CN107590026A - A kind of data back up method and device - Google Patents

A kind of data back up method and device Download PDF

Info

Publication number
CN107590026A
CN107590026A CN201710732075.2A CN201710732075A CN107590026A CN 107590026 A CN107590026 A CN 107590026A CN 201710732075 A CN201710732075 A CN 201710732075A CN 107590026 A CN107590026 A CN 107590026A
Authority
CN
China
Prior art keywords
fingerprint
checking
backup
finger print
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710732075.2A
Other languages
Chinese (zh)
Inventor
叶胡星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen One Electronics Co Ltd
Original Assignee
Shenzhen One Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen One Electronics Co Ltd filed Critical Shenzhen One Electronics Co Ltd
Priority to CN201710732075.2A priority Critical patent/CN107590026A/en
Publication of CN107590026A publication Critical patent/CN107590026A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of data back up method, including:Obtain Backup Data;Obtain the checking finger print information that user is used to be verified;The checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information;The backup file after encryption is preserved, the backup file includes the checking finger print information and the Backup Data.Using this method, the safety of Backup Data can be ensured when not needing user to remember password.

Description

A kind of data back up method and device
Technical field
The present invention relates to computer technology, and in particular to a kind of data back up method and device.
Background technology
With the rapid development of smart mobile phone, increasing user begins to use smart mobile phone.Smart mobile phone, refer to As PC, there is independent operating system, independent running space, can voluntarily be installed by user software, game, The program that the third party service providers such as navigation provide, and can realize that wireless network accesses type of cell phone by mobile communication network General name.
Further, due to the rapid development of hardware and software technology, the speed that smart mobile phone updates is also increasingly It hurry up, substantially can all there is technical renewal every month, and the renewal of large platform is also substantially 1 year generation.Such as with height It is logical, Huawei and the cell phone processor manufacturer that Lian Fake is representative, all it is the one new platform of issue in 1 year;Such as with Google, Apple is the mobile phone operating system provider of representative, and issues an operating system version in 1 year;With Huawei, apple, Samsung For the mobile-phone manufacturers of representative also new mobile phone can be issued per year according to the renewal of processor and operating system.
In order to experience new hardware platform or new operating system, or the mobile phone that experience is new, many user's meetings as soon as possible Go with regard to the very first time to renew machine when new mobile phone issue, and be exactly the problem of one that the replacing of mobile phone is brought is critically important The backup and migration of data.
Existing many softwares are all very simply to be protected using password when carrying out data backup, are protected using password Although shield can be protected to the data of backup to a certain extent, there is a deficiency that can not be reconciled using password, I.e. safe password is difficult to remember, and it is not safe enough to hold catchy password, and this just allows user to need in safety and easy note A balance is firmly found between both.
The content of the invention
The embodiments of the invention provide a kind of data back up method and device, can not need user remember password when Wait the safety for ensureing Backup Data.
The purpose of the embodiment of the present invention is achieved through the following technical solutions:
One embodiment of the invention provides a kind of data back up method, including:
Obtain Backup Data;
Obtain the checking finger print information that user is used to be verified;
The checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information;
The backup file after encryption is preserved, the backup file includes the checking finger print information and the Backup Data.
Optionally, after the backup file preserved after encrypting, in addition to:
The backup file acquisition request of user's input is received, described obtain asks to include decrypting finger print information;
If the decryption finger print information is identical with the cryptographic fingerprint information, the backup file is decrypted;
If the decryption finger print information and the cryptographic fingerprint information differ, the backup file is not solved It is close.
Optionally, it is described the backup file is decrypted including:
Decrypt the checking fingerprint;
Obtain the fingerprint to be verified of user's input;
If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;
If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
Optionally, after the backup file being decrypted, in addition to:
Obtain the fingerprint to be verified of user's input;
If the fingerprint to be verified is identical with the checking fingerprint, the backup number that the backup file obtains is decrypted in output According to;
If the fingerprint to be verified differs with the checking fingerprint, delete and decrypt the backup that the backup file obtains Data and checking fingerprint.
