CN104092550B - Cipher code protection method, system and device - Google Patents

Cipher code protection method, system and device Download PDF

Info

Publication number
CN104092550B
CN104092550B CN201410352498.8A CN201410352498A CN104092550B CN 104092550 B CN104092550 B CN 104092550B CN 201410352498 A CN201410352498 A CN 201410352498A CN 104092550 B CN104092550 B CN 104092550B
Authority
CN
China
Prior art keywords
smart machine
password
protection equipment
mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410352498.8A
Other languages
Chinese (zh)
Other versions
CN104092550A (en
Inventor
刘春海
孙海
赵诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics China R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Electronics China R&D Center
Priority to CN201410352498.8A priority Critical patent/CN104092550B/en
Publication of CN104092550A publication Critical patent/CN104092550A/en
Application granted granted Critical
Publication of CN104092550B publication Critical patent/CN104092550B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention proposes a kind of cipher code protection method, system and device, and wherein method includes:Password protection equipment receives the password reporting message from smart machine, the encrypted message after mark, the mark of application scenarios and encryption of the password reporting message comprising smart machine;After being proved to be successful to the smart machine, the encrypted message after the mark of the preservation application scenarios and corresponding encryption;Password protection equipment receives the password request message from smart machine, the mark of mark and application scenarios of the password request message package containing smart machine;After being proved to be successful to the smart machine, according to the encrypted message after the corresponding encryption of the identifier lookup of the application scenarios, the encrypted message after the encryption found is fed back into the smart machine;Encrypted message after encryption is decrypted the smart machine, the encrypted message inputted in the application scenarios after the decryption.The present invention can avoid the encrypted message risk stolen because being taken or recording.

Description

Cipher code protection method, system and device
Technical field
The present invention relates to cipher application technical field, more particularly to a kind of cipher code protection method, system and device.
Background technology
With more and more, the functional diversities of mobile phone application of cellphone subscriber, surfed the Net, chatted using mobile phone, purchase Thing etc., the life of the people of great convenience.
Under different application scenarios, it is close that user usually requires input username and password etc. on mobile phone screen or keyboard Code information, for login application program (such as E-mail address, Web bank, immediate communication tool), therefore user needs memory Substantial amounts of encrypted message, either inputs or remembers these encrypted messages, extremely inconvenient experience is all brought to user.More Seriously, to input possibility during password in the presence of the record that is taken on mobile phone screen or keyboard, therefore bring password stolen Risk.
The content of the invention
The invention provides a kind of cipher code protection method, the encrypted message wind stolen because being taken or recording can be avoided Danger.
The invention provides cipher protection system and device, encrypted message can be avoided stolen because being taken or recording Risk.
The technical proposal of the invention is realized in this way:
A kind of cipher code protection method, including:
Password protection equipment receives the password reporting message from smart machine, and the password reporting message is set comprising intelligence Encrypted message after standby mark, the mark of application scenarios and encryption;After being proved to be successful to the smart machine, preserve described Encrypted message after the mark of application scenarios and corresponding encryption;
Password protection equipment receives the password request message from smart machine, and the password request message package is set containing intelligence Standby mark and the mark of application scenarios;After being proved to be successful to the smart machine, looked into according to the mark of the application scenarios The encrypted message looked for after corresponding encryption, the smart machine is fed back to by the encrypted message after the encryption found;
Encrypted message after encryption is decrypted the smart machine, is inputted in the application scenarios after the decryption Encrypted message.
A kind of cipher protection system, including:Password protection equipment and more than one smart machine, wherein:
The password protection equipment, for receiving the password reporting message from smart machine, the password reporting message Encrypted message after the mark of mark, application scenarios comprising smart machine and encryption, is proved to be successful to the smart machine Afterwards, preserve the application scenarios mark and corresponding encryption after encrypted message;It is additionally operable to receive from the close of smart machine Code request message, the mark of mark and application scenarios of the password request message package containing smart machine is set to the intelligence For after being proved to be successful, according to the encrypted message after the corresponding encryption of the identifier lookup of the application scenarios, by the encryption found Encrypted message afterwards feeds back to the smart machine;
The smart machine, for reporting password reporting message and password request message to password protection equipment, is additionally operable to Encrypted message after the encryption fed back to password protection equipment is decrypted, and is inputted in the application scenarios after the decryption Encrypted message.
