+

WO2019036967A1 - Dispositif ayant une fonction de sauvegarde de données et produit associé à ce dernier - Google Patents

Dispositif ayant une fonction de sauvegarde de données et produit associé à ce dernier Download PDF

Info

Publication number
WO2019036967A1
WO2019036967A1 PCT/CN2017/098718 CN2017098718W WO2019036967A1 WO 2019036967 A1 WO2019036967 A1 WO 2019036967A1 CN 2017098718 W CN2017098718 W CN 2017098718W WO 2019036967 A1 WO2019036967 A1 WO 2019036967A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
verification
backup
encrypted
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/098718
Other languages
English (en)
Chinese (zh)
Inventor
叶胡星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Youpinyi Electronic Co Ltd
Original Assignee
Shenzhen Youpinyi Electronic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Youpinyi Electronic Co Ltd filed Critical Shenzhen Youpinyi Electronic Co Ltd
Priority to PCT/CN2017/098718 priority Critical patent/WO2019036967A1/fr
Publication of WO2019036967A1 publication Critical patent/WO2019036967A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to computer technology, and in particular to a device having a data backup function and related products.
  • a smart phone refers to a stand-alone operating system and a separate operating space like a personal computer.
  • the user can install programs such as software, games, navigation, and other third-party service providers, and can implement wireless networks through a mobile communication network.
  • password protection can protect backup data to a certain extent
  • the use of passwords has a lack of reconciliation, that is, secure passwords. It's hard to remember, and passwords that are easy to remember are not secure enough, which makes users need to find a balance between security and easy to remember.
  • the embodiment of the invention provides a data backup method and device, which can ensure the security of the backup data when the user does not need to remember the password.
  • An embodiment of the present invention provides a data backup method, including:
  • the encrypted backup file is saved, and the backup file includes the verification fingerprint information and the backup data.
  • the method further includes:
  • the backup file is decrypted
  • the backup file is not decrypted.
  • the decrypting the backup file includes:
  • the backup data is not decrypted.
  • the method further includes:
  • the backup data obtained by decrypting the backup file and the verification fingerprint are deleted.
  • the verification fingerprint and the encrypted fingerprint are different.
  • Another embodiment of the present invention provides a data backup apparatus, including:
  • the obtaining unit is configured to obtain backup data, and obtain verification fingerprint information used by the user for verification;
  • An encryption unit configured to encrypt the verification fingerprint information and the backup data by using encrypted fingerprint information
  • a saving unit configured to save the encrypted backup file, where the backup file includes the verification fingerprint Information and the backup data.
  • it also includes:
  • a receiving unit configured to receive a backup file acquisition request input by a user, where the obtaining request includes decrypting fingerprint information
  • a determining unit configured to determine the decrypted fingerprint information and the encrypted fingerprint information
  • a decryption unit configured to decrypt the backup file when the determining unit determines that the decrypted fingerprint information and the encrypted fingerprint information are the same; and configured to determine, in the determining unit, the decrypted fingerprint information and the encryption When the fingerprint information is different, the backup file is not decrypted.
  • the decrypting unit is specifically configured to: when decrypting the backup file:
  • the backup data is not decrypted.
  • the acquiring unit is further configured to acquire a fingerprint to be verified input by the user;
  • the determining unit is further configured to determine the fingerprint to be verified and the verification fingerprint
  • the decoding unit is configured to: when the determining unit determines that the fingerprint to be verified is the same as the verification fingerprint, output backup data obtained by decrypting the backup file; and determining, by the determining unit, the fingerprint to be verified When the verification fingerprints are different, the backup data obtained by decrypting the backup file and the verification fingerprint are deleted.
  • the verification fingerprint and the encrypted fingerprint are different.
  • the embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
  • the encrypted backup file is saved, and the backup file includes the verification fingerprint information and the backup data.
  • the method further includes:
  • the backup file is decrypted
  • the backup file is not decrypted.
  • the decrypting the backup file includes:
  • the backup data is not decrypted.
  • the method further includes:
  • the backup data obtained by decrypting the backup file and the verification fingerprint are deleted.
  • the verification fingerprint and the encrypted fingerprint are different.
