes:Collecting unit 401, locking unit 402, displacement are single
Member 403, displacement unit 404, Tip element 405, authentication unit 406, recording unit 407 and backup
Unit 408.
Wherein, collecting unit 401, the finger print information suitable for gathering finger.
In the present embodiment, the finger print information includes one or more of:Fingerprint image and fingerprint binding
Key assignments
Unit 402 is locked, based on the locking operation to file, the file is entered using the finger print information
Row is locked.
The unit 402 that locks binds locking operation of the key assignments confirmation to the file by the fingerprint
Shift unit 403, secure memory location is moved to by the file from original storage position, wherein,
The secure memory location is other storage locations different from the original storage position;
In the present embodiment, the shift unit 403 is described after the access operation of the user is allowed to
The access that file is moved back to the original storage position to receive the user from the secure memory location is grasped
Make.The shift unit 403 is after the access operation cycle of the user terminates, and the file is moved again
Move to the secure memory location, and re-establish the substitute files
Unit 404 is replaced, the substitute files of the file, the replacement are put into the original storage position
File have with the file identical presentation mode, by monitor the access to the substitute files operate
Realize the monitoring of the access operation to the file.
Tip element 405, suitable for after the access operation is monitored, pointing out to carry out fingerprint authentication.
In the present embodiment, after the access operation is allowed to, if the display device of the file is locked,
Then when accessing operation next time, the Tip element 405 points out to carry out fingerprint authentication again.
Authentication unit 406, after the checking finger print information that the user for accessing operation is implemented in collection, in institute
State checking finger print information it is consistent with the finger print information when, it is allowed to the access of the user is operated, and is otherwise refused
The access operation of the exhausted user.
Recording unit 407, the fileinfo after locking is recorded and preserved.
Backup units 408, backup preservation is carried out by the fileinfo.
In the present embodiment, the fileinfo includes one or more of:File name, file path
And file format.
In specific implementation, backup units 408 can realize power loss recovery lock file information, can also be
Recover lock file information after being configured with the start of the terminal device of file locking device.Lock file unblock is awarded
Quan Hou, lock file may be edited by, updates, change, can be again the text after editor
Part is moved to secure memory location, and updates the backup fileinfo of backup units 408.
The embodiment of the embodiment of the present invention can refer to foregoing corresponding embodiment, and here is omitted.
The embodiment of the invention also discloses a kind of terminal, the terminal includes above-mentioned file locking device, institute
It can be mobile phone, pad, iwatch and computer to state terminal.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment
Rapid to can be by program to instruct the hardware of correlation to complete, the program can be stored in can with computer
Read in storage medium, storage medium can include:ROM, RAM, disk or CD etc..
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art,
Without departing from the spirit and scope of the present invention, it can make various changes or modifications, therefore the guarantor of the present invention
Shield scope should be defined by claim limited range.
Claims (25)
1. a kind of file locking method, it is characterised in that including:
Gather the finger print information of finger;
Based on the locking operation to file, the file is locked using the finger print information;
The access to the file is monitored to operate.
2. file locking method according to claim 1, it is characterised in that locked to the file
Including:
The file is moved to secure memory location from original storage position, wherein, the safety storage position
It is other storage locations different from the original storage position to put;
Be put into the substitute files of the file in the original storage position, the substitute files have with it is described
File identical presentation mode, is realized to the text by monitoring the operation of the access to the substitute files
The monitoring of the access operation of part.
3. file locking method according to claim 2, it is characterised in that also include:Monitoring
State after access operation, point out to carry out fingerprint authentication.
4. file locking method according to claim 3, it is characterised in that the fingerprint authentication includes:
The checking finger print information of the user for accessing operation is implemented in collection;
When the checking finger print information is consistent with the finger print information, it is allowed to the access operation of the user,
Otherwise the access operation of the user is refused.
5. file locking method according to claim 4, it is characterised in that the access operation of the user
After being allowed to, the file is moved back to the original storage position to receive from the secure memory location
State the access operation of user.