A kind of password protection equipment, including:
Interactive module, the mark for receiving smart machine receives password reporting message and password from smart machine Request message, and feed back the encrypted message after encryption to smart machine;Wherein, the password reporting message includes smart machine Encrypted message after mark, the mark of application scenarios and encryption, mark of the password request message package containing smart machine and should With the mark of scene;
Smart machine identification module, the mark for preserving smart machine;The password received for interactive module, which is reported, to disappear Breath and password request message, judge whether to preserve the mark of the password reporting message or the smart machine in password request message Know, if preserved, the smart machine is proved to be successful;
Encryption Decryption module, for preserving the public key and private key of password protection equipment and the public key of smart machine;Using institute The encrypted message after encrypting in the private key pair cryptography reporting message of password protection equipment is stated to be decrypted, then with the public affairs of smart machine Information after decryption is encrypted key;
Encrypted message memory module, for storing after the mark of application scenarios and the public key encryption of corresponding use smart machine Encrypted message;
Encrypted message selecting module, is deposited for the identifier lookup encrypted message using the application scenarios in password request message Module is stored up, the encrypted message after the public key encryption of corresponding use smart machine is obtained, is fed back for interactive module to smart machine.
A kind of smart machine for realizing cryptoguard, including:
Interactive module, for sending password reporting message and password request message to password protection equipment, and receives password Encrypted message after the encryption of protection equipment feedback;Wherein, the password reporting message includes mark, the applied field of smart machine Encrypted message after the mark of scape and encryption, the mark of mark and application scenarios of the password request message package containing smart machine Know;
Smart machine identifies memory module, the mark for storing the smart machine;
Encryption Decryption module, for preserving the public key and private key of smart machine and the public key of password protection equipment;It will need The encrypted message of transmission is encrypted using the public key of password protection equipment, and the encrypted message after the encryption received is used into intelligence The private key of energy equipment is decrypted;
Foreground application detection module, for detecting foreground application, interactive module is supplied to by the mark of application scenarios.
It can be seen that, cipher code protection method proposed by the present invention, system and device pre-save intelligence by password protection equipment and set The standby encrypted message in different application scene;When smart machine needs input encrypted message, directly to password protection equipment Acquisition request encrypted message, and the encrypted message of acquisition is inputted in application scenarios.This mode is without manually inputting Encrypted message, it is thus possible to avoid encrypted message stolen because being taken or recording in manual input process.
Brief description of the drawings
Fig. 1 is cipher code protection method implementation process figure proposed by the present invention;
Fig. 2 is the implementation process figure of embodiment one;
Fig. 3 is the implementation process figure of embodiment two;
Fig. 4 is the implementation process figure of embodiment three;
Fig. 5 is cipher protection system structural representation proposed by the present invention;
Fig. 6 is password protection equipment structural representation proposed by the present invention;
Fig. 7 is the intelligent terminal structural representation proposed by the present invention for realizing cryptoguard.
Embodiment
The present invention proposes a kind of cipher code protection method, and such as Fig. 1 is this method implementation process figure, including:
Step 101:Password protection equipment receives the password reporting message from smart machine, the password reporting message bag Encrypted message after the mark of mark, application scenarios containing smart machine and encryption;
Step 102:Password protection equipment preserves the mark of the application scenarios after being proved to be successful to the smart machine And the encrypted message after corresponding encryption;
Step 103:Password protection equipment receives the password request message from smart machine, the password request message package The mark of mark and application scenarios containing smart machine;
Step 104:Password protection equipment to the smart machine after being proved to be successful, according to the mark of the application scenarios The encrypted message after corresponding encryption is searched, the encrypted message after the encryption found is fed back into the smart machine;
Step 105:Encrypted message after encryption is decrypted smart machine, and the solution is inputted in the application scenarios Encrypted message after close.
Above-mentioned encrypted message needs the information such as user name, the password inputted when can include logging in application scenarios.
Smart machine is reported to password protection equipment before encrypted message, and smart machine and password protection equipment can be advance Initialization pairing is carried out, checking each other is performed so as to after.Specifically:
Before above-mentioned steps 101, further comprise:The password protection equipment receives and preserves the mark of smart machine, Also, the smart machine receives and preserves the mark of password protection equipment;
Correspondingly, in above-mentioned steps 102 or step 104, password protection equipment can be to the mode that smart machine is verified: Judge whether to preserve the mark of the password reporting message or the smart machine in password request message, if preserved, The smart machine is proved to be successful;
In above-mentioned steps 104, password protection equipment further can set the identification feedback of password protection equipment to intelligence It is standby;Smart machine judges whether to preserve the mark of the password protection equipment, if preserved, and judges to protect the password Device authentication success is protected, step 105 is further performed.
