CN107590026A - A kind of data back up method and device - Google Patents
A kind of data back up method and device Download PDFInfo
- Publication number
- CN107590026A CN107590026A CN201710732075.2A CN201710732075A CN107590026A CN 107590026 A CN107590026 A CN 107590026A CN 201710732075 A CN201710732075 A CN 201710732075A CN 107590026 A CN107590026 A CN 107590026A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- checking
- backup
- finger print
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a kind of data back up method, including:Obtain Backup Data;Obtain the checking finger print information that user is used to be verified;The checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information;The backup file after encryption is preserved, the backup file includes the checking finger print information and the Backup Data.Using this method, the safety of Backup Data can be ensured when not needing user to remember password.
Description
Technical field
The present invention relates to computer technology, and in particular to a kind of data back up method and device.
Background technology
With the rapid development of smart mobile phone, increasing user begins to use smart mobile phone.Smart mobile phone, refer to
As PC, there is independent operating system, independent running space, can voluntarily be installed by user software, game,
The program that the third party service providers such as navigation provide, and can realize that wireless network accesses type of cell phone by mobile communication network
General name.
Further, due to the rapid development of hardware and software technology, the speed that smart mobile phone updates is also increasingly
It hurry up, substantially can all there is technical renewal every month, and the renewal of large platform is also substantially 1 year generation.Such as with height
It is logical, Huawei and the cell phone processor manufacturer that Lian Fake is representative, all it is the one new platform of issue in 1 year;Such as with Google,
Apple is the mobile phone operating system provider of representative, and issues an operating system version in 1 year;With Huawei, apple, Samsung
For the mobile-phone manufacturers of representative also new mobile phone can be issued per year according to the renewal of processor and operating system.
In order to experience new hardware platform or new operating system, or the mobile phone that experience is new, many user's meetings as soon as possible
Go with regard to the very first time to renew machine when new mobile phone issue, and be exactly the problem of one that the replacing of mobile phone is brought is critically important
The backup and migration of data.
Existing many softwares are all very simply to be protected using password when carrying out data backup, are protected using password
Although shield can be protected to the data of backup to a certain extent, there is a deficiency that can not be reconciled using password,
I.e. safe password is difficult to remember, and it is not safe enough to hold catchy password, and this just allows user to need in safety and easy note
A balance is firmly found between both.
The content of the invention
The embodiments of the invention provide a kind of data back up method and device, can not need user remember password when
Wait the safety for ensureing Backup Data.
The purpose of the embodiment of the present invention is achieved through the following technical solutions:
One embodiment of the invention provides a kind of data back up method, including:
Obtain Backup Data;
Obtain the checking finger print information that user is used to be verified;
The checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information;
The backup file after encryption is preserved, the backup file includes the checking finger print information and the Backup Data.
Optionally, after the backup file preserved after encrypting, in addition to:
The backup file acquisition request of user's input is received, described obtain asks to include decrypting finger print information;
If the decryption finger print information is identical with the cryptographic fingerprint information, the backup file is decrypted;
If the decryption finger print information and the cryptographic fingerprint information differ, the backup file is not solved
It is close.
Optionally, it is described the backup file is decrypted including:
Decrypt the checking fingerprint;
Obtain the fingerprint to be verified of user's input;
If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;
If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
Optionally, after the backup file being decrypted, in addition to:
Obtain the fingerprint to be verified of user's input;
If the fingerprint to be verified is identical with the checking fingerprint, the backup number that the backup file obtains is decrypted in output
According to;
If the fingerprint to be verified differs with the checking fingerprint, delete and decrypt the backup that the backup file obtains
Data and checking fingerprint.
Optionally, the checking fingerprint and the cryptographic fingerprint differ.
Another embodiment of the present invention provides a kind of data backup device, including:
Acquiring unit, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified;
Ciphering unit, for being added to the checking finger print information and the Backup Data using cryptographic fingerprint information
It is close;
Storage unit, for preserve encrypt after backup file, the backup file include it is described checking finger print information with
The Backup Data.