Optionally, the checking fingerprint and the cryptographic fingerprint differ.
Another embodiment of the present invention provides a kind of data backup device, including:
Acquiring unit, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified;
Ciphering unit, for being added to the checking finger print information and the Backup Data using cryptographic fingerprint information It is close;
Storage unit, for preserve encrypt after backup file, the backup file include it is described checking finger print information with The Backup Data.
Optionally, in addition to:
Receiving unit, for receiving the backup file acquisition request of user's input, described obtain asks to include decrypting fingerprint Information;
Judging unit, for judging the decryption finger print information and the cryptographic fingerprint information;
Decryption unit, for judging that the decryption finger print information is identical with the cryptographic fingerprint information in the judging unit When, the backup file is decrypted;For judging that the decryption finger print information and the encryption refer in the judging unit When line information differs, the backup file is not decrypted.
Optionally, the decryption unit is specifically used for when the backup file is decrypted:
Decrypt the checking fingerprint;
Obtain the fingerprint to be verified of user's input;
If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;
If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
Optionally, the acquiring unit, it is additionally operable to obtain the fingerprint to be verified of user's input;
The judging unit, it is additionally operable to judge the fingerprint to be verified and the checking fingerprint;
The decoding unit, for judging that the fingerprint to be verified is identical with the checking fingerprint in the judging unit When, the Backup Data that the backup file obtains is decrypted in output;The judging unit judge the fingerprint to be verified with it is described When checking fingerprint differs, delete and decrypt Backup Data and checking fingerprint that the backup file obtains.
Optionally, the checking fingerprint and the cryptographic fingerprint differ.
It is can be seen that from above technical scheme provided in an embodiment of the present invention because the embodiment of the present invention is in Backup Data Checking finger print information and Backup Data can be encrypted by cryptographic fingerprint information, so that the Backup Data after encryption exists The double verification by verifying fingerprint and cryptographic fingerprint is needed during decryption, the Backup Data of protection user that can be very safe, Simultaneously because being backed up using finger print information to Backup Data, user need not remember any password, so as to both sides Just the use and can of user enough safely protects user data.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill of field, without having to pay creative labor, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the flow chart for the roaming network system of selection that one embodiment of the invention provides;
Fig. 2 is the flow chart for the roaming network system of selection that another embodiment of the present invention provides;
Fig. 3 is the structure chart for the terminal that one embodiment of the invention provides;
Fig. 4 is the structure chart for the terminal that one embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Roaming network system of selection provided in an embodiment of the present invention is first introduced, Fig. 1 describes one embodiment of the invention and carried The flow of the data back up method of confession.As shown in figure 1, the embodiment includes:
101st, Backup Data is obtained.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with According to the data for needing therefrom to select oneself needs to back up of oneself.
102nd, the checking finger print information that user is used to be verified is obtained.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit Collection.
103rd, the checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
Wherein, preset AES can be symmetry encryption algorithm or unsymmetrical tridiagonal matrix algorithm.For example, symmetrical expression Encryption is exactly encryption and decryption uses same key, and normally referred to as " this encryption technologies of Session Key " are in quilt now It is widely used, as des encryption standard is exactly a kind of typical " symmetrical expression " enciphered method used by U.S. government, it Session Key length is 56bits.Unsymmetrical tridiagonal matrix is not same key used in exactly encrypting and decrypt, generally There are two keys, be referred to as " public key " and " private key ", both must match use, otherwise can not open encryption file.Here " public key " refer to what can externally be announced, " private key " then can not, can only be known by one people of holder.Its superiority just exists Here, because the encryption method of symmetrical expression is difficult to not tell other side key if in transmission over networks encryption file, no How pipe is likely to not intercepted.And the encryption method of asymmetric has two keys, and " public key " therein Being can be disclosed, is not also just afraid of others and knows, if when addressee decrypts with the private key of oneself can, thus well Avoid the transmission security problem of key.