  • the embodiment of the present invention further provides a data backup device, including: a processor and a memory coupled to each other; and the processor is configured to perform the following steps:
  • the encrypted backup file is saved, and the backup file includes the verification fingerprint information and the backup data.
  • the processor is further configured to: receive a backup file acquisition request input by the user, where the obtaining request includes decrypting the fingerprint information; and if the decrypting fingerprint information And the encrypted fingerprint information is the same, and the backup file is decrypted; if the decrypted fingerprint information and the encrypted fingerprint information are different, the backup file is not decrypted.
  • the decrypting the backup file by the processor includes: decrypting the verification fingerprint; acquiring a fingerprint to be verified input by the user; and if the fingerprint to be verified is the same as the verification fingerprint, decrypting the backup data; If the fingerprint to be verified is different from the verification fingerprint, the backup data is not decrypted.
  • the processor is further configured to: obtain a fingerprint to be verified input by the user; if the fingerprint to be verified is the same as the verification fingerprint, output a backup obtained by decrypting the backup file. Data; if the fingerprint to be verified is different from the verification fingerprint, delete the backup data and the verification fingerprint obtained by decrypting the backup file.
  • the verification fingerprint and the encrypted fingerprint are different.
  • the verification fingerprint information and the backup data are encrypted by the encrypted fingerprint information, so that the encrypted backup data needs to be decrypted when decrypted. Verification of the fingerprint and the encrypted fingerprint can ensure the backup data of the user very safely. At the same time, because the backup data is backed up by using the fingerprint information, the user does not need to remember any password, thereby being convenient for the user to use and safely Protect user data.
  • FIG. 1 is a flowchart of a method for selecting a roaming network according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for selecting a roaming network according to another embodiment of the present invention.
  • FIG. 3 is a structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 4 is a structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 5 is a structural diagram of an apparatus according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a data backup method according to an embodiment of the present invention. As shown in FIG. 1, this embodiment includes:
  • the backup data is data selected by the user and needs to be backed up, and may be various data on the smart terminal; for example, may include contact information, short message, call record, saved WiFi network information, installed application, application Data, pictures, videos, music, operating system settings, alarm information, memo information, and more. Users can choose the data they need to back up according to their needs.
  • the prompt information for the user to input the verification fingerprint is displayed on the display screen.
  • the finger corresponding to the verification fingerprint can be placed at the fingerprint identifier position, and the fingerprint identifier is used to collect the fingerprint. Thereby obtaining verification fingerprint information.
  • the verification fingerprint information may be a character string obtained by a preset algorithm.
  • the fingerprint identifier can be self-contained by the smart terminal, and the fingerprint can be collected by an external fingerprint identifier.
  • the prompt information for allowing the user to input the encrypted fingerprint may be displayed on the display screen. After the user sees the prompt, the finger corresponding to the encrypted fingerprint may be placed at the fingerprint recognizer position, and the fingerprint recognizer Collect fingerprints to obtain encrypted fingerprint information.
  • the encrypted fingerprint information may be calculated into a corresponding character string according to a preset algorithm, and then the verification fingerprint information and the backup data are encrypted by the string.
  • the preset encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm.
  • symmetric encryption means that encryption and decryption use the same key.
  • the encryption technology commonly called “Session Key” is widely used today.
  • the DES encryption standard adopted by the US government is a typical "symmetric”.
  • Encryption method, its Session Key length is 56bits.
  • Asymmetric encryption is not the same key used for encryption and decryption. There are usually two keys, called “public key” and “private key”. They must be paired together. Otherwise, the encrypted file cannot be opened.
  • the "public key” here refers to the publicity, and the "private key” cannot, and can only be known by the holder.
  • the symmetric encryption method is difficult to tell the other party if the encrypted file is transmitted over the network, it may not be eavesdropped by any means.
  • the non-symmetric encryption method has two keys, and the "public key" is publicly available, so it is not afraid of others knowing that the recipient can decrypt it with his own private key, which is good. The transmission security of the key is avoided.
