Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fingerprint encryption method of private file and communication terminal

A technology of private files and encryption methods, applied in the field of communication, can solve problems such as inconvenience, achieve the effects of simple operation, superior confidentiality, and improved user experience

Inactive Publication Date: 2013-07-03
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But, the security technology of existing intelligent communication terminal, such as privacy function and password lock, can reduce the loss to a very low level when the intelligent communication terminal is lost, but when the intelligent communication terminal is not lost but in normal use, if the password Under various factors such as leakage or T-FLASH card (T-FLASH card) being stolen, this privacy function still shows its disadvantages that cannot be ignored
Especially the information stored in the T card, such as photos and videos, is easy to be obtained by other non-intelligent communication terminal users
[0004] To sum up, it can be seen that the existing communication terminal encryption technology for private files obviously has inconvenience and defects in actual use, so it is necessary to improve it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint encryption method of private file and communication terminal
  • Fingerprint encryption method of private file and communication terminal
  • Fingerprint encryption method of private file and communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0056] see figure 1 , an embodiment of the present invention provides a communication terminal 100, the communication terminal 100 includes:

[0057] The collection module 10 is used to collect the fingerprints of the owner of the private file and other people;

[0058] An encryption module 20, configured to encrypt the private file using the fingerprint of the owner of the private file; and

[0059] The database 30 is used to store the private file and the fingerprints of the owner of the private file and others.

[0060]In the present invention, the communication terminal 100 includes an acqui...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of communication, and provides a fingerprint encryption method of a private file and a communication terminal. The method comprises the following steps of acquiring fingerprints of an owner of the private file, and encrypting the private file through using the fingerprints. Therefore, the confidentiality of the private file stored by the communication terminal is improved.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a fingerprint encryption method for private files and a communication terminal thereof. Background technique [0002] The increasing popularity of communication terminals has become an indispensable communication tool in people's lives. While the functions of today's intelligent communication terminals are becoming more and more powerful, their security risks are increasing day by day. The privacy functions and password locks of intelligent communication terminals have become indispensable functions of intelligent communication terminals, especially for high-end users who store a large amount of sensitive information and private information in their own intelligent communication terminals. These security functions are even more important. Functions such as privacy function and password lock become a security door of the intelligent communication terminal. [0003] But, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00H04L9/32
Inventor 张辉成伟男陈雪松
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More