Specifically, DES algorithms (Data Encryption Standard) (symmetry algorithm, data encryption mark can be used Standard, speed, the occasion suitable for encrypting mass data);Or 3DES (Triple DES) algorithm (is pair based on DES Claim algorithm, Tertiary infilling is carried out according to three different keys to a block number, intensity is higher);Or RC2 and RC4 algorithms are (symmetrical Algorithm, mass data is encrypted with variable length key, faster than DES);Or IDEA (International Data EncryptionAlgorithm) algorithm (IDEA, very strong security being provided using 128 keys); RSA Algorithm (is invented by RSA companies, is the public key algorithm of a support variable length key, it is necessary to the length of the blocks of files of encryption And variable, asymmetric arithmetic);Or Hash (Hash) algorithm scheduling algorithm checking finger print information and Backup Data are added It is close.
The embodiment of the present invention is not defined to specific AES, using any AES all without influence The realization of the embodiment of the present invention.But, it is not very high AES to recommend in actual applications to system resource requirement, So as to improve enciphering rate.
Wherein, in order to improve security, it can prompt user that input is with verifying different another of fingerprint on a display screen Fingerprint is as cryptographic fingerprint.In one embodiment, although prompting user inputs another fingerprint different from checking fingerprint As cryptographic fingerprint, even if but user used with checking fingerprint identical fingerprint as cryptographic fingerprint, system also continues to make It is encrypted with the fingerprint, so as to reduce the memory cost of user;In another embodiment, if user have input and test Card fingerprint identical fingerprint can prompt user to input another fingerprint as cryptographic fingerprint, system, so as to use with testing Backup Data is encrypted card fingerprint identical fingerprint, further improves security.
104th, the backup file after encryption is preserved, the backup file includes the checking finger print information and the backup number According to.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any Place obtains backup file.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
Fig. 2 describes the flow of the method for the data backup of another embodiment of the present invention offer, including:
201st, Backup Data is obtained.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with According to the data for needing therefrom to select oneself needs to back up of oneself.
202nd, the checking finger print information that user is used to be verified is obtained.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit Collection.
203rd, the checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
204th, the backup file after encryption is preserved, the backup file includes the checking finger print information and the backup number According to.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any Place obtains backup file.
205th, the backup file acquisition request of user's input is received, described obtain asks to include decrypting finger print information.
When user is switched to new intelligent terminal, file can be decrypted after backup file is obtained, so as to obtain Backup Data, by associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, The data of application program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc. information It is transferred on new intelligent terminal, without carrying out too many manual setting.
Specifically, when user needs to decrypt backup file, it can on a display screen show and allow user to input decryption fingerprint Prompt message, after user sees the prompting, it is possible to will decryption fingerprint corresponding to finger be put into Fingerprint Identification Unit position, by referring to Line identifier gathers fingerprint so as to obtain decryption finger print information.Wherein it is possible to it is that encryption is standby further to prompt user to decrypt fingerprint The fingerprint used during part data, in order to which user can quickly determine to be decrypted with which root finger.
206th, judge whether the decryption finger print information and the cryptographic fingerprint information are identical;If the decryption fingerprint letter Breath is identical with the cryptographic fingerprint information, into step 207;If the decryption finger print information and the cryptographic fingerprint information are not It is identical, into step 208.
Specifically, it can use and be converted into character string by finger print information is decrypted with identical algorithm during encryption, then again will The character string decodes as clear crytpographic key to backup file;Can be into if character string is identical with character string during encryption Work(is decrypted, whereas if character string is with character string during encryption, differ then can not successful decryption.
207th, the backup file is decrypted.
In one embodiment of the invention, just carry out verifying the checking of fingerprint while decoding backup file, Now, the process backup file being decrypted can include:
Backup file is decrypted and obtains the checking finger print information;Obtain the fingerprint to be verified of user's input;If The fingerprint to be verified is identical with the checking fingerprint, decrypts the Backup Data;If the fingerprint to be verified is tested with described Card fingerprint differs, the non-decrypting Backup Data.
In another embodiment of the present invention, carry out verifying the checking of fingerprint after backup file being decrypted again, this When method provided in an embodiment of the present invention can also include:Obtain the fingerprint to be verified of user's input;If the finger to be verified Line is identical with the checking fingerprint, and the Backup Data that the backup file obtains is decrypted in output;If the fingerprint to be verified with The checking fingerprint differs, and deletes and decrypts Backup Data and checking fingerprint that the backup file obtains.
Specifically, when needing to verify checking fingerprint, user can be prompted to carry out checking fingerprint on a display screen Checking.After user will verify that fingerprint is put into Fingerprint Identification Unit, fingerprint to be verified can be collected;By referring to obtaining checking Identical algorithm, which to fingerprint to be verified calculate, during line information obtains finger print information to be verified, finger print information to be verified it is specific The form of expression can be character string, and character string corresponding to fingerprint to be verified is entered with preserving character string corresponding with checking fingerprint Row compares, when character string corresponding to fingerprint to be verified is with preserving identical with verifying character string corresponding to fingerprint, then it represents that test Demonstrate,prove successfully;Conversely, when character string corresponding to fingerprint to be verified differs with preserving character string corresponding with checking fingerprint, then Represent that checking is unsuccessful.
208th, the backup file is not decrypted.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
Fig. 3 describes the structure of the data backup device of one embodiment of the invention offer, including:
Acquiring unit 301, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with According to the data for needing therefrom to select oneself needs to back up of oneself.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit Collection.
Ciphering unit 302, for being carried out to the checking finger print information and the Backup Data using cryptographic fingerprint information Encryption.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
Wherein, preset AES can be symmetry encryption algorithm or unsymmetrical tridiagonal matrix algorithm.For example, symmetrical expression Encryption is exactly encryption and decryption uses same key, and normally referred to as " this encryption technologies of Session Key " are in quilt now It is widely used, as des encryption standard is exactly a kind of typical " symmetrical expression " enciphered method used by U.S. government, it Session Key length is 56bits.Unsymmetrical tridiagonal matrix is not same key used in exactly encrypting and decrypt, generally There are two keys, be referred to as " public key " and " private key ", both must match use, otherwise can not open encryption file.Here " public key " refer to what can externally be announced, " private key " then can not, can only be known by one people of holder.Its superiority just exists Here, because the encryption method of symmetrical expression is difficult to not tell other side key if in transmission over networks encryption file, no How pipe is likely to not intercepted.And the encryption method of asymmetric has two keys, and " public key " therein Being can be disclosed, is not also just afraid of others and knows, if when addressee decrypts with the private key of oneself can, thus well Avoid the transmission security problem of key.
Specifically, DES algorithms (Data Encryption Standard) (symmetry algorithm, data encryption mark can be used Standard, speed, the occasion suitable for encrypting mass data);Or 3DES (Triple DES) algorithm (is pair based on DES Claim algorithm, Tertiary infilling is carried out according to three different keys to a block number, intensity is higher);Or RC2 and RC4 algorithms are (symmetrical Algorithm, mass data is encrypted with variable length key, faster than DES);Or IDEA (International Data EncryptionAlgorithm) algorithm (IDEA, very strong security being provided using 128 keys); RSA Algorithm (is invented by RSA companies, is the public key algorithm of a support variable length key, it is necessary to the length of the blocks of files of encryption And variable, asymmetric arithmetic);Or Hash (Hash) algorithm scheduling algorithm checking finger print information and Backup Data are added It is close.
The embodiment of the present invention is not defined to specific AES, using any AES all without influence The realization of the embodiment of the present invention.But, it is not very high AES to recommend in actual applications to system resource requirement, So as to improve enciphering rate.
