WO2016179889A1 - 一种指纹搜索方法、装置及终端 - Google Patents

一种指纹搜索方法、装置及终端 Download PDF

Info

Publication number
WO2016179889A1
WO2016179889A1 PCT/CN2015/082984 CN2015082984W WO2016179889A1 WO 2016179889 A1 WO2016179889 A1 WO 2016179889A1 CN 2015082984 W CN2015082984 W CN 2015082984W WO 2016179889 A1 WO2016179889 A1 WO 2016179889A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
fingerprint
encrypted
encrypted file
fingerprint information
Prior art date
Application number
PCT/CN2015/082984
Other languages
English (en)
French (fr)
Inventor
王世强
杨鑫贵
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2016179889A1 publication Critical patent/WO2016179889A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a fingerprint search method, apparatus, and terminal.
  • the encrypted information is generally hidden, or the encrypted information is stored in a private space. After that, how to intelligently search for the encrypted information is difficult to implement. Affect the user experience.
  • the present invention provides a fingerprint search method, device, and terminal for solving the above technical problem, in view of the problem that the security of the terminal information encryption method is poor in the related art, and the encrypted information is difficult to search.
  • the present invention provides a fingerprint search method, wherein the method includes: encrypting information to be encrypted in a terminal based on fingerprint information of a user to obtain an encrypted file; and in the encrypted file, based on Different fingerprint information is used to find the corresponding encrypted file.
  • the information to be encrypted in the terminal is encrypted based on the fingerprint information of the user, and the encrypted file is obtained, including: encrypting the encrypted information according to the fingerprint information of different fingers of the user, and obtaining an encrypted file; and fingerprint information of each finger Correspondence with the corresponding encrypted file is stored as a first index to the database.
  • the information to be encrypted in the terminal is encrypted based on the fingerprint information of the user, and the encrypted file is obtained, including: encrypting the encrypted information based on the fingerprint information of the user, and obtaining an encrypted file; Converting the fingerprint information into a plurality of character strings or a plurality of verification codes, and associating each encrypted file with a character string or a verification code; storing the correspondence between each type of the character string and the corresponding encrypted file as the second index Go to the database; store the correspondence between each type of verification code and the corresponding encrypted file as a third index to the database.
  • searching for an encrypted file corresponding thereto according to different fingerprint information comprising: acquiring fingerprint information input by a user; and searching, corresponding to the fingerprint information, based on the first index stored in the database Encrypted file.
  • searching for an encrypted file corresponding thereto according to different fingerprint information comprising: acquiring fingerprint information input by a user, and a character string or a verification code selected by the user and converted by the fingerprint information;
  • the second index or the third index stored in the database searches for an encrypted file corresponding to the fingerprint information.
  • the present invention further provides a fingerprint search device, wherein the device includes: a fingerprint encryption module, configured to encrypt information to be encrypted in the terminal based on fingerprint information of the user to obtain an encrypted file;
  • the fingerprint search module is configured to search for an encrypted file corresponding thereto according to different fingerprint information in the encrypted file.
  • the fingerprint encryption module includes: a first encryption unit, configured to encrypt the encrypted information according to fingerprint information of different fingers of the user, to obtain an encrypted file; and corresponding to the fingerprint information of each finger and the corresponding encrypted file. Relationship, stored as a first index to the database; or,
  • a second encryption unit configured to encrypt the encrypted information according to the fingerprint information of the user, to obtain an encrypted file; convert the fingerprint information into multiple strings or multiple verification codes, and associate each encrypted file with a string or
  • the verification code stores the correspondence between each type of the character string and the corresponding encrypted file as a second index to the database; and stores the correspondence between each type of verification code and the corresponding encrypted file as a third index to the database.
  • the fingerprint search module includes: a first search unit, configured to acquire fingerprint information input by the user; and searching for an encrypted file corresponding to the fingerprint information based on the first index stored in the database;
  • the fingerprint search module includes: a second search unit, configured to acquire fingerprint information input by the user, and a character string or a verification code selected by the user and converted by the fingerprint information; based on the second index stored in the database Or a third index to find an encrypted file corresponding to the fingerprint information.
  • a second search unit configured to acquire fingerprint information input by the user, and a character string or a verification code selected by the user and converted by the fingerprint information
  • the present invention also provides a terminal, wherein the terminal comprises: a fingerprint input module, configured to provide a fingerprint input interface for the user to input fingerprint information for encryption when receiving the encryption request of the user; wherein the encrypted fingerprint information is used to encrypt the information to be encrypted in the terminal, Obtaining an encrypted file; a fingerprint search module, configured to provide a fingerprint input interface for the user to input fingerprint information for searching when receiving the fingerprint search request of the user; wherein the fingerprint information for searching is used in the Find the encrypted file corresponding to it in the encrypted file.
  • a file display module for displaying the found encrypted file in the display interface.
  • the technical solution of the invention solves the problem that the security of the terminal information encryption method is poor in the related art, and the encrypted information is difficult to search, realizes fast encryption and decryption of information in the terminal, and can quickly search for the encrypted information that the user wishes to browse, and improve the information.