Optionally, in addition to:
Receiving unit, for receiving the backup file acquisition request of user's input, described obtain asks to include decrypting fingerprint
Information;
Judging unit, for judging the decryption finger print information and the cryptographic fingerprint information;
Decryption unit, for judging that the decryption finger print information is identical with the cryptographic fingerprint information in the judging unit
When, the backup file is decrypted;For judging that the decryption finger print information and the encryption refer in the judging unit
When line information differs, the backup file is not decrypted.
Optionally, the decryption unit is specifically used for when the backup file is decrypted:
Decrypt the checking fingerprint;
Obtain the fingerprint to be verified of user's input;
If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;
If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
Optionally, the acquiring unit, it is additionally operable to obtain the fingerprint to be verified of user's input;
The judging unit, it is additionally operable to judge the fingerprint to be verified and the checking fingerprint;
The decoding unit, for judging that the fingerprint to be verified is identical with the checking fingerprint in the judging unit
When, the Backup Data that the backup file obtains is decrypted in output;The judging unit judge the fingerprint to be verified with it is described
When checking fingerprint differs, delete and decrypt Backup Data and checking fingerprint that the backup file obtains.
Optionally, the checking fingerprint and the cryptographic fingerprint differ.
It is can be seen that from above technical scheme provided in an embodiment of the present invention because the embodiment of the present invention is in Backup Data
Checking finger print information and Backup Data can be encrypted by cryptographic fingerprint information, so that the Backup Data after encryption exists
The double verification by verifying fingerprint and cryptographic fingerprint is needed during decryption, the Backup Data of protection user that can be very safe,
Simultaneously because being backed up using finger print information to Backup Data, user need not remember any password, so as to both sides
Just the use and can of user enough safely protects user data.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill of field, without having to pay creative labor, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the flow chart for the roaming network system of selection that one embodiment of the invention provides;
Fig. 2 is the flow chart for the roaming network system of selection that another embodiment of the present invention provides;
Fig. 3 is the structure chart for the terminal that one embodiment of the invention provides;
Fig. 4 is the structure chart for the terminal that one embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Roaming network system of selection provided in an embodiment of the present invention is first introduced, Fig. 1 describes one embodiment of the invention and carried
The flow of the data back up method of confession.As shown in figure 1, the embodiment includes:
101st, Backup Data is obtained.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example
Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included
The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with
According to the data for needing therefrom to select oneself needs to back up of oneself.
102nd, the checking finger print information that user is used to be verified is obtained.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses
After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit
Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit
Collection.
103rd, the checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen
Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition
Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm
The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
Wherein, preset AES can be symmetry encryption algorithm or unsymmetrical tridiagonal matrix algorithm.For example, symmetrical expression
Encryption is exactly encryption and decryption uses same key, and normally referred to as " this encryption technologies of Session Key " are in quilt now
It is widely used, as des encryption standard is exactly a kind of typical " symmetrical expression " enciphered method used by U.S. government, it
Session Key length is 56bits.Unsymmetrical tridiagonal matrix is not same key used in exactly encrypting and decrypt, generally
There are two keys, be referred to as " public key " and " private key ", both must match use, otherwise can not open encryption file.Here
" public key " refer to what can externally be announced, " private key " then can not, can only be known by one people of holder.Its superiority just exists
Here, because the encryption method of symmetrical expression is difficult to not tell other side key if in transmission over networks encryption file, no
How pipe is likely to not intercepted.And the encryption method of asymmetric has two keys, and " public key " therein
Being can be disclosed, is not also just afraid of others and knows, if when addressee decrypts with the private key of oneself can, thus well
Avoid the transmission security problem of key.
Specifically, DES algorithms (Data Encryption Standard) (symmetry algorithm, data encryption mark can be used
Standard, speed, the occasion suitable for encrypting mass data);Or 3DES (Triple DES) algorithm (is pair based on DES
Claim algorithm, Tertiary infilling is carried out according to three different keys to a block number, intensity is higher);Or RC2 and RC4 algorithms are (symmetrical
Algorithm, mass data is encrypted with variable length key, faster than DES);Or IDEA (International Data
EncryptionAlgorithm) algorithm (IDEA, very strong security being provided using 128 keys);
RSA Algorithm (is invented by RSA companies, is the public key algorithm of a support variable length key, it is necessary to the length of the blocks of files of encryption
And variable, asymmetric arithmetic);Or Hash (Hash) algorithm scheduling algorithm checking finger print information and Backup Data are added
It is close.
