File processing method and device, electronic equipment and storage medium

A file processing and stored technology, applied in the direction of electrical digital data processing, computer security devices, instruments, etc., can solve the problems of easy decryption and leakage of data, low encryption coefficient, etc., and achieve the effect of increasing the difficulty coefficient of decryption

Pending Publication Date: 2022-06-07
CHINA FIRST AUTOMOBILE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the data is usually encrypted and decrypted based on a single finger vein feature. Due to the low encryption coefficient, the data is easily decrypted and leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File processing method and device, electronic equipment and storage medium
  • File processing method and device, electronic equipment and storage medium
  • File processing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 This is a flowchart of a file processing method provided in Embodiment 1 of the present invention. This embodiment is applicable to the situation of data encryption and decryption. The method can be executed by the file processing apparatus in this embodiment of the present invention, and the apparatus can use software and / or hardware. Optionally, it is implemented by an electronic device, and the electronic device may be a mobile terminal, a PC, or a server. The apparatus may be configured in a computing device, and the file processing method provided in this embodiment specifically includes the following steps:

[0030] S110. When a file access request is received, acquire the hand vein feature corresponding to the target subject.

[0031] The file access request includes at least one of access requests for reading, copying, moving, and deleting file data. File data includes, but is not limited to, vehicle video data, basic user data, vehicle driving data, ...

Embodiment 2

[0062] As an optional embodiment of the above-mentioned embodiment, figure 2 It is a schematic diagram of the file encryption method provided by the second embodiment of the present invention. Specifically, please refer to the following specific content.

[0063] see figure 2, the information that needs to be decrypted in the target vehicle can be selected as the to-be-used file based on user requirements, and the to-be-used file includes but is not limited to vehicle-mounted video data, user data, vehicle driving data, and the like. At this time, the user's finger vein feature collection and palm vein feature collection are collected, and each vein feature is input into the hand vein model to generate the first encryption method; at the same time, some or all of the feature points can also be selected in the finger vein feature collection and palm vein feature collection As the second encryption method for the file; the to-be-used file can be encrypted based on the first ...

Embodiment 3

[0067] Figure 5 It is a structural block diagram of a file processing apparatus provided by Embodiment 3 of the present invention. The device includes: a hand vein feature acquisition module 510 , an icon password retrieval module 520 to be matched, and a target file display module 530 .

[0068] Wherein, the hand vein feature acquisition module 510 is configured to acquire hand vein features corresponding to the target subject when a file access request is received, wherein the hand vein features include finger vein features and palm vein features; the icon to be matched The password retrieval module 520 is used to retrieve the icon password to be matched corresponding to the stored vein feature if the hand vein feature is consistent with the stored vein feature associated with the target vehicle; the target file display module 530: If the password of the icon to be verified corresponding to the trigger operation is consistent with the password of the icon to be matched, de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a file processing method and device, electronic equipment and a storage medium. The method comprises the steps that when a file access request is received, hand vein features corresponding to a target subject are obtained, and if the hand vein features are consistent with stored vein features associated with a target vehicle, a to-be-matched icon password corresponding to the stored vein features is called; and if the to-be-verified icon password corresponding to the trigger operation is consistent with the to-be-matched icon password, determining that a target file corresponding to the file access request is successfully decrypted, and displaying the target file. The problem that the data is easy to leak due to the fact that the encryption coefficient is low when the data is encrypted and decrypted based on the single finger vein feature in the prior art is solved, the difficulty coefficient of data decryption is increased, and the effect of guaranteeing the data security is achieved.

Description

technical field [0001] Embodiments of the present invention relate to computer processing technologies, and in particular, to a file processing method, apparatus, electronic device, and storage medium. Background technique [0002] With the development of informatization, the problem of data protection is particularly prominent, and data security has attracted more and more attention from users. It is difficult to make a big breakthrough in the traditional username and password technology, and a more secure and reliable authentication must be used. way to ensure the security of user data and prevent file leakage. [0003] At present, the method of encrypting files based on vein features has become one of the emerging biometric encryption methods. It uses near-infrared rays to penetrate the finger and then extracts vein pattern features for identification. It has high precision and high speed. The cutting-edge biometric technology realizes the decryption of encrypted data af...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/36G06F21/46G06F21/60
CPCG06F21/32G06F21/36G06F21/46G06F21/602G06F21/604G06F2221/2107G06F2221/2141
Inventor 万晓东刘晔
Owner CHINA FIRST AUTOMOBILE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products