  • the user experience has improved the competitiveness of the product.
  • FIG. 1 is a flow chart of a fingerprint search method according to an embodiment of the present invention.
  • FIG. 3 is a flow chart of a fingerprint search according to an embodiment of the present invention.
  • FIG. 4 is a structural block diagram of a fingerprint search apparatus according to an embodiment of the present invention.
  • FIG. 5 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • the present invention provides a fingerprint search method, device and terminal.
  • the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. . It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
  • FIG. 1 is a flowchart of a fingerprint search method according to an embodiment of the present invention. As shown in FIG. 1, the method includes the following steps (step S102- Step S104):
  • Step S102 Encrypt the information to be encrypted in the terminal based on the fingerprint information of the user, and obtain Encrypted file;
  • Step S104 in the encrypted file, searching for an encrypted file corresponding thereto based on different fingerprint information.
  • the embodiment solves the problem that the security of the terminal information encryption method is poor in the related art, and the encrypted information is difficult to search, and the information in the terminal is quickly encrypted and decrypted, and the encrypted information that the user wants to browse is quickly searched. Improve user experience and increase product competitiveness.
  • the following describes the process of encrypting the information in the terminal by using the fingerprint information of the terminal holder, and the process of quickly searching the encrypted information by using the fingerprint information.
  • the input box can be set by long pressing the information (or continuously clicking the information, etc.).
  • the terminal holder needs to input his own fingerprint information in the input box, and then the system encrypts the encrypted information based on the fingerprint information.
  • the encryption of the information is performed by encrypting and encrypting the fingerprint information and the information to be encrypted, and using the fingerprint information as a key for encrypting and decrypting the information.
  • the encrypted file obtained after encryption is stored in the terminal in a garbled or encrypted state.
  • the opening operation of the application is encrypted using fingerprint information.
  • the encrypted application can only open the application by inputting the fingerprint information of the terminal holder, and then perform related operations.
  • the method further includes: after receiving the decryption request of the user, acquiring the decrypted fingerprint information input by the user; The decrypted fingerprint information is compared with the fingerprint information, and it is determined according to the comparison result whether the encrypted file is decrypted.
  • the input box may be set by long pressing the information (or continuously clicking the information, etc.), and the system prompts the user to Enter the fingerprint information of the terminal holder in the input box and enter the correct finger. After the information is printed, the encrypted file can be decrypted and the information can be browsed normally.
  • FIG. 2 is a flowchart of encryption and decryption according to an embodiment of the present invention. As shown in FIG. 2, the process includes:
  • step S201 it is determined whether to encrypt the information in the terminal according to the user demand; if yes, step S203 is performed, and if no, step S202 is performed.
  • step S202 the information is stored in the normal mode.
  • Step S203 Acquire fingerprint information of the terminal holder.
  • step S204 the encrypted information is encrypted by using the fingerprint information to obtain an encrypted file.
  • Step S205 determining whether to browse the encrypted file according to the user demand; if yes, executing step S207, and if no, executing step S206.
  • step S206 the encryption mode (hidden, garbled or encrypted state, etc.) is stored.
  • Step S207 input fingerprint information of the terminal holder.
  • step S208 the encrypted file is decrypted, and the user can browse the information normally.
  • the process of encrypting and decrypting information in the terminal based on fingerprint information is introduced.
  • the information in the terminal may be encrypted based on the fingerprint information, and the following at least two implementation manners may be implemented.
  • the first type is based on the fingerprint information of different fingers of the user, encrypting the encrypted information to obtain an encrypted file; storing the correspondence between the fingerprint information of each finger and the corresponding encrypted file, that is, corresponding to the fingerprint information of each finger
  • the correspondence of the encrypted files is stored as a first index into the database.
  • the encrypted information is encrypted based on the fingerprint information of the user to obtain an encrypted file;
  • the fingerprint information is converted into a plurality of strings or a plurality of verification codes, and each encrypted file is associated with a string or a verification code;
  • a correspondence between a character string or a verification code and a corresponding encrypted file, that is, a correspondence between each type of the character string and the corresponding encrypted file is stored as a second index in the database; each verification code is associated with the corresponding
  • the correspondence of the encrypted file is stored as a third index to the database.
  • the above two encryption methods may be used in either one or a combination of the two.
  • the method of encrypting based on fingerprint information is more complicated, the security factor is higher, and the encryption effect is better.
  • the simplest and straightforward way to encrypt based on the fingerprint information of the terminal finger of the terminal holder can also be used.
  • the specific method can be preset or changed according to user needs.
  • the first type is: searching for an encrypted file based on fingerprint information: obtaining fingerprint information input by a user; The encrypted file corresponding to the fingerprint information is searched based on the stored correspondence between the fingerprint information of each finger and the corresponding encrypted file (ie, the first index stored in the database).
