CN106951797A - file locking method, device and terminal - Google Patents

file locking method, device and terminal Download PDF

Info

Publication number
CN106951797A
CN106951797A CN201610010362.8A CN201610010362A CN106951797A CN 106951797 A CN106951797 A CN 106951797A CN 201610010362 A CN201610010362 A CN 201610010362A CN 106951797 A CN106951797 A CN 106951797A
Authority
CN
China
Prior art keywords
file
locking
user
access
print information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610010362.8A
Other languages
Chinese (zh)
Inventor
赵文恒
吴庆典
唐红军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Silead Inc
Original Assignee
Silead Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silead Inc filed Critical Silead Inc
Priority to CN201610010362.8A priority Critical patent/CN106951797A/en
Publication of CN106951797A publication Critical patent/CN106951797A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of file locking method, device and terminal, file locking method include:Gather the finger print information of finger;Based on the locking operation to file, the file is locked using the finger print information;The access to the file is monitored to operate.The file locking method, device and terminal improve the security of file encryption;Meanwhile, with regard to the previous step locked during file generated, improve the convenience of file locking.

Description

File locking method, device and terminal
Technical field
The present invention relates to data safety management field, more particularly to a kind of file locking method, device and end End.
Background technology
With the development of science and technology, terminal device is more and more intelligent, and the function of possessing is also more and more. User can produce various types of during using terminal for various application programs in intelligent terminal E-file, such as text document, photo and video.Wherein, use has been usually contained in these files The personal information at family, in order to prevent beyond user other people maliciously use these files, reveal privacy, Usual user can select that these files are encrypted in terminal, protect the safety of e-file.
In the prior art, it usually needs operation individually is encrypted in different application programs in user.Plus The close method generally used for:File where filesselected, then sets password to file, and Password is generally the combination of numeral and letter, and no password is not opened then file, so as to reach protection text The purpose of part;It can also be encrypted by the way of displacement, i.e., the file to be encrypted is put into hidden folder, File will not be shown, so as to reach the purpose of protection file.
But, in the prior art, hidden file is safe, but hidden file easily can not find or Lose, operationally user is brought inconvenience;Conventional use pin mode encryption, is easily cracked, text Part security is low, and in the case where heap file needs to encrypt, user needs to remember substantial amounts of password, no Facilitate user to remember and handle, cause the workload of user to greatly increase.
The content of the invention
Present invention solves the technical problem that being the security and convenience for how improving file encryption.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of file locking method, file locking Method includes:
Gather the finger print information of finger;
Based on the locking operation to file, the file is locked using the finger print information;
The access to the file is monitored to operate.
Optionally, carrying out locking to the file includes:
The file is moved to secure memory location from original storage position, wherein, the safety storage Position is other storage locations different from the original storage position;
The substitute files of the file are put into the original storage position, the substitute files have and institute File identical presentation mode is stated, is realized by monitoring the operation of the access to the substitute files to the text The monitoring of the access operation of part.
Optionally, the file locking method also includes:Monitor it is described access operation after, point out into Row fingerprint is authenticated.
Optionally, the fingerprint authentication includes:
The checking finger print information of the user for accessing operation is implemented in collection;
When the checking finger print information is consistent with the finger print information, it is allowed to the access operation of the user, Otherwise the access operation of the user is refused.
Optionally, after the access operation of the user is allowed to, the file is from the secure memory location The access that the original storage position is moved back to receive the user is operated.
Optionally, the file locking method also includes:After the access operation cycle of the user terminates, The file is re-moved to the secure memory location, and re-establishes the substitute files.
Optionally, after the access operation is allowed to, if the display device of the file is locked, When accessing operation next time, prompting again carries out fingerprint authentication.
Optionally, the finger print information includes one or more of:Fingerprint image and fingerprint binding key assignments.
Optionally, key assignments is bound by the fingerprint and confirms that the locking to the file is operated.
Optionally, the file locking method also includes:Fileinfo after locking is recorded and protected Deposit.
Optionally, the file locking method also includes:The fileinfo is subjected to backup preservation.