The embodiment of the present invention is not defined to specific AES, using any AES all without influence
The realization of the embodiment of the present invention.But, it is not very high AES to recommend in actual applications to system resource requirement,
So as to improve enciphering rate.
Wherein, in order to improve security, it can prompt user that input is with verifying different another of fingerprint on a display screen
Fingerprint is as cryptographic fingerprint.In one embodiment, although prompting user inputs another fingerprint different from checking fingerprint
As cryptographic fingerprint, even if but user used with checking fingerprint identical fingerprint as cryptographic fingerprint, system also continues to make
It is encrypted with the fingerprint, so as to reduce the memory cost of user;In another embodiment, if user have input and test
Card fingerprint identical fingerprint can prompt user to input another fingerprint as cryptographic fingerprint, system, so as to use with testing
Backup Data is encrypted card fingerprint identical fingerprint, further improves security.
104th, the backup file after encryption is preserved, the backup file includes the checking finger print information and the backup number
According to.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone
It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish
The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any
Place obtains backup file.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data
Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption
Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data
Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
Fig. 2 describes the flow of the method for the data backup of another embodiment of the present invention offer, including:
201st, Backup Data is obtained.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example
Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included
The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with
According to the data for needing therefrom to select oneself needs to back up of oneself.
202nd, the checking finger print information that user is used to be verified is obtained.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses
After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit
Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit
Collection.
203rd, the checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen
Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition
Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm
The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
204th, the backup file after encryption is preserved, the backup file includes the checking finger print information and the backup number
According to.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone
It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish
The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any
Place obtains backup file.
205th, the backup file acquisition request of user's input is received, described obtain asks to include decrypting finger print information.
When user is switched to new intelligent terminal, file can be decrypted after backup file is obtained, so as to obtain
Backup Data, by associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation,
The data of application program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc. information
It is transferred on new intelligent terminal, without carrying out too many manual setting.
Specifically, when user needs to decrypt backup file, it can on a display screen show and allow user to input decryption fingerprint
Prompt message, after user sees the prompting, it is possible to will decryption fingerprint corresponding to finger be put into Fingerprint Identification Unit position, by referring to
Line identifier gathers fingerprint so as to obtain decryption finger print information.Wherein it is possible to it is that encryption is standby further to prompt user to decrypt fingerprint
The fingerprint used during part data, in order to which user can quickly determine to be decrypted with which root finger.
206th, judge whether the decryption finger print information and the cryptographic fingerprint information are identical;If the decryption fingerprint letter
Breath is identical with the cryptographic fingerprint information, into step 207;If the decryption finger print information and the cryptographic fingerprint information are not
It is identical, into step 208.
Specifically, it can use and be converted into character string by finger print information is decrypted with identical algorithm during encryption, then again will
The character string decodes as clear crytpographic key to backup file;Can be into if character string is identical with character string during encryption
Work(is decrypted, whereas if character string is with character string during encryption, differ then can not successful decryption.
207th, the backup file is decrypted.
In one embodiment of the invention, just carry out verifying the checking of fingerprint while decoding backup file,
Now, the process backup file being decrypted can include:
Backup file is decrypted and obtains the checking finger print information;Obtain the fingerprint to be verified of user's input;If
The fingerprint to be verified is identical with the checking fingerprint, decrypts the Backup Data;If the fingerprint to be verified is tested with described
Card fingerprint differs, the non-decrypting Backup Data.
In another embodiment of the present invention, carry out verifying the checking of fingerprint after backup file being decrypted again, this
When method provided in an embodiment of the present invention can also include:Obtain the fingerprint to be verified of user's input;If the finger to be verified
Line is identical with the checking fingerprint, and the Backup Data that the backup file obtains is decrypted in output;If the fingerprint to be verified with
The checking fingerprint differs, and deletes and decrypts Backup Data and checking fingerprint that the backup file obtains.