  • the fingerprint information of the thumb of the terminal holder is used to encrypt the short message in the mobile phone
  • the fingerprint information of the index finger is used to encrypt the picture in the mobile phone
  • the fingerprint information of the middle finger is used to encrypt the video in the mobile phone.
  • the fingerprint information of the designated finger of the terminal holder is converted into three types of characters, the first type of the character string is added to the file name of the encrypted file formed by the encryption of the short message, and the second type of the character string is added to the image encryption.
  • the third character string is added to the file name of the encrypted file formed by the video encryption, so that when the user needs to search for the encrypted video, simply input the above in the input box. Specify the finger information of the finger and select the third string to display the video list on the phone interface.
  • the above two fingerprint search methods may be used one by one or may be superimposed. Through the above two fingerprint search methods, the encrypted information that the user desires to browse is quickly searched, the user experience is improved, and the product competitiveness is improved. Users can dynamically update the above indexes and databases according to their needs, thereby improving the user experience.
  • FIG. 3 is a flowchart of a fingerprint search according to an embodiment of the present invention. As shown in FIG. 3, the process includes:
  • step S301 click the “Quick Search Encrypted File” button on the mobile phone desktop to pop up the “Fingerprint Input” button (or input box).
  • step S302 long press the "fingerprint input” button (or input box) to input the fingerprint information of the user.
  • step S303 the encrypted file is quickly displayed in a list form on the mobile phone desktop.
  • step S304 the encrypted file that the user wants to read is clicked to browse.
  • FIG. 4 is a structural block diagram of a fingerprint search apparatus according to an embodiment of the present invention. As shown in FIG. 4, the apparatus includes: a fingerprint encryption module 10 and a fingerprint search module 12. The structure is described in detail below.
  • the fingerprint encryption module 10 is configured to encrypt the information to be encrypted in the terminal based on the fingerprint information of the user to obtain an encrypted file.
  • the fingerprint search module 12 is configured to search for an encrypted file corresponding thereto based on different fingerprint information in the encrypted file.
  • the embodiment solves the problem that the security of the terminal information encryption method is poor in the related art, and the encrypted information is difficult to search, and the information in the terminal is quickly encrypted and decrypted, and the encrypted information that the user wants to browse is quickly searched. Improve user experience and increase product competitiveness.
  • the encryption of the information in the terminal based on the fingerprint information may be implemented in at least two manners, that is, the fingerprint encryption module 10 includes:
  • the first encryption unit is configured to encrypt the information to be encrypted based on the fingerprint information of the different fingers of the user, to obtain an encrypted file, and store the correspondence between the fingerprint information of each finger and the corresponding encrypted file, that is, the fingerprint of each finger
  • the correspondence between the information and the corresponding encrypted file is stored as a first index in the database
  • a second encryption unit configured to encrypt the encrypted information based on the fingerprint information of the user to obtain an encrypted file; convert the fingerprint information into multiple strings or multiple verification codes, and associate each encrypted file with a string or a verification code. Storing the correspondence between each type of string or verification code and the corresponding encrypted file, that is, storing the correspondence between each type of the string and the corresponding encrypted file as a second index to the database, and each type of verification code The correspondence with the corresponding encrypted file is stored as a third index to the database.
  • the fingerprint search module 12 includes:
  • a first searching unit configured to acquire fingerprint information input by the user; based on the stored finger of each finger Corresponding relationship between the texture information and the corresponding encrypted file (ie, the first index stored in the database), searching for an encrypted file corresponding to the fingerprint information;
  • a second search unit configured to acquire fingerprint information input by the user, and a character string or a verification code selected by the user and converted by the fingerprint information; and a correspondence relationship between each type of the stored string or the verification code and the corresponding encrypted file ( That is, the second index or the third index stored in the database) searches for an encrypted file corresponding to the fingerprint information.
  • FIG. 5 is a structural block diagram of a terminal according to an embodiment of the present invention. As shown in FIG. 5, the terminal includes: a fingerprint input module 20 and a fingerprint. Search module 22 and file display module 24. The structure is described in detail below.
  • the fingerprint input module 20 is configured to provide a fingerprint input interface for the user to input fingerprint information for encryption when receiving the encryption request of the user; wherein the encrypted fingerprint information is used to encrypt the information to be encrypted in the terminal, Encrypted file;
  • the fingerprint search module 22 is configured to provide a fingerprint input interface for the user to input fingerprint information for searching when receiving the fingerprint search request of the user; wherein the fingerprint information used for searching is used to search for the corresponding file in the encrypted file. Encrypt the file.
  • the file display module 24 is configured to display the found encrypted file in the display interface.
  • the embodiment solves the problem that the security of the terminal information encryption method is poor in the related art, and the encrypted information is difficult to search, and the information in the terminal is quickly encrypted and decrypted, and the encrypted information that the user wants to browse is quickly searched. Improve user experience and increase product competitiveness.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Collating Specific Patterns (AREA)
  • Human Computer Interaction (AREA)

