Folder encrypting method

An encryption method and file folder technology, applied in the direction of instruments, digital data authentication, electrical digital data processing, etc., can solve the problems of text encryption failure, easy to be forgotten, and text passwords are easy to be stolen, so as to achieve good security and speech content Flexible and convenient, easy-to-collect effects

Inactive Publication Date: 2015-04-15
SHANGHAI NORMAL UNIVERSITY
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current encryption of folders only protects folders with traditional text passwords. As time goes by, such text passwords are easy to be stolen and forgotten, resulting in the failure of text encryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Folder encrypting method
  • Folder encrypting method
  • Folder encrypting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0038] The invention proposes a folder encryption method, which mainly includes a folder speech encryption and decryption module 1, a folder text encryption and decryption module 2, and a folder speech and text double encryption and decryption module 3.

[0039] Based on the method provided by the present invention, a set of folder encryption system has been constructed, wherein the technology used in the voice encryption and decryption part involved is voiceprint recognition technology, and the overall system design process (as attached figure 1 shown) include:

[0040] A. When entering the folder to be encrypted for the first time, the user can choose to use voice encryption or text encryption or double encryption mode of voice and text.

[0041] B. According to the selected encryption mode, the system guides the user to enter the password in the cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a folder encrypting method, and specifically relates to a mode which combines the voiceprint encrypting technology and text passwords for authenticating the indentify of a folder user and confirming and distinguishing an accessor through the combination so as to ensure the security of information of the user folder, and relates to the technical field of information encrypting. The method involves a folder voice encrypting and decrypting module (1), a folder text encrypting and decrypting module (2), and a folder voice and text combined double-encrypting and decrypting module (3). The method is on the basis of the characteristics that voice signals are the natural properties of people, the voiceprint is unique and cannot be lost, and the voice is easily acquired, so that the safety and reliability are superior to the traditional digital or text encrypting mode; the user can flexibly and conveniently encrypt and decrypt; the mode method in combination of voiceprint encrypting and text encrypting, the text encrypting mode method and the voiceprint encrypting mode method are provided for selecting, so that the dual safety is provided to the folder encrypting, and meanwhile, the demand of the user on flexible encrypting modes is met.

Description

technical field [0001] The present invention relates to the field of information encryption technology, and specifically refers to a method of combining voiceprint encryption technology and text passwords to identify and confirm the identity of folder users and distinguish visitors through the combination of voiceprint passwords and text passwords, thereby Ensure user folder information security. Background technique [0002] With the advent of globalization, networking, informationization, and digitalization, people's demand for highly reliable authentication technology and identification technology is also increasing. The traditional identity authentication technology characterized by text passwords has exposed huge drawbacks, and it is difficult to meet the requirements of high security and long-term security. Today, with the rapid development of biology and information science, biometric authentication technology is a convenient , Advanced information security technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/32
CPCG06F21/6209G06F21/32G06F2221/2107
Inventor 周雷龙艳花叶宏
Owner SHANGHAI NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products