6. file locking method according to claim 5, it is characterised in that also include:In the user
The access operation cycle terminate after, the file is re-moved to the secure memory location, and again
Set up the substitute files.
7. file locking method according to claim 4, it is characterised in that the access operation is allowed to
Afterwards, if the file display device be locked, next time access operation when, point out again into
Row fingerprint is authenticated.
8. the file locking method according to any one of claim 1 to 7, it is characterised in that the fingerprint
Information includes one or more of:Fingerprint image and fingerprint binding key assignments.
9. file locking method according to claim 8, it is characterised in that key is bound by the fingerprint
Value confirms that the locking to the file is operated.
10. the file locking method according to any one of claim 1 to 7, it is characterised in that also include:
Fileinfo after locking is recorded and preserved.
11. file locking method according to claim 10, it is characterised in that also include:By the file
Information carries out backup preservation.
12. file locking method according to claim 10, it is characterised in that the fileinfo include with
Lower one or more:File name, file path and file format.
13. a kind of file locking device, it is characterised in that including:
Collecting unit, the finger print information suitable for gathering finger;
Unit is locked, based on the locking operation to file, the file is added using the finger print information
Lock;
Monitoring unit, monitors the access to the file and operates.
14. file locking device according to claim 13, it is characterised in that the locking unit includes:
Shift unit, secure memory location is moved to by the file from original storage position, wherein, it is described
Secure memory location is other storage locations different from the original storage position;
Unit is replaced, the substitute files of the file, the substitute files are put into the original storage position
With with the file identical presentation mode, it is real by monitoring the operation of the access to the substitute files
The monitoring that now access to the file is operated.
15. file locking device according to claim 14, it is characterised in that also include:Tip element,
Suitable for after the access operation is monitored, pointing out to carry out fingerprint authentication.
16. file locking device according to claim 15, it is characterised in that also include:Authentication unit,
After the checking finger print information that the user for accessing operation is implemented in collection, in the checking finger print information
When consistent with the finger print information, it is allowed to the access operation of the user, otherwise refuse the user's
Access operation.
17. file locking device according to claim 16, it is characterised in that the shift unit is described
After the access operation of user is allowed to, the file is moved back to described original deposit from the secure memory location
Storage space is put to be operated with the access for receiving the user.
18. file locking device according to claim 17, it is characterised in that also include:The displacement is single
Member is after the access operation cycle of the user terminates, and the file is re-moved to the safety storage
Position, and re-establish the substitute files.
19. file locking device according to claim 16, it is characterised in that the access operation is allowed to
Afterwards, if the display device of the file is locked, when accessing operation next time, the prompting list
Again prompting carries out fingerprint authentication to member.
20. the file locking device according to any one of claim 13 to 19, it is characterised in that the finger
Line information includes one or more of:Fingerprint image and fingerprint binding key assignments.
21. file locking device according to claim 20, it is characterised in that the locking unit passes through institute
State fingerprint binding key assignments and confirm that the locking to the file is operated.
22. the file locking device according to any one of claim 13 to 19, it is characterised in that also include:
Recording unit, the fileinfo after locking is recorded and preserved.
23. file locking device according to claim 22, it is characterised in that also include:Backup units,
The fileinfo is subjected to backup preservation.
24. file locking device according to claim 22, it is characterised in that the fileinfo include with
Lower one or more:File name, file path and file format.