  • a DES algorithm Data Encryption Standard
  • a 3DES (Triple DES) algorithm a symmetric algorithm based on DES, a pair of symmetry algorithms
  • Data is encrypted with three different keys for three times, with higher strength
  • RC2 and RC4 algorithms symmetric algorithm, encrypting large amounts of data with variable length keys, faster than DES
  • IDEA International Data Encryption Algorithm
  • RSA algorithm invented by RSA, is a public key algorithm that supports variable length keys, the length of the file block that needs to be encrypted is also Variable, asymmetric algorithm
  • hash algorithm Hash algorithm to verify fingerprint information and backup data for encryption.
  • the embodiment of the present invention does not limit a specific encryption algorithm, and any encryption algorithm does not affect the implementation of the embodiment of the present invention. However, in practical applications, it is recommended to use an encryption algorithm that does not require very high system resources, thereby increasing the encryption speed.
  • the user may be prompted on the display screen to input another fingerprint different from the verification fingerprint as the encrypted fingerprint.
  • the system continues to use the fingerprint for encryption, thereby reducing the user.
  • the system may prompt the user to input another fingerprint, so that the backup data is not encrypted using the same fingerprint as the verification fingerprint.
  • the backup file can be saved on the smartphone, and then the backup file can be transferred through the communication between the mobile phones; or the backup file can be saved on the external storage disk (such as USB flash drive, mobile hard disk, etc.), through the movement of the storage disk
  • the backup data is transferred; or the backup file can be saved in the cloud, and the backup file can be obtained anywhere that has an Internet connection.
  • the verification fingerprint information and the backup data are encrypted by the encrypted fingerprint information when the data is backed up, so that the encrypted backup data needs to pass the verification finger when decrypting.
  • the double verification of the pattern and the encrypted fingerprint can protect the user's backup data very safely.
  • the backup data since the backup data is backed up by using the fingerprint information, the user does not need to remember any password, thereby being convenient for the user to use and safely protect. User data.
  • FIG. 2 is a flowchart of a method for data backup provided by another embodiment of the present invention, including:
  • the backup data is data selected by the user and needs to be backed up, and may be various data on the smart terminal; for example, may include contact information, short message, call record, saved WiFi network information, installed application, application Data, pictures, videos, music, operating system settings, alarm information, memo information, and more. Users can choose the data they need to back up according to their needs.
  • the prompt information for the user to input the verification fingerprint is displayed on the display screen.
  • the finger corresponding to the verification fingerprint can be placed at the fingerprint identifier position, and the fingerprint identifier is used to collect the fingerprint. Thereby obtaining verification fingerprint information.
  • the verification fingerprint information may be a character string obtained by a preset algorithm.
  • the fingerprint identifier can be self-contained by the smart terminal, and the fingerprint can be collected by an external fingerprint identifier.
  • the prompt information for allowing the user to input the encrypted fingerprint may be displayed on the display screen. After the user sees the prompt, the finger corresponding to the encrypted fingerprint may be placed at the fingerprint recognizer position, and the fingerprint recognizer Collect fingerprints to obtain encrypted fingerprint information.
  • the encrypted fingerprint information may be calculated into a corresponding character string according to a preset algorithm, and then the verification fingerprint information and the backup data are encrypted by the string.
  • the backup file can be saved on the smartphone, and then the backup file can be transferred through the communication between the mobile phones; or the backup file can be saved on the external storage disk (such as USB flash drive, mobile hard disk, etc.), through the movement of the storage disk
  • the backup data is transferred; or the backup file can be saved in the cloud, and the backup file can be obtained anywhere that has an Internet connection.
  • the file can be decrypted, thereby obtaining backup data, such as contact information, short message, call record, saved WiFi network information, installed application,
  • backup data such as contact information, short message, call record, saved WiFi network information, installed application.
  • the application's data, pictures, videos, music, operating system settings, alarm information, memo information, etc. are transferred to the new smart terminal without much manual setup.
  • the prompt information for allowing the user to input the decrypted fingerprint may be displayed on the display screen.