Specifically, when needing to verify checking fingerprint, user can be prompted to carry out checking fingerprint on a display screen
Checking.After user will verify that fingerprint is put into Fingerprint Identification Unit, fingerprint to be verified can be collected;By referring to obtaining checking
Identical algorithm, which to fingerprint to be verified calculate, during line information obtains finger print information to be verified, finger print information to be verified it is specific
The form of expression can be character string, and character string corresponding to fingerprint to be verified is entered with preserving character string corresponding with checking fingerprint
Row compares, when character string corresponding to fingerprint to be verified is with preserving identical with verifying character string corresponding to fingerprint, then it represents that test
Demonstrate,prove successfully;Conversely, when character string corresponding to fingerprint to be verified differs with preserving character string corresponding with checking fingerprint, then
Represent that checking is unsuccessful.
208th, the backup file is not decrypted.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data
Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption
Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data
Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
Fig. 3 describes the structure of the data backup device of one embodiment of the invention offer, including:
Acquiring unit 301, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example
Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included
The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with
According to the data for needing therefrom to select oneself needs to back up of oneself.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses
After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit
Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit
Collection.
Ciphering unit 302, for being carried out to the checking finger print information and the Backup Data using cryptographic fingerprint information
Encryption.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen
Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition
Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm
The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
Wherein, preset AES can be symmetry encryption algorithm or unsymmetrical tridiagonal matrix algorithm.For example, symmetrical expression
Encryption is exactly encryption and decryption uses same key, and normally referred to as " this encryption technologies of Session Key " are in quilt now
It is widely used, as des encryption standard is exactly a kind of typical " symmetrical expression " enciphered method used by U.S. government, it
Session Key length is 56bits.Unsymmetrical tridiagonal matrix is not same key used in exactly encrypting and decrypt, generally
There are two keys, be referred to as " public key " and " private key ", both must match use, otherwise can not open encryption file.Here
" public key " refer to what can externally be announced, " private key " then can not, can only be known by one people of holder.Its superiority just exists
Here, because the encryption method of symmetrical expression is difficult to not tell other side key if in transmission over networks encryption file, no
How pipe is likely to not intercepted.And the encryption method of asymmetric has two keys, and " public key " therein
Being can be disclosed, is not also just afraid of others and knows, if when addressee decrypts with the private key of oneself can, thus well
Avoid the transmission security problem of key.
Specifically, DES algorithms (Data Encryption Standard) (symmetry algorithm, data encryption mark can be used
Standard, speed, the occasion suitable for encrypting mass data);Or 3DES (Triple DES) algorithm (is pair based on DES
Claim algorithm, Tertiary infilling is carried out according to three different keys to a block number, intensity is higher);Or RC2 and RC4 algorithms are (symmetrical
Algorithm, mass data is encrypted with variable length key, faster than DES);Or IDEA (International Data
EncryptionAlgorithm) algorithm (IDEA, very strong security being provided using 128 keys);
RSA Algorithm (is invented by RSA companies, is the public key algorithm of a support variable length key, it is necessary to the length of the blocks of files of encryption
And variable, asymmetric arithmetic);Or Hash (Hash) algorithm scheduling algorithm checking finger print information and Backup Data are added
It is close.
The embodiment of the present invention is not defined to specific AES, using any AES all without influence
The realization of the embodiment of the present invention.But, it is not very high AES to recommend in actual applications to system resource requirement,
So as to improve enciphering rate.
Wherein, in order to improve security, it can prompt user that input is with verifying different another of fingerprint on a display screen
Fingerprint is as cryptographic fingerprint.In one embodiment, although prompting user inputs another fingerprint different from checking fingerprint
As cryptographic fingerprint, even if but user used with checking fingerprint identical fingerprint as cryptographic fingerprint, system also continues to make
It is encrypted with the fingerprint, so as to reduce the memory cost of user;In another embodiment, if user have input and test
Card fingerprint identical fingerprint can prompt user to input another fingerprint as cryptographic fingerprint, system, so as to use with testing
Backup Data is encrypted card fingerprint identical fingerprint, further improves security.
Storage unit 303, for preserving the backup file after encrypting, the backup file includes the checking finger print information
With the Backup Data.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone
It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish
The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any
Place obtains backup file.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data
Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption
Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data
Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
Fig. 4 describes the structure of the data backup device of another embodiment of the present invention offer, including:
Acquiring unit 301, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example
Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included
The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with
According to the data for needing therefrom to select oneself needs to back up of oneself.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses
After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit
Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit
Collection.