Optionally, the fileinfo includes one or more of:File name, file path and text Part form.
In order to solve the above technical problems, the embodiment of the invention also discloses a kind of file locking device, it is described File locking device includes:
Collecting unit, the finger print information suitable for gathering finger;
Unit is locked, based on the locking operation to file, the file is carried out using the finger print information Lock;
Monitoring unit, monitors the access to the file and operates.
Optionally, the locking unit includes:
Shift unit, secure memory location is moved to by the file from original storage position, wherein, institute It is other storage locations different from the original storage position to state secure memory location;
Unit is replaced, the substitute files of the file, the replacement text are put into the original storage position Part have with the file identical presentation mode, it is real by monitoring the operation of the access to the substitute files The monitoring that now access to the file is operated.
Optionally, the file locking device also includes:Tip element, suitable for monitoring the access After operation, point out to carry out fingerprint authentication.
Optionally, the file locking device also includes:Authentication unit, implements described access in collection and grasps After the checking finger print information of the user of work, when the checking finger print information is consistent with the finger print information, Allow the access of the user to operate, otherwise refuse the access operation of the user.
Optionally, the shift unit is after the access operation of the user is allowed to, and the file is from institute Secure memory location is stated to be moved back to the original storage position to receive the access operation of the user.
Optionally, the file locking device also includes:The shift unit is grasped in the access of the user Make after end cycle, the file is re-moved to the secure memory location, and re-establish described replace Valsartan part.
Optionally, after the access operation is allowed to, if the display device of the file is locked, When accessing operation next time, the Tip element points out to carry out fingerprint authentication again.
Optionally, the finger print information includes one or more of:Fingerprint image and fingerprint binding key assignments.
Optionally, the unit that locks binds locking behaviour of the key assignments confirmation to the file by the fingerprint Make.
Optionally, the file locking device also includes:Recording unit, the fileinfo after locking is entered Row record and preservation.
Optionally, the file locking device also includes:Backup units, the fileinfo are carried out standby Part preserves.
Optionally, the fileinfo includes one or more of:File name, file path and text Part form.
In order to solve the above technical problems, the embodiment of the invention also discloses a kind of terminal, the terminal includes The file locking device.
Compared with prior art, the technical scheme of the embodiment of the present invention has the advantages that:
Finger print information of the invention by gathering finger, gathers finger print information, what is locked is preposition in advance Step;Based on the locking operation to the file, the file is locked using the finger print information; Monitor the access to the file to operate, so as to obtain the read-write state of file in real time.By using Finger print information is locked to the file so that implement access operation user finger print information with it is described When finger print information is inconsistent, it is impossible to carry out the access of file, using the uniqueness feature of fingerprint, improve The security of file encryption;Meanwhile, with regard to the previous step locked during file generated, improve The convenience of file locking.
Further, key assignments is bound by the fingerprint and confirms that the locking to the file is operated, once detection Key assignments is bound to the fingerprint, the locking for carrying out file is operated, operation is locked by binding key assignments control, Further increase the convenience of file locking.
Brief description of the drawings
Fig. 1 is a kind of file locking method flow diagram of the embodiment of the present invention;
Fig. 2 is another file locking method flow diagram of the embodiment of the present invention;
Fig. 3 is a kind of structural representation of file locking device of the embodiment of the present invention;
Fig. 4 is the structural representation of another file locking device of the embodiment of the present invention.
Embodiment
As described in the background art, in the prior art, hidden file is safe, but hidden file holds Easily it can not find or lose, operationally user is brought inconvenience;Conventional use pin mode encryption, Easily crack, file security is low, in the case where heap file needs to encrypt, user needs to remember big The password of amount, it has not been convenient to which user remembers and handled, and causes the workload of user to greatly increase.
In technical solution of the present invention, by the use of fingerprint as biological property there is uniqueness the characteristics of, by it Identification and file encryption for identity.Fingerprint recognition is used for identity authentication and file encryption is advantageous in that: It is easy to use;Biological characteristics is difficult to replicate, safer for identification technology.Meanwhile, pass through monitoring Access operation to file, realizes the read-write state for obtaining file in real time, and only refer to be verified After the identification of line passes through, its could be allowed to access file data, the security and just of file encryption is improved Victory.