  • the finger corresponding to the decrypted fingerprint may be placed at the fingerprint identifier position, and the fingerprint is The recognizer collects fingerprints to obtain decrypted fingerprint information.
  • the user may be further prompted to decrypt the fingerprint as a fingerprint used when encrypting the backup data, so that the user can determine which finger is used for decryption more quickly.
  • step 206 Determine whether the decrypted fingerprint information is the same as the encrypted fingerprint information; if the decrypted fingerprint information and the encrypted fingerprint information are the same, go to step 207; if the decrypted fingerprint information and the encrypted fingerprint information are different, Proceed to step 208.
  • the decrypted fingerprint information may be converted into a character string by using the same algorithm as that used in encryption, and then the string is used as a decrypted password to decode the backup file; if the string is the same as the encrypted string, the decryption can be successfully performed. Conversely, if the string is not the same as the encrypted string, the decryption cannot be successful.
  • the verification of the fingerprint is performed while the backup file is being decoded.
  • the process of decrypting the backup file may include:
  • Decrypting the backup file to obtain the verification fingerprint information acquiring the fingerprint to be verified input by the user; if the fingerprint to be verified is the same as the verification fingerprint, decrypting the backup data; if the fingerprint to be verified and the verification fingerprint Not the same, the backup data is not decrypted.
  • the verification of the verification fingerprint is performed.
  • the method provided by the embodiment of the present invention may further include: acquiring a fingerprint to be verified input by the user; And the same as the verification fingerprint, outputting the backup data obtained by decrypting the backup file; if the fingerprint to be verified is different from the verification fingerprint, deleting the backup data and the verification fingerprint obtained by decrypting the backup file.
  • the user may be prompted to verify the verification fingerprint on the display screen.
  • the fingerprint to be verified can be collected; the same algorithm as the verification fingerprint information is used to calculate the verification fingerprint to obtain the verification target.
  • the specific information of the fingerprint information to be verified may be a character string, and the character string corresponding to the fingerprint to be verified is compared with the saved character string corresponding to the verification fingerprint, and the character string corresponding to the fingerprint to be verified and the saved If the verification string is the same, the verification is successful. Otherwise, if the character string corresponding to the fingerprint to be verified is different from the saved character string corresponding to the verification fingerprint, the verification is unsuccessful.
  • the backup file is not decrypted.
  • the verification fingerprint information and the backup data are encrypted by the encrypted fingerprint information when the data is backed up, so that the encrypted backup data needs to be verified by the double verification of the verification fingerprint and the encrypted fingerprint when decrypting, which can be very safe.
  • the user's backup data is protected, and since the backup data is backed up using the fingerprint information, the user does not need to remember any password, thereby being convenient for the user to use and securely protecting the user data.
  • FIG. 3 illustrates a structure of a data backup apparatus according to an embodiment of the present invention, including:
  • the obtaining unit 301 is configured to acquire backup data, and obtain verification fingerprint information used by the user for verification.
  • the backup data is data selected by the user and needs to be backed up, and may be various data on the smart terminal; for example, may include contact information, short message, call record, saved WiFi network information, installed application, application Data, pictures, videos, music, operating system settings, alarm information, memo information, and more. Users can choose the data they need to back up according to their needs.
  • the prompt information for the user to input the verification fingerprint is displayed on the display screen.
  • the finger corresponding to the verification fingerprint can be placed at the fingerprint identifier position, and the fingerprint identifier is used to collect the fingerprint. Thereby obtaining verification fingerprint information.
  • the verification fingerprint information may be a character string obtained by a preset algorithm.
  • the fingerprint identifier can be self-contained by the smart terminal, and the fingerprint can be collected by an external fingerprint identifier.
  • the encryption unit 302 is configured to encrypt the verification fingerprint information and the backup data by using the encrypted fingerprint information.