Abstract

一种指纹搜索方法、装置及终端。其中,该方法包括:基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件(S102);在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件(S104)。上述方法和装置解决了终端信息加密方式安全性差,且加密后的信息难以搜索的问题,实现了对终端中信息的快速加解密,并能够快速搜索到用户希望浏览的加密信息,提高了用户体验,提高了产品竞争力。

Description

一种指纹搜索方法、装置及终端
本申请要求于2015年5月11日提交中国专利局,申请号为201510237989.2、发明名称为“一种指纹搜索方法、装置及终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及移动通讯领域,特别是涉及一种指纹搜索方法、装置及终端。
背景技术
目前,对于终端(例如:手机)中的信息(例如:短信内容,照片,音频,应用等)进行加密的方式,大部分都是通过隐藏或是将信息存储在私密空间中实现。这种方式并不能保证信息的绝对安全性。而且在实时信息交互时,采用以上的信息加密方式不方便,效率低,且安全性差。
并且,在对终端中的信息进行加密后,一般都是隐藏加密后的信息,或者将加密后的信息存储在私密空间中,在此之后,如何智能搜索出加密后的信息,比较难以实现,影响用户体验。
针对相关技术中的上述问题,目前尚未提出有效的解决方案。
发明内容
针对相关技术中终端信息加密方式安全性差,且加密后的信息难以搜索的问题,本发明提供了一种指纹搜索方法、装置及终端,用以解决上述技术问题。
根据本发明的一个方面,本发明提供了一种指纹搜索方法,其中,该方法包括:基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件;在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件。
优选地,基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件,包括:基于用户的不同手指的指纹信息,对待加密信息进行加密,得到加密文件;将每个手指的指纹信息与对应的加密文件的对应关系,作为第一索引存储到数据库。
优选地,基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件,包括:基于用户的指纹信息对待加密信息进行加密,得到加密文件;将 所述指纹信息转换为多种字符串或多种验证码,将每个加密文件关联一种字符串或验证码;将每一种字符串与对应的加密文件的对应关系,作为第二索引存储到数据库;将每一种验证码与对应的加密文件的对应关系,作为第三索引存储到数据库。
优选地,在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件,包括:获取用户输入的指纹信息;基于所述数据库中存储的所述第一索引,查找与该指纹信息对应的加密文件。
优选地,在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件,包括:获取用户输入的指纹信息,以及用户选择的由该指纹信息转换的字符串或验证码;基于所述数据库中存储的第二索引或第三索引,查找与该指纹信息对应的加密文件。
根据本发明的另一方面,本发明还提供了一种指纹搜索装置,其中,该装置包括:指纹加密模块,用于基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件;指纹搜索模块,用于在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件。
优选地,所述指纹加密模块包括:第一加密单元,用于基于用户的不同手指的指纹信息,对待加密信息进行加密,得到加密文件;将每个手指的指纹信息与对应的加密文件的对应关系,作为第一索引存储到数据库;或者,
第二加密单元,用于基于用户的指纹信息对待加密信息进行加密,得到加密文件;将所述指纹信息转换为多种字符串或多种验证码,将每个加密文件关联一种字符串或验证码;将每一种字符串与对应的加密文件的对应关系,作为第二索引存储到数据库;将每一种验证码与对应的加密文件的对应关系,作为第三索引存储到数据库。
优选地,所述指纹搜索模块包括:第一搜索单元,用于获取用户输入的指纹信息;基于所述数据库中存储的所述第一索引,查找与该指纹信息对应的加密文件;
优选地,所述指纹搜索模块包括:第二搜索单元,用于获取用户输入的指纹信息,以及用户选择的由该指纹信息转换的字符串或验证码;基于所述数据库中存储的第二索引或第三索引,查找与该指纹信息对应的加密文件。
根据本发明的另一方面,本发明还提供了一种终端,其中,该终端包括: 指纹输入模块,用于在接收到用户的加密请求时,提供指纹输入界面以供用户输入用于加密的指纹信息;其中,所述加密的指纹信息用于对终端中的待加密信息进行加密,得到加密文件;指纹搜索模块,用于在接收到用户的指纹搜索请求时,提供指纹输入界面以供用户输入用于搜索的指纹信息;其中,所述用于搜索的指纹信息用于在所述加密文件中查找与其对应的加密文件。文件显示模块,用于在显示界面中显示查找到的加密文件。