It is understandable to enable the above objects, features and advantages of the present invention to become apparent, below in conjunction with the accompanying drawings The specific embodiment of the present invention is described in detail.
Fig. 1 is a kind of file locking method flow diagram of the embodiment of the present invention.
Fig. 1 is refer to, file locking method includes:Step S101, gathers the finger print information of finger.
In the present embodiment, finger print information can be obtained by gathering typing in advance, wherein, the fingerprint Information can be one or more.File can also be carried out using finger and based on touch action in user During operation, for example, can be modification edit operation, the foundation of file and the generation operation to file, Gather the finger print information of the finger.By way of finger print information being gathered while in operation so that follow-up base Become rapid and convenient in the locking operation of fingerprint.
In specific implementation, the finger print information can include one or more of:Fingerprint image and fingerprint Bind key assignments.Wherein, the image that fingerprint image is formed for the fingerprint of finger, with uniqueness, to text Then it is to be based on the fingerprint image, when fingerprint image to be verified with adopting in advance during the access rights identification of part When one or more fingerprint images of collection are consistent, then by identification, otherwise identification failure.Fingerprint is tied up Determine the key assignments of button that key assignments refers to associate with the finger print of collection registration, the finger each registered can be with Bound with corresponding key assignments, for example, can be, thumb binding F1, forefinger binding F2 etc., to file It is when fingerprint to be verified binds above-mentioned fingerprint binding key assignments, then no by identification when access rights are identified Then identification failure.
In addition, fingerprint binding key assignments can be used for simply and quickly sending the instruction for confirming to lock operation. Furthermore, during being operated to file, detect that fingerprint is tied up by the finger print information of collection Determine key assignments, associated if the fingerprint binds key assignments with locking operation, directly send the instruction for locking operation And locked, without carrying out extra operation again.For example, the key assignments of thumb binding is F1, forefinger The key assignments of binding is F2, and F1 with lock operation associate, F2 with lock operate onrelevant, then with When thumb is operated (such as setting up, change) to file, directly locking of the triggering to file is grasped Make, " locking " button without the operation bidirectional of user, for example, is clicked in a menu;And with forefinger pair When file is operated, because key assignments F2 is unrelated with locking operation, then locking operation would not be triggered, User is if it is intended to locking, then need extra operation, such as click " locking " button in a menu.
It is understood that the fingerprint binding key assignments can carry out adaptability according to actual applied environment Configuration.
Step S102, based on the locking operation to file, is carried out using the finger print information to the file Lock.
In the present embodiment, described to lock the judgement that operation performs can in user's select file and eject Context menu, or selection is locked when entering the actions menu of next stage, file locking method is according to phase The instruction answered carries out locking operation, and using the finger print information as lock file checking information.It is described The lock operational control of going of file can lock the deterministic process of operation with analogy.
In specific implementation, carrying out locking to the file includes:The file is moved from original storage position Move to secure memory location, wherein, the secure memory location is different from the original storage position Other storage locations.Then the substitute files of the file are put into the original storage position, it is described to replace Valsartan part has and the file identical presentation mode.For example, substitute files have with original file Identical file name, file icon etc., enable a user to the substitute files being recognized as original File.
In the present embodiment, after finger print information is collected, it is possible to use the finger print information is to the file Locked.Wherein, after fingerprint image is collected, it can be confirmed by the fingerprint image to described The locking operation of file, if fingerprint image locks fingerprint image to be default, corresponding locking is called in control Application programming interface (Application Programming Interface, API) is locked to file Operation.After fingerprint binding key assignments is collected, key assignments is bound by the fingerprint and confirmed to the file Operation is locked, if fingerprint binding key assignments is default locking key assignments, control is corresponding to lock application program DLL carries out locking operation to file.