  • the prompt information for allowing the user to input the encrypted fingerprint may be displayed on the display screen. After the user sees the prompt, the finger corresponding to the encrypted fingerprint may be placed at the fingerprint recognizer position, and the fingerprint recognizer Collect fingerprints to obtain encrypted fingerprint information.
  • the encrypted fingerprint information may be calculated according to a preset algorithm. It is counted as the corresponding string, and then the verification fingerprint information and the backup data are encrypted by the string.
  • the preset encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm.
  • symmetric encryption means that encryption and decryption use the same key.
  • the encryption technology commonly called “Session Key” is widely used today.
  • the DES encryption standard adopted by the US government is a typical "symmetric”.
  • Encryption method, its Session Key length is 56bits.
  • Asymmetric encryption is not the same key used for encryption and decryption. There are usually two keys, called “public key” and “private key”. They must be paired together. Otherwise, the encrypted file cannot be opened.
  • the "public key” here refers to the publicity, and the "private key” cannot, and can only be known by the holder.
  • the symmetric encryption method is difficult to tell the other party if the encrypted file is transmitted over the network, no matter what method is used, it may be hacked.
  • the non-symmetric encryption method has two keys, and the "public key" is publicly available, so it is not afraid of others knowing that the recipient can decrypt it with his own private key, which is good. The transmission security of the key is avoided.
  • a DES algorithm Data Encryption Standard
  • a 3DES (Triple DES) algorithm a symmetric algorithm based on DES, a pair of symmetry algorithms
  • Data is encrypted with three different keys for three times, with higher strength
  • RC2 and RC4 algorithms symmetric algorithm, encrypting large amounts of data with variable length keys, faster than DES
  • IDEA International Data Encryption Algorithm
  • RSA algorithm invented by RSA, is a public key algorithm that supports variable length keys, the length of the file block that needs to be encrypted is also Variable, asymmetric algorithm
  • hash algorithm Hash algorithm to verify fingerprint information and backup data for encryption.
  • the embodiment of the present invention does not limit a specific encryption algorithm, and any encryption algorithm does not affect the implementation of the embodiment of the present invention. However, in practical applications, it is recommended to use an encryption algorithm that does not require very high system resources, thereby increasing the encryption speed.
  • the user may be prompted on the display screen to input another fingerprint different from the verification fingerprint as the encrypted fingerprint.
  • the system continues to use the fingerprint for encryption, thereby reducing the user.
  • the system may prompt the user to input another fingerprint, so that the backup data is not encrypted using the same fingerprint as the verification fingerprint.
  • the saving unit 303 is configured to save the encrypted backup file, where the backup file includes the verification fingerprint information and the backup data.
  • the backup file can be saved on the smartphone, and then the backup file can be transferred through the communication between the mobile phones; or the backup file can be saved on the external storage disk (such as USB flash drive, mobile hard disk, etc.), through the movement of the storage disk
  • the backup data is transferred; or the backup file can be saved in the cloud, and the backup file can be obtained anywhere that has an Internet connection.
  • the verification fingerprint information and the backup data are encrypted by the encrypted fingerprint information when the data is backed up, so that the encrypted backup data needs to be verified by the double verification of the verification fingerprint and the encrypted fingerprint when decrypting, which can be very safe.
  • the user's backup data is protected, and since the backup data is backed up using the fingerprint information, the user does not need to remember any password, thereby being convenient for the user to use and securely protecting the user data.
  • Figure 4 is a diagram showing the structure of a data backup device according to another embodiment of the present invention, including:
  • the obtaining unit 301 is configured to acquire backup data, and obtain verification fingerprint information used by the user for verification.
  • the backup data is data selected by the user and needs to be backed up, and may be various data on the smart terminal; for example, may include contact information, short message, call record, saved WiFi network information, installed application, application Data, pictures, videos, music, operating system settings, alarm information, memo information, and more. Users can choose the data they need to back up according to their needs.
  • the prompt information for the user to input the verification fingerprint is displayed on the display screen.
  • the finger corresponding to the verification fingerprint can be placed at the fingerprint identifier position, and the fingerprint identifier is used to collect the fingerprint. Thereby obtaining verification fingerprint information.
  • the verification fingerprint information may be a character string obtained by a preset algorithm.