Wherein, in order to improve security, it can prompt user that input is with verifying different another of fingerprint on a display screen Fingerprint is as cryptographic fingerprint.In one embodiment, although prompting user inputs another fingerprint different from checking fingerprint As cryptographic fingerprint, even if but user used with checking fingerprint identical fingerprint as cryptographic fingerprint, system also continues to make It is encrypted with the fingerprint, so as to reduce the memory cost of user;In another embodiment, if user have input and test Card fingerprint identical fingerprint can prompt user to input another fingerprint as cryptographic fingerprint, system, so as to use with testing Backup Data is encrypted card fingerprint identical fingerprint, further improves security.
Storage unit 303, for preserving the backup file after encrypting, the backup file includes the checking finger print information With the Backup Data.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any Place obtains backup file.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
Fig. 4 describes the structure of the data backup device of another embodiment of the present invention offer, including:
Acquiring unit 301, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified.
Backup Data is the data that the needs of user's selection are backed up, and can be the various data on intelligent terminal;Example Such as, associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, application can be included The data of program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc..User can be with According to the data for needing therefrom to select oneself needs to back up of oneself.
After user have selected Backup Data, display on a display screen allows the prompt message of user's input validation fingerprint, uses After the prompting is seen at family, it is possible to finger corresponding to checking fingerprint is put into Fingerprint Identification Unit position, gathered by Fingerprint Identification Unit Fingerprint is so as to obtaining checking finger print information.Wherein, checking finger print information can calculate the character string obtained by Predistribution Algorithm.
Wherein Fingerprint Identification Unit can be that intelligent terminal carries, and can also carry out fingerprint by external Fingerprint Identification Unit Collection.
Ciphering unit 302, for being carried out to the checking finger print information and the Backup Data using cryptographic fingerprint information Encryption.
When needing that Backup Data is encrypted, the prompting for allowing user to input cryptographic fingerprint can be shown on a display screen Information, after user sees the prompting, it is possible to finger corresponding to cryptographic fingerprint is put into Fingerprint Identification Unit position, by fingerprint recognition Device gathers fingerprint so as to obtain cryptographic fingerprint information.
Wherein, after cryptographic fingerprint information is obtained, cryptographic fingerprint information can be calculated as pair according to preset algorithm The character string answered, then checking finger print information and Backup Data are encrypted by the character string again.
The embodiment of the present invention is not defined to specific AES, using any AES all without influence The realization of the embodiment of the present invention.But, it is not very high AES to recommend in actual applications to system resource requirement, So as to improve enciphering rate.
Wherein, in order to improve security, it can prompt user that input is with verifying different another of fingerprint on a display screen Fingerprint is as cryptographic fingerprint.In one embodiment, although prompting user inputs another fingerprint different from checking fingerprint As cryptographic fingerprint, even if but user used with checking fingerprint identical fingerprint as cryptographic fingerprint, system also continues to make It is encrypted with the fingerprint, so as to reduce the memory cost of user;In another embodiment, if user have input and test Card fingerprint identical fingerprint can prompt user to input another fingerprint as cryptographic fingerprint, system, so as to use with testing Backup Data is encrypted card fingerprint identical fingerprint, further improves security.
Storage unit 303, for preserving the backup file after encrypting, the backup file includes the checking finger print information With the Backup Data.
Backup file can be stored on smart mobile phone, and the biography of backup file is then completed by the communication between mobile phone It is defeated;Or backup file can also be stored in external storage dish (such as flash disk, mobile hard disk etc.), pass through storage dish The mobile transmission for completing Backup Data;Or backup file can also preserve beyond the clouds, there can be Internet connection any Place obtains backup file.
Receiving unit 304, for receiving the backup file acquisition request of user's input, the acquisition request includes decryption and referred to Line information.
When user is switched to new intelligent terminal, file can be decrypted after backup file is obtained, so as to obtain Backup Data, by associated person information, short message, message registration, the WiFi network information of preservation, the application program of installation, The data of application program, picture, video, music, the configuration information of operating system, alarm clock information, memo information etc. information It is transferred on new intelligent terminal, without carrying out too many manual setting.