Ciphering unit 302, for being carried out to the checking finger print information and the Backup Data using cryptographic fingerprint information
Encryption.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen
Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition
Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm
The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
The embodiment of the present invention is not defined to specific AES, using any AES all without influence
The realization of the embodiment of the present invention.But, it is not very high AES to recommend in actual applications to system resource requirement,
So as to improve enciphering rate.
Wherein, in order to improve security, it can prompt user that input is with verifying different another of fingerprint on a display screen
Fingerprint is as cryptographic fingerprint.In one embodiment, although prompting user inputs another fingerprint different from checking fingerprint
As cryptographic fingerprint, even if but user used with checking fingerprint identical fingerprint as cryptographic fingerprint, system also continues to make
It is encrypted with the fingerprint, so as to reduce the memory cost of user;In another embodiment, if user have input and test
Card fingerprint identical fingerprint can prompt user to input another fingerprint as cryptographic fingerprint, system, so as to use with testing
Backup Data is encrypted card fingerprint identical fingerprint, further improves security.
Storage unit 303, for preserving the backup file after encrypting, the backup file includes the checking finger print information
With the Backup Data.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone
It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish
The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any
Place obtains backup file.
Receiving unit 304, for receiving the backup file acquisition request of user's input, the acquisition request includes decryption and referred to
Line information.
When user is switched to new intelligent terminal, file can be decrypted after backup file is obtained, so as to obtain
Backup Data, by associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation,
The data of application program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc. information
It is transferred on new intelligent terminal, without carrying out too many manual setting.
Specifically, when user needs to decrypt backup file, it can on a display screen show and allow user to input decryption fingerprint
Prompt message, after user sees the prompting, it is possible to will decryption fingerprint corresponding to finger be put into Fingerprint Identification Unit position, by referring to
Line identifier gathers fingerprint so as to obtain decryption finger print information.Wherein it is possible to it is that encryption is standby further to prompt user to decrypt fingerprint
The fingerprint used during part data, in order to which user can quickly determine to be decrypted with which root finger.
Judging unit 305, for carrying out judgement to the decryption finger print information and the cryptographic fingerprint information
Specifically, it can use and be converted into character string by finger print information is decrypted with identical algorithm during encryption, then again will
The character string decodes as clear crytpographic key to backup file;Can be into if character string is identical with character string during encryption
Work(is decrypted, whereas if character string is with character string during encryption, differ then can not successful decryption.
Decryption unit 306, for judging the decryption finger print information and cryptographic fingerprint letter in the judging unit 305
Simultaneously, the backup file is decrypted for manner of breathing;The judging unit 305 judge it is described decryption finger print information and it is described plus
When close finger print information differs, the backup file is not decrypted.
In one embodiment of the invention, just carry out verifying the checking of fingerprint while decoding backup file,
Now, the decryption unit 306 is specifically used for when the backup file is decrypted:Decrypt the checking fingerprint;Obtain
The fingerprint to be verified of user's input;If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;Such as
Fingerprint to be verified described in fruit differs with the checking fingerprint, the non-decrypting Backup Data.
In another embodiment of the present invention, carry out verifying the checking of fingerprint after backup file being decrypted again, this
When, the acquiring unit 301, it is additionally operable to obtain the fingerprint to be verified that user inputs;The judging unit 305, is additionally operable to institute
State fingerprint to be verified and the checking fingerprint is judged;The decoding unit 306, described in judging in the judging unit
When fingerprint to be verified is identical with the checking fingerprint, the Backup Data that the backup file obtains is decrypted in output;In the judgement
When fingerprint to be verified described in unit judges differs with the checking fingerprint, delete and decrypt the backup number that the backup file obtains
According to checking fingerprint.