  • the fingerprint identifier can be self-contained by the smart terminal, and the fingerprint can be collected by an external fingerprint identifier.
  • the encryption unit 302 is configured to encrypt the verification fingerprint information and the backup data by using the encrypted fingerprint information.
  • the prompt information for allowing the user to input the encrypted fingerprint may be displayed on the display screen. After the user sees the prompt, the finger corresponding to the encrypted fingerprint may be placed at the fingerprint recognizer position, and the fingerprint recognizer Collect fingerprints to obtain encrypted fingerprint information.
  • the encrypted fingerprint information may be calculated according to a preset algorithm. It is counted as the corresponding string, and then the verification fingerprint information and the backup data are encrypted by the string.
  • the embodiment of the present invention does not limit a specific encryption algorithm, and any encryption algorithm does not affect the implementation of the embodiment of the present invention. However, in practical applications, it is recommended to use an encryption algorithm that does not require very high system resources, thereby increasing the encryption speed.
  • the user may be prompted on the display screen to input another fingerprint different from the verification fingerprint as the encrypted fingerprint.
  • the system continues to use the fingerprint for encryption, thereby reducing the user.
  • the system may prompt the user to input another fingerprint, so that the backup data is not encrypted using the same fingerprint as the verification fingerprint.
  • the saving unit 303 is configured to save the encrypted backup file, where the backup file includes the verification fingerprint information and the backup data.
  • the backup file can be saved on the smartphone, and then the backup file can be transferred through the communication between the mobile phones; or the backup file can be saved on the external storage disk (such as USB flash drive, mobile hard disk, etc.), through the movement of the storage disk
  • the backup data is transferred; or the backup file can be saved in the cloud, and the backup file can be obtained anywhere that has an Internet connection.
  • the receiving unit 304 is configured to receive a backup file acquisition request input by the user, where the obtaining request includes decrypting the fingerprint information.
  • the file can be decrypted, thereby obtaining backup data, such as contact information, short message, call record, saved WiFi network information, installed application,
  • backup data such as contact information, short message, call record, saved WiFi network information, installed application.
  • the application's data, pictures, videos, music, operating system settings, alarm information, memo information, etc. are transferred to the new smart terminal without much manual setup.
  • the prompt information for allowing the user to input the decrypted fingerprint may be displayed on the display screen.
  • the finger corresponding to the decrypted fingerprint may be placed at the fingerprint identifier position, and the fingerprint is The recognizer collects fingerprints to obtain decrypted fingerprint information.
  • the user may be further prompted to decrypt the fingerprint as a fingerprint used when encrypting the backup data, so that the user can determine which finger is used for decryption more quickly.
  • the determining unit 305 is configured to determine the decrypted fingerprint information and the encrypted fingerprint information.
  • the decrypted fingerprint information can be converted into a character string by using the same algorithm as when encrypting,
  • the string is then used as a decryption password to decode the backup file; if the string is the same as the encrypted string, the decryption can be successful. Conversely, if the string is not the same as the encrypted string, the decryption cannot be successful.
  • the decrypting unit 306 is configured to decrypt the backup file when the determining unit 305 determines that the decrypted fingerprint information and the encrypted fingerprint information are the same; and the determining unit 305 determines the decrypted fingerprint information and the When the encrypted fingerprint information is different, the backup file is not decrypted.
  • the verification of the fingerprint is performed while the backup file is being decoded.
  • the decryption unit 306 is specifically configured to: decrypt the verification fingerprint when decrypting the backup file; Obtaining a fingerprint to be verified input by the user; if the fingerprint to be verified is the same as the verification fingerprint, decrypting the backup data; if the fingerprint to be verified is different from the verification fingerprint, the backup data is not decrypted.
  • the obtaining unit 301 is further configured to acquire a fingerprint to be verified input by the user;
  • the determining unit 305 further The determining unit 306 is configured to: when the determining unit determines that the to-be-verified fingerprint is the same as the verification fingerprint, output and decrypt the backup file to obtain And the backup data obtained by decrypting the backup file and the verification fingerprint are deleted when the determining unit determines that the to-be-verified fingerprint is different from the verification fingerprint.