Specifically, when user needs to decrypt backup file, it can on a display screen show and allow user to input decryption fingerprint Prompt message, after user sees the prompting, it is possible to will decryption fingerprint corresponding to finger be put into Fingerprint Identification Unit position, by referring to Line identifier gathers fingerprint so as to obtain decryption finger print information.Wherein it is possible to it is that encryption is standby further to prompt user to decrypt fingerprint The fingerprint used during part data, in order to which user can quickly determine to be decrypted with which root finger.
Judging unit 305, for carrying out judgement to the decryption finger print information and the cryptographic fingerprint information
Specifically, it can use and be converted into character string by finger print information is decrypted with identical algorithm during encryption, then again will The character string decodes as clear crytpographic key to backup file;Can be into if character string is identical with character string during encryption Work(is decrypted, whereas if character string is with character string during encryption, differ then can not successful decryption.
Decryption unit 306, for judging the decryption finger print information and cryptographic fingerprint letter in the judging unit 305 Simultaneously, the backup file is decrypted for manner of breathing;The judging unit 305 judge it is described decryption finger print information and it is described plus When close finger print information differs, the backup file is not decrypted.
In one embodiment of the invention, just carry out verifying the checking of fingerprint while decoding backup file, Now, the decryption unit 306 is specifically used for when the backup file is decrypted:Decrypt the checking fingerprint;Obtain The fingerprint to be verified of user's input;If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;Such as Fingerprint to be verified described in fruit differs with the checking fingerprint, the non-decrypting Backup Data.
In another embodiment of the present invention, carry out verifying the checking of fingerprint after backup file being decrypted again, this When, the acquiring unit 301, it is additionally operable to obtain the fingerprint to be verified that user inputs;The judging unit 305, is additionally operable to institute State fingerprint to be verified and the checking fingerprint is judged;The decoding unit 306, described in judging in the judging unit When fingerprint to be verified is identical with the checking fingerprint, the Backup Data that the backup file obtains is decrypted in output;In the judgement When fingerprint to be verified described in unit judges differs with the checking fingerprint, delete and decrypt the backup number that the backup file obtains According to checking fingerprint.
Specifically, when needing to verify checking fingerprint, user can be prompted to carry out checking fingerprint on a display screen Checking.After user will verify that fingerprint is put into Fingerprint Identification Unit, fingerprint to be verified can be collected;By referring to obtaining checking Identical algorithm, which to fingerprint to be verified calculate, during line information obtains finger print information to be verified, finger print information to be verified it is specific The form of expression can be character string, and character string corresponding to fingerprint to be verified is entered with preserving character string corresponding with checking fingerprint Row compares, when character string corresponding to fingerprint to be verified is with preserving identical with verifying character string corresponding to fingerprint, then it represents that test Demonstrate,prove successfully;Conversely, when character string corresponding to fingerprint to be verified differs with preserving character string corresponding with checking fingerprint, then Represent that checking is unsuccessful.
It can be seen that because the embodiment of the present invention can be referred to checking finger print information and Backup Data by encryption in Backup Data Line information is encrypted, so that the Backup Data after encryption needs pair by verifying fingerprint and cryptographic fingerprint in decryption Re-examination is demonstrate,proved, the Backup Data of protection user that can be very safe, simultaneously because being carried out using finger print information to Backup Data Backup, user need not remember any password, user data enough safely protected so as to both user-friendly and cans.
The contents such as the information exchange between each module, implementation procedure in said apparatus and system, due to side of the present invention Method embodiment is based on same design, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with The hardware of correlation is instructed to complete by computer program, above-mentioned program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, above-mentioned storage medium can be magnetic Dish, CD, read-only memory (ROM:Read-Only Memory) or random access memory (RAM:RandomAccess Memory) etc..
Specific case used herein is set forth to the principle and embodiment of the present invention, and above example is said It is bright to be only intended to help the method and its thought for understanding the present invention;Meanwhile for those of ordinary skill in the art, according to this hair Bright thought, there will be changes in specific embodiments and applications, in summary, this specification content should not manage Solve as limitation of the present invention.