本发明有益效果如下:
本发明技术方案解决了相关技术中终端信息加密方式安全性差,且加密后的信息难以搜索的问题,实现了对终端中信息的快速加解密,并能够快速搜索到用户希望浏览的加密信息,提高了用户体验,提高了产品竞争力。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
图1是根据本发明实施例的指纹搜索方法的流程图;
图2是根据本发明实施例的加解密流程图;
图3是根据本发明实施例的指纹搜索流程图;
图4是根据本发明实施例的指纹搜索装置的结构框图;
图5是根据本发明实施例的终端的结构框图。
具体实施方式
为了解决相关技术中终端信息加密方式安全性差,且加密后的信息难以搜索的问题,本发明提供了一种指纹搜索方法、装置及终端,以下结合附图以及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不限定本发明。
本实施例提供了一种指纹搜索方法,该方法可以在终端侧实现,图1是根据本发明实施例的指纹搜索方法的流程图,如图1所示,该方法包括以下步骤(步骤S102-步骤S104):
步骤S102,基于用户的指纹信息对终端中的待加密信息进行加密,得到 加密文件;
步骤S104,在上述加密文件中,基于不同的指纹信息查找与其对应的加密文件。
通过本实施例,解决了相关技术中终端信息加密方式安全性差,且加密后的信息难以搜索的问题,实现了对终端中信息的快速加解密,并能够快速搜索到用户希望浏览的加密信息,提高了用户体验,提高了产品竞争力。
下面对利用终端持有者的指纹信息对终端中的信息进行加密的过程,以及利用指纹信息对加密信息进行快速搜索的过程进行介绍。
(一)利用指纹信息对要加密的信息进行加密:
当终端持有者想要对终端中的信息(例如:短信内容,照片,音频,应用等)进行加密时,可设置通过长按该信息(或连续快速点击该信息等方式)弹出输入框,以供用户选择是否对该信息进行加密,如果确定需要加密,终端持有者需要在输入框中输入自己的指纹信息,然后系统会基于该指纹信息对待加密信息进行加密。
具体的加密可以分为两类:
1)短信,照片和音频类信息的加密
该类信息的加密,采用将指纹信息和待加密信息进行融合加密的方式,将指纹信息作为加密和解密该信息的密钥。加密后得到的加密文件在终端中以乱码或加密状态存储。
2)应用类信息的加密
对于应用加密,利用指纹信息对该应用的开启操作进行加密。加密之后的应用只有输入终端持有者的指纹信息才能开启应用,继而进行相关操作。
(二)加密文件的解密
在本实施例中,基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件之后,上述方法还包括:在接收到用户的解密请求后,获取用户输入的解密指纹信息;将该解密指纹信息与指纹信息进行比对,根据比对结果确定是否将加密文件进行解密。
具体地,对信息加密后得到的加密文件进行解密时(例如用户需要浏览信息内容时),可设置通过长按该信息(或连续快速点击该信息等方式)弹出输入框,系统会提示用户在输入框中输入终端持有者的指纹信息,输入正确的指 纹信息后,才能对加密文件进行解密,正常浏览信息。
图2是根据本发明实施例的加解密流程图,如图2所示,该流程包括:
步骤S201,根据用户需求确定是否对终端中的信息进行加密;如果是,则执行步骤S203,如果否,则执行步骤S202。
步骤S202,按照正常模式存储信息。
步骤S203,获取终端持有者的指纹信息。
步骤S204,利用指纹信息对待加密信息进行加密,得到加密文件。
步骤S205,根据用户需求确定是否浏览加密文件;如果是,则执行步骤S207,如果否,则执行步骤S206。
步骤S206,采取加密模式(隐藏、乱码或加密状态等)存储。
步骤S207,输入终端持有者的指纹信息。
步骤S208,对加密文件进行解密,用户可正常浏览信息。
前面介绍了基于指纹信息对终端中的信息进行加解密的过程。在本实施例中,基于指纹信息对终端中的信息进行加密可以有以下至少两种实现方式,
第一种,基于用户的不同手指的指纹信息,对待加密信息进行加密,得到加密文件;存储每个手指的指纹信息与对应的加密文件的对应关系,即,将每个手指的指纹信息与对应的加密文件的对应关系,作为第一索引存储到数据库。
第二种,基于用户的指纹信息对待加密信息进行加密,得到加密文件;将指纹信息转换为多种字符串或多种验证码,将每个加密文件关联一种字符串或验证码;存储每一种字符串或验证码与对应的加密文件的对应关系,即,将每一种字符串与对应的加密文件的对应关系,作为第二索引存储到数据库;将每一种验证码与对应的加密文件的对应关系,作为第三索引存储到数据库。
上述两种加密方式可以择其一使用,也可以二者叠加使用。通过上述两种加密方式,使得基于指纹信息进行加密的方式更加复杂,安全系数更高,加密效果更好。当然,也可以采用基于终端持有者的指定手指的指纹信息进行加密这一最简单直接的方式。具体采用何种方式,可预设也可根据用户需求更改。
为了便于用户查找某种类型的加密文件,针对上述两种加密方式,可以设置下述两种指纹搜索方式:
第一种,在基于指纹信息搜索加密文件阶段:获取用户输入的指纹信息; 基于存储的每个手指的指纹信息与对应的加密文件的对应关系(即数据库中存储的第一索引),查找与该指纹信息对应的加密文件。
例如,终端持有者大拇指的指纹信息用于加密手机中的短信,食指的指纹信息用于加密手机中的图片,中指的指纹信息用于加密手机中的视频。这样在用户需要搜索加密后的视频时,只需在输入框中输入中指的指纹信息,便可在手机界面显示出视频列表。
第二种,在基于指纹信息搜索加密文件阶段:获取用户输入的指纹信息,以及用户选择的由该指纹信息转换的字符串或验证码;基于存储的每一种字符串或验证码与对应的加密文件的对应关系(即数据库中存储的第二索引或第三索引),查找与该指纹信息对应的加密文件。
例如,将终端持有者的指定手指的指纹信息转换为三种字符串,将第一种字符串添加到短信加密后形成的加密文件的文件名称中,将第二种字符串添加到图片加密后形成的加密文件的文件名称中,将第三种字符串添加到视频加密后形成的加密文件的文件名称中,这样,在用户需要搜索加密后的视频时,只需在输入框中输入上述指定手指的指纹信息,并选择第三种字符串,便可在手机界面显示出视频列表。
上述两种指纹搜索方式可以择其一使用,也可以二者叠加使用。通过上述两种指纹搜索方式,实现了快速搜索到用户希望浏览的加密信息,提高了用户体验,提高了产品竞争力。用户可以根据自身需求动态更新上述索引以及数据库,从而提高用户体验。
当然,也可以采用比较简单直接的方式,即,将图片加密后形成的加密文件的文件名称中添加“jpg”,将视频加密后形成的加密文件的文件名称中添加“rmvb”。这样,在用户需要搜索加密后的视频时,只需在输入框中输入上述指定手指的指纹信息,并输入关键词“rmvb”,便可在手机界面显示出视频列表。
图3是根据本发明实施例的指纹搜索流程图,如图3所示,该流程包括:
步骤S301,点击手机桌面上“快速搜索加密文件”按钮,弹出“指纹输入”按钮(或输入框)。
步骤S302,长按“指纹输入”按钮(或输入框),以输入用户的指纹信息。
步骤S303,手机桌面上快速以列表形式显示加密文件。
步骤S304,点击用户想要阅读的加密文件进行浏览即可。
对应于上述实施例介绍的指纹搜索方法,本实施例提供了一种指纹搜索装置,该装置可以设置在终端侧,用以实现上述实施例。图4是根据本发明实施例的指纹搜索装置的结构框图,如图4所示,该装置包括:指纹加密模块10和指纹搜索模块12。下面对该结构进行详细介绍。
指纹加密模块10,用于基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件;
指纹搜索模块12,用于在加密文件中,基于不同的指纹信息查找与其对应的加密文件。
通过本实施例,解决了相关技术中终端信息加密方式安全性差,且加密后的信息难以搜索的问题,实现了对终端中信息的快速加解密,并能够快速搜索到用户希望浏览的加密信息,提高了用户体验,提高了产品竞争力。
基于指纹信息对终端中的信息进行加密可以有至少两种实现方式,即:上述指纹加密模块10包括:
第一加密单元,用于基于用户的不同手指的指纹信息,对待加密信息进行加密,得到加密文件;存储每个手指的指纹信息与对应的加密文件的对应关系,即,将每个手指的指纹信息与对应的加密文件的对应关系,作为第一索引存储到数据库;
或者,
第二加密单元,用于基于用户的指纹信息对待加密信息进行加密,得到加密文件;将指纹信息转换为多种字符串或多种验证码,将每个加密文件关联一种字符串或验证码;存储每一种字符串或验证码与对应的加密文件的对应关系,即,将每一种字符串与对应的加密文件的对应关系,作为第二索引存储到数据库,将每一种验证码与对应的加密文件的对应关系,作为第三索引存储到数据库。
针对上述两种加密方式,可以设置下述两种指纹搜索方式,即:上述指纹搜索模块12包括:
第一搜索单元,用于获取用户输入的指纹信息;基于存储的每个手指的指 纹信息与对应的加密文件的对应关系(即数据库中存储的第一索引),查找与该指纹信息对应的加密文件;
或者,
第二搜索单元,用于获取用户输入的指纹信息,以及用户选择的由该指纹信息转换的字符串或验证码;基于存储的每一种字符串或验证码与对应的加密文件的对应关系(即数据库中存储的第二索引或第三索引),查找与该指纹信息对应的加密文件。
对应于上述实施例介绍的指纹搜索方法,本实施例提供了一种终端,图5是根据本发明实施例的终端的结构框图,如图5所示,该终端包括:指纹输入模块20、指纹搜索模块22和文件显示模块24。下面对该结构进行详细介绍。
指纹输入模块20,用于在接收到用户的加密请求时,提供指纹输入界面以供用户输入用于加密的指纹信息;其中,加密的指纹信息用于对终端中的待加密信息进行加密,得到加密文件;
指纹搜索模块22,用于在接收到用户的指纹搜索请求时,提供指纹输入界面以供用户输入用于搜索的指纹信息;其中,用于搜索的指纹信息用于在加密文件中查找与其对应的加密文件。
文件显示模块24,用于在显示界面中显示查找到的加密文件。
通过本实施例,解决了相关技术中终端信息加密方式安全性差,且加密后的信息难以搜索的问题,实现了对终端中信息的快速加解密,并能够快速搜索到用户希望浏览的加密信息,提高了用户体验,提高了产品竞争力。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (10)