  • the user may be prompted to verify the verification fingerprint on the display screen.
  • the fingerprint to be verified can be collected; the same algorithm as the verification fingerprint information is used to calculate the fingerprint to be verified, and the specific expression of the fingerprint information to be verified can be A string is used to compare the string corresponding to the fingerprint to be verified with the saved string corresponding to the verification fingerprint.
  • the verification is successful.
  • the character string corresponding to the fingerprint to be verified is different from the saved character string corresponding to the verification fingerprint, the verification is unsuccessful.
  • the verification fingerprint information and the backup data are encrypted by the encrypted fingerprint information when the data is backed up, so that the encrypted backup data needs to be verified by the double verification of the verification fingerprint and the encrypted fingerprint when decrypting, which can be very safe.
  • the user's backup data is protected, and since the backup data is backed up using the fingerprint information, the user does not need to remember any password, thereby being convenient for the user to use and securely protecting the user data.
  • An embodiment of the present invention further provides a computer readable storage medium, the computer readable storage medium
  • the program code is stored, and the program code includes instructions for performing the following steps:
  • the encrypted backup file is saved, and the backup file includes the verification fingerprint information and the backup data.
  • the method further includes:
  • the backup file is decrypted
  • the backup file is not decrypted.
  • the decrypting the backup file includes:
  • the backup data is not decrypted.
  • the method further includes:
  • the backup data obtained by decrypting the backup file and the verification fingerprint are deleted.
  • the verification fingerprint and the encrypted fingerprint are different.
  • an embodiment of the present invention further provides a data backup apparatus 500, including: a processor 510 and a memory 520 coupled to each other; and the processor 510 is configured to perform the following steps:
  • the encrypted backup file is saved, and the backup file includes the verification fingerprint information and the backup data.
  • the processor is further configured to: receive a backup file acquisition request input by the user, where the obtaining request includes decrypting the fingerprint information; and if the decrypting fingerprint information and the encrypted fingerprint The information is the same, and the backup file is decrypted; if the decrypted fingerprint information and the encrypted fingerprint information are different, the backup file is not decrypted.
  • the decrypting the backup file by the processor includes: decrypting the verification fingerprint; acquiring a fingerprint to be verified input by the user; and if the fingerprint to be verified is the same as the verification fingerprint, decrypting the backup data; If the fingerprint to be verified is different from the verification fingerprint, the backup data is not decrypted.
  • the processor is further configured to: obtain a fingerprint to be verified input by the user; if the fingerprint to be verified is the same as the verification fingerprint, output a backup obtained by decrypting the backup file. Data; if the fingerprint to be verified is different from the verification fingerprint, delete the backup data and the verification fingerprint obtained by decrypting the backup file.
  • the verification fingerprint and the encrypted fingerprint are different.
  • the content is based on the same concept as the method embodiment of the present invention.
  • the description in the method embodiment of the present invention and details are not described herein again.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un dispositif de sauvegarde de données qui comprend un processeur configuré : pour acquérir des données pour une sauvegarde ; pour acquérir des informations d'empreinte digitale de vérification d'un utilisateur utilisées pour une vérification ; pour crypter les informations d'empreinte digitale de vérification et les données pour une sauvegarde à l'aide d'informations d'empreinte digitale de cryptage ; et pour sauvegarder le fichier de sauvegarde crypté, le fichier de sauvegarde comportant les informations d'empreinte digitale de vérification et les données pour la sauvegarde. Le procédé ci-dessus peut assurer la sécurité des données de sauvegarde sans demander à un utilisateur de se souvenir d'un mot de passe.
PCT/CN2017/098718 2017-08-23 2017-08-23 Dispositif ayant une fonction de sauvegarde de données et produit associé à ce dernier Ceased WO2019036967A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/098718 WO2019036967A1 (fr) 2017-08-23 2017-08-23 Dispositif ayant une fonction de sauvegarde de données et produit associé à ce dernier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/098718 WO2019036967A1 (fr) 2017-08-23 2017-08-23 Dispositif ayant une fonction de sauvegarde de données et produit associé à ce dernier