It is understood that the locking mode of the file can also be realized by way of file is replicated, Realized for example with the cp orders in (SuSE) Linux OS.Cp orders are used for one or more source documents Part or catalogue copy to the purpose file specified or catalogue, and single source file can be copied into by cp orders Under the specific file or a catalogue existed of one specified file name.Cp orders are also supported simultaneously Replicate multiple files.
It is understood that the locking mode for file can also be by way of changing file attributes To realize, for example, file owner or superuser are caused by the chmod orders in (SuSE) Linux OS File access mode could be changed.It can also be that directly file is encrypted using AES, may be used also To delete original document by rm orders, spurious document is put into original storage position, spurious document can be individual The inactive file of soft link or destruction.
Step S103, monitors the access to the file and operates.
In the present embodiment, the visit to the file is realized by the access operation monitored to the substitute files Ask the monitoring of operation.Lock after the completion of operation, the fileinfo after locking is recorded and preserved, institute One or more of can be included by stating fileinfo:File name, file path and file format.Also The fileinfo can be subjected to backup preservation, it is ensured that terminal of the information of lock file in storage file It will not be lost after hanging electricity.Realize that the access operation to all lock files is supervised based on the fileinfo Survey.
In specific implementation, after the access operation is monitored, point out to carry out fingerprint authentication.And gather reality Apply the checking finger print information of the user for accessing operation;Believe in the checking finger print information and the fingerprint When ceasing consistent, such as fingerprint image to be verified locks fingerprint image or fingerprint to be verified binding key assignments to be default During for default locking key assignments, it is allowed to the access operation of the user, otherwise refuse the access of the user Operation.Wherein, when being verified to fingerprint image, fingerprint authentication device can be called, is referred to to be verified Print image is judged with the default fingerprint image uniformity that locks, and exports judged result, to conduct interviews The judgement of operating right., can be with without calling fingerprint authentication device when being verified to fingerprint binding key assignments Corresponding key assignments systematic function is opened, the checking fingerprint correspondence of the user for accessing operation is implemented in generation Key assignments, and the judgement for the operating right that conducted interviews according to the key assignments of generation.
In specific implementation, after the access operation is monitored, Access Events can be based on by corresponding text Part information notifies upper layer application by readjustment, and upper layer application opens fingerprint authentication device, points out to carry out fingerprint Authentication.
In specific implementation, after the access operation of the user is allowed to, the user, which possesses, accesses file Temporary visit authority, current file authority is opened temporarily, and the file is moved back to from the secure memory location The original storage position is operated with the access for receiving the user.In the access operation cycle of the user After end, the operation cycle can be that display device screen bright screen is closed to dark screen, or File Open to file The time interval closed, the temporary visit authority of user is withdrawn, and the file is re-moved to the safety and deposited Storage space is put, and re-establishes the substitute files.When user access next time and operated, point out again Carry out fingerprint authentication.
It is understood that file access rights open after, can allow user and it is every other should With file can be accessed, until the temporary authority of file is closed.Current accessed application can also only be allowed Or user accesses, other application there is not permission to access.The life span of temporary authority is configurable to file Display device go out screen after terminate.
In specific implementation, if the display device of the file is locked, for example, can be, display device Screen is locked or screen secretly falls, and the temporary authority of file is closed, then when accessing operation next time, weight New prompting carries out fingerprint authentication.
The embodiment of the present invention is locked by using finger print information to the file so that implement to access behaviour The user of work is not when finger print information is met, it is impossible to carry out the access of file, special using the uniqueness of fingerprint Point, improves the security of file encryption;Meanwhile, it is preposition with regard to what is locked during file generated Step, improves the convenience of file locking.
Fig. 2 is another file locking method flow diagram of the embodiment of the present invention.
Fig. 2 is refer to, file locking method includes:Step S201, gathers the finger print information of finger.
Step S202, judges whether to lock, if it is, into step S203, otherwise into step S204.