Claims (10)

  1. A kind of 1. data back up method, it is characterised in that including:
    Obtain Backup Data;
    Obtain the checking finger print information that user is used to be verified;
    The checking finger print information and the Backup Data are encrypted using cryptographic fingerprint information;
    The backup file after encryption is preserved, the backup file includes the checking finger print information and the Backup Data.
  2. 2. the method as described in claim 1, it is characterised in that after the backup file preserved after encrypting, in addition to:
    The backup file acquisition request of user's input is received, described obtain asks to include decrypting finger print information;
    If the decryption finger print information is identical with the cryptographic fingerprint information, the backup file is decrypted;
    If the decryption finger print information and the cryptographic fingerprint information differ, the backup file is not decrypted.
  3. 3. method as claimed in claim 2, it is characterised in that it is described the backup file is decrypted including:
    Decrypt the checking fingerprint;
    Obtain the fingerprint to be verified of user's input;
    If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;
    If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
  4. 4. method as claimed in claim 2, it is characterised in that after the backup file is decrypted, in addition to:
    Obtain the fingerprint to be verified of user's input;
    If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data that the backup file obtains is decrypted in output;
    If the fingerprint to be verified differs with the checking fingerprint, delete and decrypt the Backup Data that the backup file obtains With checking fingerprint.
  5. 5. the method as described in Claims 1-4 is any, it is characterised in that described to verify fingerprint and the cryptographic fingerprint not phase Together.
  6. A kind of 6. data backup device, it is characterised in that including:
    Acquiring unit, for obtaining Backup Data;Obtain the checking finger print information that user is used to be verified;
    Ciphering unit, for the checking finger print information and the Backup Data to be encrypted using cryptographic fingerprint information;
    Storage unit, for preserving the backup file after encrypting, the backup file includes described verifying finger print information and described Backup Data.
  7. 7. device as claimed in claim 6, it is characterised in that also include:
    Receiving unit, for receiving the backup file acquisition request of user's input, described obtain asks to include decrypting finger print information;
    Judging unit, for judging the decryption finger print information and the cryptographic fingerprint information;
    Decryption unit, for the judging unit judge it is described decryption finger print information it is identical with the cryptographic fingerprint information when, The backup file is decrypted;For judging the decryption finger print information and cryptographic fingerprint letter in the judging unit When breath differs, the backup file is not decrypted.
  8. 8. device as claimed in claim 7, it is characterised in that the decryption unit is when the backup file is decrypted It is specifically used for:
    Decrypt the checking fingerprint;
    Obtain the fingerprint to be verified of user's input;
    If the fingerprint to be verified is identical with the checking fingerprint, the Backup Data is decrypted;
    If the fingerprint to be verified differs with the checking fingerprint, the non-decrypting Backup Data.
  9. 9. device as claimed in claim 7, it is characterised in that the acquiring unit, be additionally operable to obtain the to be tested of user's input Demonstrate,prove fingerprint;
    The judging unit, it is additionally operable to judge the fingerprint to be verified and the checking fingerprint;
    The decoding unit, for the judging unit judge the fingerprint to be verified with it is described checking fingerprint it is identical when, it is defeated Go out to decrypt the Backup Data that the backup file obtains;Judge that the fingerprint to be verified refers to the checking in the judging unit When line differs, delete and decrypt Backup Data and checking fingerprint that the backup file obtains.
  10. 10. the device as described in claim 6 to 9 is any, it is characterised in that described to verify fingerprint and the cryptographic fingerprint not phase Together.
CN201710732075.2A 2017-08-23 2017-08-23 A kind of data back up method and device Pending CN107590026A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710732075.2A CN107590026A (en) 2017-08-23 2017-08-23 A kind of data back up method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710732075.2A CN107590026A (en) 2017-08-23 2017-08-23 A kind of data back up method and device