25. a kind of terminal, it is characterised in that including the file locking as described in any one of claim 13 to 24
Device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610010362.8A CN106951797A (en) | 2016-01-07 | 2016-01-07 | file locking method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610010362.8A CN106951797A (en) | 2016-01-07 | 2016-01-07 | file locking method, device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106951797A true CN106951797A (en) | 2017-07-14 |
Family
ID=59465654
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610010362.8A Pending CN106951797A (en) | 2016-01-07 | 2016-01-07 | file locking method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106951797A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814166A (en) * | 2020-07-10 | 2020-10-23 | 上海淇毓信息科技有限公司 | Data encryption method and device and electronic equipment |
CN112732660A (en) * | 2021-01-05 | 2021-04-30 | 中国工商银行股份有限公司 | Intervention type file transmission method, device and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
CN102789555A (en) * | 2011-05-17 | 2012-11-21 | 腾讯科技(深圳)有限公司 | Method and system for safely moving file |
CN103620606A (en) * | 2013-06-20 | 2014-03-05 | 华为技术有限公司 | Storage detecting apparatus, system, and method |
CN104102883A (en) * | 2013-04-09 | 2014-10-15 | 中兴通讯股份有限公司 | Display method and device |
CN104112091A (en) * | 2014-06-26 | 2014-10-22 | 小米科技有限责任公司 | File locking method and device |
CN105205375A (en) * | 2015-09-22 | 2015-12-30 | 电子科技大学 | Privacy information protection software based on palmprint recognition and novel palmprint image preprocessing method |
-
2016
- 2016-01-07 CN CN201610010362.8A patent/CN106951797A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
CN102789555A (en) * | 2011-05-17 | 2012-11-21 | 腾讯科技(深圳)有限公司 | Method and system for safely moving file |
CN104102883A (en) * | 2013-04-09 | 2014-10-15 | 中兴通讯股份有限公司 | Display method and device |
CN103620606A (en) * | 2013-06-20 | 2014-03-05 | 华为技术有限公司 | Storage detecting apparatus, system, and method |
CN104112091A (en) * | 2014-06-26 | 2014-10-22 | 小米科技有限责任公司 | File locking method and device |
CN105205375A (en) * | 2015-09-22 | 2015-12-30 | 电子科技大学 | Privacy information protection software based on palmprint recognition and novel palmprint image preprocessing method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814166A (en) * | 2020-07-10 | 2020-10-23 | 上海淇毓信息科技有限公司 | Data encryption method and device and electronic equipment |
CN111814166B (en) * | 2020-07-10 | 2023-09-12 | 上海淇毓信息科技有限公司 | Data encryption method and device and electronic equipment |
CN112732660A (en) * | 2021-01-05 | 2021-04-30 | 中国工商银行股份有限公司 | Intervention type file transmission method, device and system |
CN112732660B (en) * | 2021-01-05 | 2024-02-27 | 中国工商银行股份有限公司 | Intervening file transmission method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104662870B (en) | Data safety management system | |
KR20080095866A (en) | Computer session management device and system | |
JP6785967B2 (en) | Methods and systems to block phishing or ransomware attacks | |
CN102254124A (en) | Information security protecting system and method of mobile terminal | |
CN106484570A (en) | A kind of backpu protecting method and system extorting software document data for defence | |
CN103745162A (en) | Secure network file storage system | |
JP7489672B2 (en) | Method and system for blocking ransomware or phishing attacks | |
CN106548070A (en) | A kind of method and system that blackmailer's virus is defendd in stand-by time | |
WO2007091652A1 (en) | Tally information management method and management device | |
KR100975133B1 (en) | Security management system for portable memory devices and security management method using the same | |
JP4044126B1 (en) | Information leakage prevention device, information leakage prevention program, information leakage prevention recording medium, and information leakage prevention system | |
CN102708335A (en) | Confidential file protection method | |
CN109214204A (en) | Data processing method and storage equipment | |
CN103425938B (en) | The folder encryption method of one kind Unix operating system and device | |
CN106951797A (en) | file locking method, device and terminal | |
JP5429906B2 (en) | Mobile terminal, program, and control method. | |
JP5631251B2 (en) | Information leakage prevention method | |
US20080253559A1 (en) | Data Security Method, System and Storage Medium for Preventing a Desktop Search Tool from Exposing Encrypted Data | |
KR100331056B1 (en) | Method for implementing a cyber safe | |
JP2021174432A (en) | Electronic data management method, electronic data management device, and program and storage medium for the same | |
KR20170038340A (en) | Data leakage prevention apparatus and method thereof | |
JP2007012022A (en) | Security program and security system | |
JP2004220400A (en) | File protecting method and file protection program | |
CN109784077A (en) | File security means of defence | |
CN103530532A (en) | File encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170714 |
|
RJ01 | Rejection of invention patent application after publication |