Specifically, when needing to verify checking fingerprint, user can be prompted to carry out checking fingerprint on a display screen
Checking.After user will verify that fingerprint is put into Fingerprint Identification Unit, fingerprint to be verified can be collected;By referring to obtaining checking
Identical algorithm, which to fingerprint to be verified calculate, during line information obtains finger print information to be verified, finger print information to be verified it is specific
The form of expression can be character string, and character string corresponding to fingerprint to be verified is entered with preserving character string corresponding with checking fingerprint
Row compares, when character string corresponding to fingerprint to be verified is with preserving identical with verifying character string corresponding to fingerprint, then it represents that test
Demonstrate,prove successfully;Conversely, when character string corresponding to fingerprint to be verified differs with preserving character string corresponding with checking fingerprint, then
Represent that checking is unsuccessful.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data
Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption
Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data
Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
The contents such as the information exchange between each module, implementation procedure in said apparatus and system, due to side of the present invention
Method embodiment is based on same design, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
The hardware of correlation is instructed to complete by computer program, above-mentioned program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, above-mentioned storage medium can be magnetic
Dish, CD, read-only memory (ROM:Read-Only Memory) or random access memory (RAM:RandomAccess
Memory) etc..
Specific case used herein is set forth to the principle and embodiment of the present invention, and above example is said
It is bright to be only intended to help the method and its thought for understanding the present invention;Meanwhile for those of ordinary skill in the art, according to this hair
Bright thought, there will be changes in specific embodiments and applications, in summary, this specification content should not manage
Solve as limitation of the present invention.
Claims (10)
- A kind of 1. data back up method, it is characterised in that including:Obtain Backup Data;Obtain the checking finger print information that user is used to be verified;The checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information;The backup file after encryption is preserved, the backup file includes the checking finger print information and the Backup Data.
- 2. the method as described in claim 1, it is characterised in that after the backup file preserved after encrypting, in addition to:The backup file acquisition request of user's input is received, described obtain asks to include decrypting finger print information;If the decryption finger print information is identical with the cryptographic fingerprint information, the backup file is decrypted;If the decryption finger print information and the cryptographic fingerprint information differ, the backup file is not decrypted.
- 3. method as claimed in claim 2, it is characterised in that it is described the backup file is decrypted including:Decrypt the checking fingerprint;Obtain the fingerprint to be verified of user's input;If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
- 4. method as claimed in claim 2, it is characterised in that after the backup file is decrypted, in addition to:Obtain the fingerprint to be verified of user's input;If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data that the backup file obtains is decrypted in output;If the fingerprint to be verified differs with the checking fingerprint, delete and decrypt the Backup Data that the backup file obtains With checking fingerprint.
- 5. the method as described in Claims 1-4 is any, it is characterised in that described to verify fingerprint and the cryptographic fingerprint not phase Together.
- A kind of 6. data backup device, it is characterised in that including:Acquiring unit, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified;Ciphering unit, for the checking finger print information and the Backup Data to be encrypted using cryptographic fingerprint information;Storage unit, for preserving the backup file after encrypting, the backup file includes described verifying finger print information and described Backup Data.
- 7. device as claimed in claim 6, it is characterised in that also include:Receiving unit, for receiving the backup file acquisition request of user's input, described obtain asks to include decrypting finger print information;Judging unit, for judging the decryption finger print information and the cryptographic fingerprint information;Decryption unit, for the judging unit judge it is described decryption finger print information it is identical with the cryptographic fingerprint information when, The backup file is decrypted;For judging the decryption finger print information and cryptographic fingerprint letter in the judging unit When breath differs, the backup file is not decrypted.
- 8. device as claimed in claim 7, it is characterised in that the decryption unit is when the backup file is decrypted It is specifically used for:Decrypt the checking fingerprint;Obtain the fingerprint to be verified of user's input;If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
- 9. device as claimed in claim 7, it is characterised in that the acquiring unit, be additionally operable to obtain the to be tested of user's input Demonstrate,prove fingerprint;The judging unit, it is additionally operable to judge the fingerprint to be verified and the checking fingerprint;The decoding unit, for the judging unit judge the fingerprint to be verified with it is described checking fingerprint it is identical when, it is defeated Go out to decrypt the Backup Data that the backup file obtains;Judge that the fingerprint to be verified refers to the checking in the judging unit When line differs, delete and decrypt Backup Data and checking fingerprint that the backup file obtains.