Publications (1)

Publication Number Publication Date
CN107590026A true CN107590026A (en) 2018-01-16

Family

ID=61042907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710732075.2A Pending CN107590026A (en) 2017-08-23 2017-08-23 A kind of data back up method and device

Country Status (1)

Country Link
CN (1) CN107590026A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595291A (en) * 2018-04-01 2018-09-28 陈丽霞 A kind of medical data standby system
WO2019036972A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Data backup method and device
WO2019036967A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Device having data backup function and product related thereto

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530201A (en) * 2013-07-17 2014-01-22 华中科技大学 Safety data repetition removing method and system applicable to backup system
CN103607402A (en) * 2013-11-26 2014-02-26 广州博冠信息科技有限公司 Online game data encryption and decryption method and equipment
CN104751154A (en) * 2014-07-25 2015-07-01 北京智膜科技有限公司 Fingerprint safe encryption method based on intelligent mobile information device
CN106972925A (en) * 2017-03-29 2017-07-21 李维波 A kind of information ciphering method and its device
CN107038365A (en) * 2017-04-20 2017-08-11 滁州职业技术学院 The method and mobile terminal of a kind of file encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530201A (en) * 2013-07-17 2014-01-22 华中科技大学 Safety data repetition removing method and system applicable to backup system
CN103607402A (en) * 2013-11-26 2014-02-26 广州博冠信息科技有限公司 Online game data encryption and decryption method and equipment
CN104751154A (en) * 2014-07-25 2015-07-01 北京智膜科技有限公司 Fingerprint safe encryption method based on intelligent mobile information device
CN106972925A (en) * 2017-03-29 2017-07-21 李维波 A kind of information ciphering method and its device
CN107038365A (en) * 2017-04-20 2017-08-11 滁州职业技术学院 The method and mobile terminal of a kind of file encryption

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019036972A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Data backup method and device
WO2019036967A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Device having data backup function and product related thereto
CN108595291A (en) * 2018-04-01 2018-09-28 陈丽霞 A kind of medical data standby system

Similar Documents

Publication Publication Date Title
US9448949B2 (en) Mobile data vault
CN104662870B (en) Data safety management system
CN101272237B (en) Method and system for automatically generating and filling login information
US8990565B2 (en) Method and system for automatically logging in a client
WO2015180691A1 (en) Key agreement method and device for verification information
CN103974250B (en) Collocation method and equipment
WO2017202025A1 (en) Terminal file encryption method, terminal file decryption method, and terminal
CN108763917B (en) Data encryption and decryption method and device
JP2008527905A (en) Security code generation method, method using security code generation method, and programmable apparatus for security code generation method
JPH0936851A (en) System and method of integrating private key operation from smart card in a transmissive way with host base cryptograph service
WO2021114614A1 (en) Application program secure startup method and apparatus, computer device, and storage medium
CN107196907A (en) A kind of guard method of Android SO files and device
WO2015180689A1 (en) Method and apparatus for acquiring verification information
EP3511853B1 (en) Security authentication method, integrated circuit and system
CN104318286B (en) Management method, management system and the terminal of NFC label data
CN105975867B (en) A kind of data processing method
CN111143474B (en) One-key binding changing method for mobile phone number based on block chain technology
CN110377856A (en) Netpage registration method, system, equipment and computer storage medium
Hufstetler et al. Nfc unlock: Secure two-factor computer authentication using nfc
WO2019120038A1 (en) Encrypted storage of data
CN107590026A (en) A kind of data back up method and device
CN107704743A (en) Device and Related product with data backup function
WO2017050152A1 (en) Password security system adopted by mobile apparatus and secure password entering method thereof
CN107666469A (en) The processing method and terminal of identifying code short message
CN108804935A (en) A kind of safety encryption storage system and method based on TrustZone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180116