  1. 一种指纹搜索方法,其特征在于,所述方法包括:
    基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件;
    在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件。
  2. 如权利要求1所述的方法,其特征在于,基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件,包括:
    基于用户的不同手指的指纹信息,对待加密信息进行加密,得到加密文件;
    将每个手指的指纹信息与对应的加密文件的对应关系,作为第一索引存储到数据库。
  3. 如权利要求1所述的方法,其特征在于,基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件,包括:
    基于用户的指纹信息对待加密信息进行加密,得到加密文件;
    将所述指纹信息转换为多种字符串或多种验证码,将每个加密文件关联一种字符串或验证码;
    将每一种字符串与对应的加密文件的对应关系,作为第二索引存储到数据库;将每一种验证码与对应的加密文件的对应关系,作为第三索引存储到数据库。
  4. 如权利要求2所述的方法,其特征在于,在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件,包括:
    获取用户输入的指纹信息;
    基于所述数据库中存储的所述第一索引,查找与该指纹信息对应的加密文件。
  5. 如权利要求3所述的方法,其特征在于,在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件,包括:
    获取用户输入的指纹信息,以及用户选择的由该指纹信息转换的字符串或验证码;
    基于所述数据库中存储的第二索引或第三索引,查找与该指纹信息对应的加密文件。
  6. 一种指纹搜索装置,其特征在于,所述装置包括:
    指纹加密模块,用于基于用户的指纹信息对终端中的待加密信息进行加密,得到加密文件;
    指纹搜索模块,用于在所述加密文件中,基于不同的指纹信息查找与其对应的加密文件。
  7. 如权利要求6所述的装置,其特征在于,所述指纹加密模块包括:
    第一加密单元,用于基于用户的不同手指的指纹信息,对待加密信息进行加密,得到加密文件;将每个手指的指纹信息与对应的加密文件的对应关系,作为第一索引存储到数据库;
    或者,
    第二加密单元,用于基于用户的指纹信息对待加密信息进行加密,得到加密文件;将所述指纹信息转换为多种字符串或多种验证码,将每个加密文件关联一种字符串或验证码;将每一种字符串与对应的加密文件的对应关系,作为第二索引存储到数据库;将每一种验证码与对应的加密文件的对应关系,作为第三索引存储到数据库。
  8. 如权利要求7所述的装置,其特征在于,所述指纹搜索模块包括:
    第一搜索单元,用于获取用户输入的指纹信息;基于所述数据库中存储的所述第一索引,查找与该指纹信息对应的加密文件;
  9. 如权利要求7所述的装置,其特征在于,所述指纹搜索模块包括:
    第二搜索单元,用于获取用户输入的指纹信息,以及用户选择的由该指纹信息转换的字符串或验证码;基于所述数据库中存储的第二索引或第三索引,查找与该指纹信息对应的加密文件。
  10. 一种终端,其特征在于,所述终端包括:
    指纹输入模块,用于在接收到用户的加密请求时,提供指纹输入界面以供用户输入用于加密的指纹信息;其中,所述加密的指纹信息用于对终端中的待加密信息进行加密,得到加密文件;
    指纹搜索模块,用于在接收到用户的指纹搜索请求时,提供指纹输入界面以供用户输入用于搜索的指纹信息;其中,所述用于搜索的指纹信息用于在所述加密文件中查找与其对应的加密文件。
    文件显示模块,用于在显示界面中显示查找到的加密文件。
PCT/CN2015/082984 2015-05-11 2015-06-30 一种指纹搜索方法、装置及终端 WO2016179889A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510237989.2A CN104866773B (zh) 2015-05-11 2015-05-11 一种指纹搜索方法、装置及终端
CN201510237989.2 2015-05-11