In the present embodiment, the finger print information can include one or more of:Fingerprint image and fingerprint Bind key assignments.It is described that to lock the judgement that operation performs can in user's select file and eject context Menu, or selection is locked when entering the actions menu of next stage, file locking method is according to finger accordingly Order carry out locking operation, and using the finger print information as lock file checking information.
In specific implementation, it can judge whether to lock operation based on the finger print information collected.It is based on The fingerprint image, when fingerprint image is consistent with preset fingerprint image, then triggering locks operation, otherwise not Triggering locks operation.Or, key assignments is bound based on the fingerprint, when fingerprint binding preset fingerprint binding key Value, then triggering locks operation, and locking operation is not otherwise triggered.Wherein, the preset fingerprint image and pre- If binding key assignments can be configured by User Defined, for controlling to lock operation.
Step S203, secure memory location is moved to by file.
Step S204, no operation.
In the present embodiment, locking operation is carried out based on qualification result.Qualification result shows to wrap in finger print information When fingerprint image and fingerprint the binding key assignments contained is respectively the preset fingerprint image or default binding key assignments, File is moved to secure memory location, otherwise without any operation.
In specific implementation, carrying out locking to the file includes:The file is moved from original storage position Move to secure memory location, wherein, the secure memory location is different from the original storage position Other storage locations.Then the substitute files of the file are put into the original storage position, it is described to replace Valsartan part has and the file identical presentation mode.
Step S205, the substitute files of the file are put into original storage position.
In the present embodiment, the substitute files have and the file identical presentation mode.
In specific implementation, when file type is media file, e.g. picture or during video, due to Media application can produce index file, and user can point out unblock when accessing media application, if user cancels Unblock, unblock message can be pointed out repeatedly, and Consumer's Experience is bad.The file locking method of the embodiment of the present invention Substitute files, index file (thumbnail) the storage position of original document are put into using original storage position Put into substitute files index.
In specific implementation, substitute files and alternate index file can be pre-configured with before operation is locked, When user requires to lock, original document can be moved to security catalog, original document is by substitute files Substituted, the index file of original document is substituted by alternate index file.Substitute files are deleted during unblock Fall, the original document in security catalog is moved to original storage position.
Step S206, monitors the access to the substitute files and operates.
Step S207, judges whether to monitor to access operation, if it is, into step S208, otherwise after Continuous step S206.
Step S208, carries out fingerprint authentication.
In the present embodiment, the visit to the file is realized by the access operation monitored to the substitute files Ask the monitoring of operation.After the access operation is monitored, point out to carry out fingerprint authentication.And gather implementation The checking finger print information of the user for accessing operation, carries out it with locking the comparison of finger print information.
Step S208, judges whether to authenticate successfully, if it is, into step S210, otherwise into step S211。
Step S210, it is allowed to the access operation of the user.
Step S211, refuses the access operation of the user.
In the present embodiment, when the checking finger print information is consistent with the finger print information, it is allowed to the use The access operation at family, otherwise refuses the access operation of the user.
In the present embodiment, it is allowed to which user conducts interviews operation to file, file is in the state of temporary Authorization When, user can be checked and be edited to file.The synchronous monitoring of file content can be carried out, when with Family is edited after the original document of mandate, the content change of original document, carries out file content simultaneously operating, The file after editor is moved to secure memory location again.
In specific implementation, monitor after file modification operation, based on file modification event, carry out in file Hold simultaneously operating, original document can be set to dirty (dirty) state, and again the file after editor It is moved to secure memory location.
It is preferred that, user includes in the method that terminal is taken pictures and locked to picture:User utilizes When camera is taken pictures, user fingerprint image is gathered, and opens fingerprint authentication device, judges that fingerprint image is No is preset fingerprint image, if it is, carrying out locking operation to the picture for generation of taking pictures, can be passed through The corresponding application programming interface that locks is called to carry out locking operation to file.