Publications (1)

Publication Number Publication Date
WO2019036967A1 true WO2019036967A1 (fr) 2019-02-28

Family

ID=65438211

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/098718 Ceased WO2019036967A1 (fr) 2017-08-23 2017-08-23 Dispositif ayant une fonction de sauvegarde de données et produit associé à ce dernier

Country Status (1)

Country Link
WO (1) WO2019036967A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259659A (zh) * 2013-04-12 2013-08-21 杭州晟元芯片技术有限公司 一种数字签名和笔迹、指纹结合的身份认证装置及方法
US8995654B2 (en) * 2009-05-28 2015-03-31 Emulex Corporation Method for verifying correct encryption key utilization
CN105809070A (zh) * 2016-03-14 2016-07-27 贵州大学 一种u盘指纹认证加密方法
CN106789017A (zh) * 2016-12-26 2017-05-31 西安电子科技大学 基于生物特征加密的账户信息统一管理方法
CN107590026A (zh) * 2017-08-23 2018-01-16 深圳市优品壹电子有限公司 一种数据备份方法及装置
CN107704743A (zh) * 2017-08-23 2018-02-16 深圳市优品壹电子有限公司 具有数据备份功能的装置和相关产品

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8995654B2 (en) * 2009-05-28 2015-03-31 Emulex Corporation Method for verifying correct encryption key utilization
CN103259659A (zh) * 2013-04-12 2013-08-21 杭州晟元芯片技术有限公司 一种数字签名和笔迹、指纹结合的身份认证装置及方法
CN105809070A (zh) * 2016-03-14 2016-07-27 贵州大学 一种u盘指纹认证加密方法
CN106789017A (zh) * 2016-12-26 2017-05-31 西安电子科技大学 基于生物特征加密的账户信息统一管理方法
CN107590026A (zh) * 2017-08-23 2018-01-16 深圳市优品壹电子有限公司 一种数据备份方法及装置
CN107704743A (zh) * 2017-08-23 2018-02-16 深圳市优品壹电子有限公司 具有数据备份功能的装置和相关产品

Similar Documents

Publication Publication Date Title
US10348715B2 (en) Computer-implemented systems and methods of device based, internet-centric, authentication
JP6701364B2 (ja) パスワードなしのコンピュータログインのサービス支援モバイルペアリングのためのシステム及び方法
JP6182589B2 (ja) 安全な第三者データ記憶のためのシステム及び方法
US10127317B2 (en) Private cloud API
CN108989848A (zh) 一种视频资源文件的获取方法和管理系统
TW201901473A (zh) 資料備份方法、裝置、存儲介質及伺服器
WO2013097588A1 (fr) Terminal mobile, dispositif et procédé de connexion à une application
US10045212B2 (en) Method and apparatus for providing provably secure user input/output
TW201814547A (zh) 電子裝置、伺服器、通訊系統及通訊方法
WO2017024804A1 (fr) Procédé de chiffrement de données, procédé, appareil et système de déchiffrement
CN109922027B (zh) 一种可信身份认证方法、终端及存储介质
WO2020062784A1 (fr) Procédé et appareil de paiement sécurise, et serveur et support de stockage
WO2016045464A1 (fr) Procédé de déchiffrement et terminal mobile
US10043015B2 (en) Method and apparatus for applying a customer owned encryption
CN105337729A (zh) 一种移动终端的加密方法、装置及移动终端
CN116112172B (zh) Android客户端gRPC接口安全校验的方法和装置
WO2019120038A1 (fr) Mémorisation chiffrée de données
US10462113B1 (en) Systems and methods for securing push authentications
CN108040048A (zh) 一种基于http协议的移动客户端用户动态秘钥加密通讯方法
CN104767766B (zh) 一种Web Service接口验证方法、Web Service服务器、客户端
CN103036852B (zh) 一种实现网络登录的方法以及装置
CN111639357B (zh) 一种加密网盘系统及其认证方法和装置
US10218505B1 (en) Server based settings for client software with asymmetric signing
CN103618612A (zh) 一种实现终端应用单点登录的方法及装置
WO2016050118A1 (fr) Procédé et dispositif de traitement d'informations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17922374

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.09.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17922374

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载