Publications (1)

Publication Number Publication Date
WO2016179889A1 true WO2016179889A1 (zh) 2016-11-17

Family

ID=53912595

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/082984 WO2016179889A1 (zh) 2015-05-11 2015-06-30 一种指纹搜索方法、装置及终端

Country Status (2)

Country Link
CN (1) CN104866773B (zh)
WO (1) WO2016179889A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105677788B (zh) * 2015-12-30 2019-12-27 Oppo广东移动通信有限公司 一种文件查找方法及用户终端
CN106650368A (zh) * 2016-10-12 2017-05-10 珠海格力电器股份有限公司 加密信息的显示方法及装置
CN107784232B (zh) * 2017-10-18 2020-05-05 维沃移动通信有限公司 一种图片处理方法及移动终端
CN111353060B (zh) * 2020-03-16 2020-11-06 黄华 基于区块链的云计算大数据图片存储方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186761A (zh) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 私密文件的指纹加密方法及其通信终端
CN103236930A (zh) * 2013-04-27 2013-08-07 深圳市中兴移动通信有限公司 数据加密方法和系统
CN103699847A (zh) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 指纹加密方法及装置,加密拍摄方法及装置
CN104182675A (zh) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 移动设备终端及其应用隐藏系统和应用隐藏与启动方法
US20140359758A1 (en) * 2012-07-13 2014-12-04 Befs Co., Ltd. Portable storage device using fingerprint recognition, and control method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827148A (zh) * 2010-05-18 2010-09-08 深圳桑菲消费通信有限公司 一种应用于手机的指纹识别系统及其运行方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186761A (zh) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 私密文件的指纹加密方法及其通信终端
US20140359758A1 (en) * 2012-07-13 2014-12-04 Befs Co., Ltd. Portable storage device using fingerprint recognition, and control method thereof
CN103236930A (zh) * 2013-04-27 2013-08-07 深圳市中兴移动通信有限公司 数据加密方法和系统
CN103699847A (zh) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 指纹加密方法及装置,加密拍摄方法及装置
CN104182675A (zh) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 移动设备终端及其应用隐藏系统和应用隐藏与启动方法

Also Published As

Publication number Publication date
CN104866773A (zh) 2015-08-26
CN104866773B (zh) 2018-04-10

Similar Documents

Publication Publication Date Title
JP5591232B2 (ja) 仮想入力レイアウトを用いた情報伝送
KR102361400B1 (ko) 사용자 단말장치, 서비스제공장치, 사용자 단말장치의 구동방법, 서비스제공장치의 구동방법 및 암호화 색인기반 검색 시스템
US9792633B2 (en) Method and system for intelligent processing of electronic information with cloud computing
US9785787B2 (en) Encrypting images on a client device for secure transmission and storage on a storage device
US20130179684A1 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
RU2724293C2 (ru) Персональный поисковый индекс с повышенной конфиденциальностью
WO2016179889A1 (zh) 一种指纹搜索方法、装置及终端
EP3039811B1 (en) Method, content owner device, computer program, and computer program product for distributing content items to authorized users
CN103914541B (zh) 信息搜索的方法及装置
US9639708B2 (en) Methods and systems of encrypting file system directories
US9641328B1 (en) Generation of public-private key pairs
CN103970889A (zh) 一种中英文关键词模糊搜索的安全云盘
WO2022156606A1 (zh) 信息处理方法、装置及电子设备
CN108573161B (zh) 加密方法、应用锁以及电子设备
JP2015118603A (ja) データベース検索システム及び検索方法
JP2013106285A (ja) 携帯端末装置、暗号鍵生成方法、およびプログラム。
CN105430106A (zh) 一种图像或视频公开云中的安全存储方法
TW200910138A (en) Data management method and data management system using the same
US9560022B1 (en) Avoiding collection of biometric data without consent
TWI498759B (zh) 多媒體裝置及其索引管理方法
CN114116636A (zh) 文件发送方法、装置和电子设备
CN101604247A (zh) 由用户自订可携式电子装置应用程序的方法
CN117640563A (zh) 生产数据访问方法、电子设备及可读存储介质
CN117009404A (zh) 一种搜索方法、装置、计算机设备及存储介质
JP2005202825A (ja) 検索システム、データベースシステム、プログラム、及び記憶媒体

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15891592

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11.04.2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15891592

Country of ref document: EP

Kind code of ref document: A1