- 10. the device as described in claim 6 to 9 is any, it is characterised in that described to verify fingerprint and the cryptographic fingerprint not phase Together.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710732075.2A CN107590026A (en) | 2017-08-23 | 2017-08-23 | A kind of data back up method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710732075.2A CN107590026A (en) | 2017-08-23 | 2017-08-23 | A kind of data back up method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107590026A true CN107590026A (en) | 2018-01-16 |
Family
ID=61042907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710732075.2A Pending CN107590026A (en) | 2017-08-23 | 2017-08-23 | A kind of data back up method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107590026A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108595291A (en) * | 2018-04-01 | 2018-09-28 | 陈丽霞 | A kind of medical data standby system |
WO2019036972A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Data backup method and device |
WO2019036967A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Device having data backup function and product related thereto |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530201A (en) * | 2013-07-17 | 2014-01-22 | 华中科技大学 | Safety data repetition removing method and system applicable to backup system |
CN103607402A (en) * | 2013-11-26 | 2014-02-26 | 广州博冠信息科技有限公司 | Online game data encryption and decryption method and equipment |
CN104751154A (en) * | 2014-07-25 | 2015-07-01 | 北京智膜科技有限公司 | Fingerprint safe encryption method based on intelligent mobile information device |
CN106972925A (en) * | 2017-03-29 | 2017-07-21 | 李维波 | A kind of information ciphering method and its device |
CN107038365A (en) * | 2017-04-20 | 2017-08-11 | 滁州职业技术学院 | The method and mobile terminal of a kind of file encryption |
-
2017
- 2017-08-23 CN CN201710732075.2A patent/CN107590026A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530201A (en) * | 2013-07-17 | 2014-01-22 | 华中科技大学 | Safety data repetition removing method and system applicable to backup system |
CN103607402A (en) * | 2013-11-26 | 2014-02-26 | 广州博冠信息科技有限公司 | Online game data encryption and decryption method and equipment |
CN104751154A (en) * | 2014-07-25 | 2015-07-01 | 北京智膜科技有限公司 | Fingerprint safe encryption method based on intelligent mobile information device |
CN106972925A (en) * | 2017-03-29 | 2017-07-21 | 李维波 | A kind of information ciphering method and its device |
CN107038365A (en) * | 2017-04-20 | 2017-08-11 | 滁州职业技术学院 | The method and mobile terminal of a kind of file encryption |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019036972A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Data backup method and device |
WO2019036967A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Device having data backup function and product related thereto |
CN108595291A (en) * | 2018-04-01 | 2018-09-28 | 陈丽霞 | A kind of medical data standby system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9448949B2 (en) | Mobile data vault | |
CN104662870B (en) | Data safety management system | |
CN101272237B (en) | Method and system for automatically generating and filling login information | |
US8990565B2 (en) | Method and system for automatically logging in a client | |
WO2015180691A1 (en) | Key agreement method and device for verification information | |
CN103974250B (en) | Collocation method and equipment | |
WO2017202025A1 (en) | Terminal file encryption method, terminal file decryption method, and terminal | |
CN108763917B (en) | Data encryption and decryption method and device | |
JP2008527905A (en) | Security code generation method, method using security code generation method, and programmable apparatus for security code generation method | |
JPH0936851A (en) | System and method of integrating private key operation from smart card in a transmissive way with host base cryptograph service | |
WO2021114614A1 (en) | Application program secure startup method and apparatus, computer device, and storage medium | |
CN107196907A (en) | A kind of guard method of Android SO files and device | |
WO2015180689A1 (en) | Method and apparatus for acquiring verification information | |
EP3511853B1 (en) | Security authentication method, integrated circuit and system | |
CN104318286B (en) | Management method, management system and the terminal of NFC label data | |
CN105975867B (en) | A kind of data processing method | |
CN111143474B (en) | One-key binding changing method for mobile phone number based on block chain technology | |
CN110377856A (en) | Netpage registration method, system, equipment and computer storage medium | |
Hufstetler et al. | Nfc unlock: Secure two-factor computer authentication using nfc | |
WO2019120038A1 (en) | Encrypted storage of data | |
CN107590026A (en) | A kind of data back up method and device | |
CN107704743A (en) | Device and Related product with data backup function | |
WO2017050152A1 (en) | Password security system adopted by mobile apparatus and secure password entering method thereof | |
CN107666469A (en) | The processing method and terminal of identifying code short message | |
CN108804935A (en) | A kind of safety encryption storage system and method based on TrustZone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180116 |