In order to ensure security of the encrypted message in transmitting procedure, it is transmitted again after being encrypted to encrypted message. AES can use symmetric key encryption or asymmetric-key encryption.
If using asymmetric-key encryption, smart machine and password protection equipment exchange public key, exchange public key process Synchronous with initialization pairing process it can carry out;When sending encrypted message, it is encrypted using the public key of recipient;Receiving During encrypted message, it is decrypted using the private key of itself.Specifically:
Before above-mentioned steps 101, it may further include:Password protection equipment preserves public key and the private of password protection equipment Key, the public key of password protection equipment is sent to smart machine, smart machine preserves the public key of password protection equipment;Also, intelligence Energy equipment preserves the public key and private key of smart machine, the public key of smart machine is sent to password protection equipment, cryptoguard is set The standby public key for preserving smart machine;
The encrypted message after encryption in above-mentioned steps 101 is:Using the password after the public key encryption of password protection equipment Information;
In above-mentioned steps 102, password protection equipment to the smart machine after being proved to be successful, first using cryptoguard Information after the private key pair encryption of equipment is decrypted, then the information after decryption is encrypted using the public key of smart machine, The encrypted message after re-encrypted is obtained, the encrypted message after the mark and corresponding re-encrypted of application scenarios is preserved;
Encrypted message after the encryption of feedback in above-mentioned steps 104 is:Using close after the public key encryption of smart machine Code information;
In above-mentioned steps 105, smart machine is decrypted using the encrypted message after the private key pair encryption of smart machine.
If using symmetric key encryption, it is symmetrically close that smart machine and password protection equipment can pre-save identical Key, when sending encrypted message, is encrypted using the symmetric key;When receiving encrypted message, entered using the symmetric key Row decryption.Specifically:
Before above-mentioned steps 101, it may further include:It is symmetrically close that password protection equipment and smart machine preserve identical Key;
The encrypted message after encryption in above-mentioned steps 101 is:Using the encrypted message after the symmetric key encryption;
In above-mentioned steps 105, the encrypted message after encryption is decrypted using the symmetric key for smart machine.
In addition, the other information in addition to encryption information transmitted in said process, mark, the applied field of such as smart machine The information such as the mark of scape, the mark of password protection equipment, it would however also be possible to employ transmitted again after AES encryption.
Smart machine and password protection equipment can be communicated using modes such as bluetooth, NFC or WIFI.Smart machine can have Body is the equipment such as smart mobile phone, tablet personal computer;Password protection equipment can be specially wearable smart machine etc.;Implement following It is specially smart mobile phone by smart machine, and be specially that wearable smart machine is introduced by password protection equipment in example.
Specific embodiment is lifted below to be discussed in detail.
Embodiment one:
The present embodiment introduces initialization pairing and exchange of public keys process of the smart mobile phone with wearable smart machine.Such as Fig. 2 For the implementation process figure of the present embodiment, including:
Step 201:Smart mobile phone and wearable smart machine respectively enter initialization pairing mode.
Step 202:Smart mobile phone and wearable smart machine ask the mark (ID) and public key of other side respectively.
Step 203:Smart mobile phone and wearable smart machine send the ID and public key of itself to other side respectively.
Step 204:Smart mobile phone and wearable smart machine receive and preserve the ID and public key of other side respectively.
By said process, smart mobile phone completes initialization pairing and exchange of public keys with wearable smart machine.It can wear Initialization pairing can be carried out with multiple smart mobile phones by wearing smart machine, realize and the encrypted message of multiple smart mobile phones is managed.
The public key and private key and wearable smart machine of smart mobile phone are preserved after exchange of public keys, in smart mobile phone Public key, subsequently send encrypted message when, using wearable smart machine public key to encrypted message encrypt after send;Receive During to encrypted message, decrypted using the private key of smart mobile phone.The public affairs of wearable smart machine are preserved in wearable smart machine The public key of key and private key and smart mobile phone, when subsequently sending encrypted message, using the public key of smart mobile phone to encrypted message Sent after encryption;When receiving encrypted message, decrypted using the private key of wearable smart machine.
Embodiment two:
The present embodiment introduces the process that smart mobile phone reports encrypted message to wearable smart machine, in the present embodiment, Encrypted message specifically includes username and password.Such as Fig. 3 is the implementation process figure of the present embodiment, including:
Step 301:Smart mobile phone collects foreground application scene.
Step 302:Smart mobile phone obtains the ID of smart mobile phone.
Step 303:Smart mobile phone obtains the username and password in the application scenarios of user's input.