It is preferred that, user includes in the method that terminal is taken pictures and locked to picture:Open camera The virtual key systematic function of application, when user is taken pictures using camera, gathers user fingerprint image, such as Really described fingerprint image binding virtual key, then whether after end of taking pictures, it is default to judge virtual key Key assignments is locked, the picture of generation carries out locking operation if it is, control is taken pictures, can be corresponding by calling Locking application programming interface to file carry out locking operation.
The embodiment of the embodiment of the present invention can refer to foregoing corresponding embodiment, and here is omitted.
Fig. 3 is a kind of structural representation of file locking device of the embodiment of the present invention.
Fig. 3 is refer to, file locking device includes:Collecting unit 301, locking unit 302 and monitoring are single Member 303.
Wherein, collecting unit 301, the finger print information suitable for gathering finger.
Unit 302 is locked, based on the locking operation to file, the file is entered using the finger print information Row is locked.
Monitoring unit 303, monitors the access to the file and operates.
In the present embodiment, finger print information is used by collecting unit 301, unit 302 is locked based on described Finger print information is locked to the file.In monitoring unit 303 after monitoring to access operation, checking When implementing the finger print information of the user of access operation, finger print information to be verified and inconsistent locking finger print information, The access of file can not be carried out, using the uniqueness feature of fingerprint, the security of file encryption is improved; Meanwhile, with regard to the previous step locked during file generated, improve the convenience of file locking.
Fig. 4 is the structural representation of another file locking device of the embodiment of the present invention.
Fig. 4 is refer to, file locking device includes:Collecting unit 401, locking unit 402, displacement are single Member 403, displacement unit 404, Tip element 405, authentication unit 406, recording unit 407 and backup Unit 408.
Wherein, collecting unit 401, the finger print information suitable for gathering finger.
In the present embodiment, the finger print information includes one or more of:Fingerprint image and fingerprint binding Key assignments
Unit 402 is locked, based on the locking operation to file, the file is entered using the finger print information Row is locked.
The unit 402 that locks binds locking operation of the key assignments confirmation to the file by the fingerprint
Shift unit 403, secure memory location is moved to by the file from original storage position, wherein, The secure memory location is other storage locations different from the original storage position;
In the present embodiment, the shift unit 403 is described after the access operation of the user is allowed to The access that file is moved back to the original storage position to receive the user from the secure memory location is grasped Make.The shift unit 403 is after the access operation cycle of the user terminates, and the file is moved again Move to the secure memory location, and re-establish the substitute files
Unit 404 is replaced, the substitute files of the file, the replacement are put into the original storage position File have with the file identical presentation mode, by monitor the access to the substitute files operate Realize the monitoring of the access operation to the file.
Tip element 405, suitable for after the access operation is monitored, pointing out to carry out fingerprint authentication.
In the present embodiment, after the access operation is allowed to, if the display device of the file is locked, Then when accessing operation next time, the Tip element 405 points out to carry out fingerprint authentication again.
Authentication unit 406, after the checking finger print information that the user for accessing operation is implemented in collection, in institute State checking finger print information it is consistent with the finger print information when, it is allowed to the access of the user is operated, and is otherwise refused The access operation of the exhausted user.
Recording unit 407, the fileinfo after locking is recorded and preserved.
Backup units 408, backup preservation is carried out by the fileinfo.
In the present embodiment, the fileinfo includes one or more of:File name, file path And file format.
In specific implementation, backup units 408 can realize power loss recovery lock file information, can also be Recover lock file information after being configured with the start of the terminal device of file locking device.Lock file unblock is awarded Quan Hou, lock file may be edited by, updates, change, can be again the text after editor Part is moved to secure memory location, and updates the backup fileinfo of backup units 408.
The embodiment of the embodiment of the present invention can refer to foregoing corresponding embodiment, and here is omitted.
The embodiment of the invention also discloses a kind of terminal, the terminal includes above-mentioned file locking device, institute It can be mobile phone, pad, iwatch and computer to state terminal.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment Rapid to can be by program to instruct the hardware of correlation to complete, the program can be stored in can with computer Read in storage medium, storage medium can include:ROM, RAM, disk or CD etc..
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art, Without departing from the spirit and scope of the present invention, it can make various changes or modifications, therefore the guarantor of the present invention Shield scope should be defined by claim limited range.

Claims (25)

1. a kind of file locking method, it is characterised in that including:
Gather the finger print information of finger;
Based on the locking operation to file, the file is locked using the finger print information;
The access to the file is monitored to operate.
2. file locking method according to claim 1, it is characterised in that locked to the file Including:
The file is moved to secure memory location from original storage position, wherein, the safety storage position It is other storage locations different from the original storage position to put;
Be put into the substitute files of the file in the original storage position, the substitute files have with it is described File identical presentation mode, is realized to the text by monitoring the operation of the access to the substitute files The monitoring of the access operation of part.
3. file locking method according to claim 2, it is characterised in that also include:Monitoring State after access operation, point out to carry out fingerprint authentication.
4. file locking method according to claim 3, it is characterised in that the fingerprint authentication includes: The checking finger print information of the user for accessing operation is implemented in collection;
When the checking finger print information is consistent with the finger print information, it is allowed to the access operation of the user, Otherwise the access operation of the user is refused.
5. file locking method according to claim 4, it is characterised in that the access operation of the user After being allowed to, the file is moved back to the original storage position to receive from the secure memory location State the access operation of user.
6. file locking method according to claim 5, it is characterised in that also include:In the user The access operation cycle terminate after, the file is re-moved to the secure memory location, and again Set up the substitute files.
7. file locking method according to claim 4, it is characterised in that the access operation is allowed to Afterwards, if the file display device be locked, next time access operation when, point out again into Row fingerprint is authenticated.
8. the file locking method according to any one of claim 1 to 7, it is characterised in that the fingerprint Information includes one or more of:Fingerprint image and fingerprint binding key assignments.
9. file locking method according to claim 8, it is characterised in that key is bound by the fingerprint Value confirms that the locking to the file is operated.
10. the file locking method according to any one of claim 1 to 7, it is characterised in that also include: Fileinfo after locking is recorded and preserved.
11. file locking method according to claim 10, it is characterised in that also include:By the file Information carries out backup preservation.
12. file locking method according to claim 10, it is characterised in that the fileinfo include with Lower one or more:File name, file path and file format.
13. a kind of file locking device, it is characterised in that including:
Collecting unit, the finger print information suitable for gathering finger;
Unit is locked, based on the locking operation to file, the file is added using the finger print information Lock;
Monitoring unit, monitors the access to the file and operates.
14. file locking device according to claim 13, it is characterised in that the locking unit includes:
Shift unit, secure memory location is moved to by the file from original storage position, wherein, it is described Secure memory location is other storage locations different from the original storage position;
Unit is replaced, the substitute files of the file, the substitute files are put into the original storage position With with the file identical presentation mode, it is real by monitoring the operation of the access to the substitute files The monitoring that now access to the file is operated.
15. file locking device according to claim 14, it is characterised in that also include:Tip element, Suitable for after the access operation is monitored, pointing out to carry out fingerprint authentication.
16. file locking device according to claim 15, it is characterised in that also include:Authentication unit, After the checking finger print information that the user for accessing operation is implemented in collection, in the checking finger print information When consistent with the finger print information, it is allowed to the access operation of the user, otherwise refuse the user's Access operation.
17. file locking device according to claim 16, it is characterised in that the shift unit is described After the access operation of user is allowed to, the file is moved back to described original deposit from the secure memory location Storage space is put to be operated with the access for receiving the user.
18. file locking device according to claim 17, it is characterised in that also include:The displacement is single Member is after the access operation cycle of the user terminates, and the file is re-moved to the safety storage Position, and re-establish the substitute files.
19. file locking device according to claim 16, it is characterised in that the access operation is allowed to Afterwards, if the display device of the file is locked, when accessing operation next time, the prompting list Again prompting carries out fingerprint authentication to member.
20. the file locking device according to any one of claim 13 to 19, it is characterised in that the finger Line information includes one or more of:Fingerprint image and fingerprint binding key assignments.
21. file locking device according to claim 20, it is characterised in that the locking unit passes through institute State fingerprint binding key assignments and confirm that the locking to the file is operated.
22. the file locking device according to any one of claim 13 to 19, it is characterised in that also include: Recording unit, the fileinfo after locking is recorded and preserved.
23. file locking device according to claim 22, it is characterised in that also include:Backup units, The fileinfo is subjected to backup preservation.
24. file locking device according to claim 22, it is characterised in that the fileinfo include with Lower one or more:File name, file path and file format.
25. a kind of terminal, it is characterised in that including the file locking as described in any one of claim 13 to 24 Device.
CN201610010362.8A 2016-01-07 2016-01-07 file locking method, device and terminal Pending CN106951797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610010362.8A CN106951797A (en) 2016-01-07 2016-01-07 file locking method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610010362.8A CN106951797A (en) 2016-01-07 2016-01-07 file locking method, device and terminal

Publications (1)

Publication Number Publication Date
CN106951797A true CN106951797A (en) 2017-07-14

Family

ID=59465654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610010362.8A Pending CN106951797A (en) 2016-01-07 2016-01-07 file locking method, device and terminal

Country Status (1)

Country Link
CN (1) CN106951797A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111814166A (en) * 2020-07-10 2020-10-23 上海淇毓信息科技有限公司 Data encryption method and device and electronic equipment
CN112732660A (en) * 2021-01-05 2021-04-30 中国工商银行股份有限公司 Intervention type file transmission method, device and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459723A (en) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 Secret keeping processing method for mobile phone information
CN102789555A (en) * 2011-05-17 2012-11-21 腾讯科技(深圳)有限公司 Method and system for safely moving file
CN103620606A (en) * 2013-06-20 2014-03-05 华为技术有限公司 Storage detecting apparatus, system, and method
CN104102883A (en) * 2013-04-09 2014-10-15 中兴通讯股份有限公司 Display method and device
CN104112091A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 File locking method and device
CN105205375A (en) * 2015-09-22 2015-12-30 电子科技大学 Privacy information protection software based on palmprint recognition and novel palmprint image preprocessing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459723A (en) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 Secret keeping processing method for mobile phone information
CN102789555A (en) * 2011-05-17 2012-11-21 腾讯科技(深圳)有限公司 Method and system for safely moving file
CN104102883A (en) * 2013-04-09 2014-10-15 中兴通讯股份有限公司 Display method and device
CN103620606A (en) * 2013-06-20 2014-03-05 华为技术有限公司 Storage detecting apparatus, system, and method
CN104112091A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 File locking method and device
CN105205375A (en) * 2015-09-22 2015-12-30 电子科技大学 Privacy information protection software based on palmprint recognition and novel palmprint image preprocessing method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111814166A (en) * 2020-07-10 2020-10-23 上海淇毓信息科技有限公司 Data encryption method and device and electronic equipment
CN111814166B (en) * 2020-07-10 2023-09-12 上海淇毓信息科技有限公司 Data encryption method and device and electronic equipment
CN112732660A (en) * 2021-01-05 2021-04-30 中国工商银行股份有限公司 Intervention type file transmission method, device and system
CN112732660B (en) * 2021-01-05 2024-02-27 中国工商银行股份有限公司 Intervening file transmission method, device and system

Similar Documents

Publication Publication Date Title
CN104662870B (en) Data safety management system
KR20080095866A (en) Computer session management device and system
JP6785967B2 (en) Methods and systems to block phishing or ransomware attacks
CN102254124A (en) Information security protecting system and method of mobile terminal
CN106484570A (en) A kind of backpu protecting method and system extorting software document data for defence
CN103745162A (en) Secure network file storage system
JP7489672B2 (en) Method and system for blocking ransomware or phishing attacks
CN106548070A (en) A kind of method and system that blackmailer's virus is defendd in stand-by time
WO2007091652A1 (en) Tally information management method and management device
KR100975133B1 (en) Security management system for portable memory devices and security management method using the same
JP4044126B1 (en) Information leakage prevention device, information leakage prevention program, information leakage prevention recording medium, and information leakage prevention system
CN102708335A (en) Confidential file protection method
CN109214204A (en) Data processing method and storage equipment
CN103425938B (en) The folder encryption method of one kind Unix operating system and device
CN106951797A (en) file locking method, device and terminal
JP5429906B2 (en) Mobile terminal, program, and control method.
JP5631251B2 (en) Information leakage prevention method
US20080253559A1 (en) Data Security Method, System and Storage Medium for Preventing a Desktop Search Tool from Exposing Encrypted Data
KR100331056B1 (en) Method for implementing a cyber safe
JP2021174432A (en) Electronic data management method, electronic data management device, and program and storage medium for the same
KR20170038340A (en) Data leakage prevention apparatus and method thereof
JP2007012022A (en) Security program and security system
JP2004220400A (en) File protecting method and file protection program
CN109784077A (en) File security means of defence
CN103530532A (en) File encryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170714

RJ01 Rejection of invention patent application after publication