Step 304:Smart mobile phone using wearable smart machine public key to the ID of smart mobile phone, the ID of application scenarios, Username and password is encrypted.
Step 305:Smart mobile phone sends the information after encryption to wearable smart machine.
Step 306:The information of reception is decrypted using the private key of wearable smart machine for wearable smart machine; ID, the username and password of ID, application scenarios to smart mobile phone.
Step 307:Wearable smart machine judges whether itself has preserved the ID of the smart mobile phone, if preserved, Then the smart mobile phone is proved to be successful, step 308 is continued executing with.
Step 308:Username and password is encrypted using the public key of smart mobile phone for wearable smart machine, and preserving should With the corresponding relation of the username and password after the ID of scene and encryption, application scenarios list index is set up.If table 1 below is application " * * * * * " are represented by the ciphertext after the public key encryption of smart mobile phone in scene list index example, table 1.
Sequence number Apply Names User name Password
1 Netease's mailbox ***** *****
2 Alipay ***** *****
3 Hotmail mailboxes ***** *****
4 QQ ***** *****
Table 1
Step 309:Wearable smart machine stores successful message to smart mobile phone feedback.
By repeating said process, wearable smart machine can receive the message in cipher that more than one smart mobile phone is reported Breath, preserves the corresponding username and password of multiple application scenarios;Subsequently when receiving the request of smart mobile phone, by corresponding password Feedback of the information is to smart mobile phone.
Embodiment three:
The present embodiment introduces the process that smart mobile phone obtains encrypted message from wearable smart machine.If Fig. 4 is this implementation The implementation process figure of example, including:
Step 401:Smart mobile phone collects foreground application scene.
Step 402:Smart mobile phone obtains the ID of smart mobile phone.
Step 403:Smart mobile phone is using the public key of wearable smart machine to the ID of smart mobile phone and the ID of application scenarios It is encrypted.
Step 404:Smart mobile phone sends the information after encryption to wearable smart machine, asks application scenarios correspondence Encrypted message.
Step 405:The information of reception is decrypted using the private key of wearable smart machine for wearable smart machine; To the ID and the ID of application scenarios of smart mobile phone.
Step 406:Wearable smart machine judges whether itself has preserved the ID of the smart mobile phone, if preserved, Then the smart mobile phone is proved to be successful, step 407 is continued executing with.
Step 407:Wearable smart machine searches the user name after corresponding encryption and close using the ID of the application scenarios Code, if found, continues executing with step 408.
Step 408:Wearable smart machine uses the ID of the wearable smart machine of public key encryption of smart mobile phone, and will add Username and password after the ID of wearable smart machine after close, encryption is sent to smart mobile phone.
Step 409:The information of reception is decrypted using the private key of smart mobile phone for smart mobile phone, obtains wearable intelligence ID, the username and password of equipment.
Step 410:Smart mobile phone judges whether itself has preserved the ID of the wearable smart machine, if preserved, Then the wearable smart machine is proved to be successful, step 411 is continued executing with.
Step 411:Smart mobile phone inputs username and password in application scenarios, login application program.
In the present embodiment, username and password is directly inputted by application scenarios by smart mobile phone, it is not necessary to manually In screen or input through keyboard encrypted message, thus avoid the risk that encrypted message is stolen in manual input process.
In above-described embodiment two and embodiment three, the information in addition to encrypted message has also been made at encryption when sending Reason;The present invention can not also make encryption to the information in addition to encrypted message and directly transmit.
The present invention also proposes a kind of cipher protection system, and such as Fig. 5 is the system structure diagram, including password protection equipment 501 and more than one smart machine 502, wherein:
Password protection equipment 501, for receiving the password reporting message from smart machine 502, the password, which is reported, to disappear Encrypted message after mark, the mark of application scenarios and encryption of the breath comprising smart machine, is verified into the smart machine After work(, the encrypted message after the mark of the preservation application scenarios and corresponding encryption;It is additionally operable to receive from smart machine Password request message, the mark of mark and application scenarios of the password request message package containing smart machine, to the intelligence After device authentication success, according to the encrypted message after the corresponding encryption of the identifier lookup of the application scenarios, by adding for finding Encrypted message after close feeds back to the smart machine;
The smart machine 502, for reporting password reporting message and password request message to password protection equipment, is also used It is decrypted, is inputted in the application scenarios after the decryption in the encrypted message after the encryption fed back to password protection equipment Encrypted message.
In said system,
Password protection equipment 501 can be also used for, and receive and preserve the mark of smart machine;Password protection equipment is to intelligence The mode of device authentication is:Judge whether to preserve the mark of the password reporting message or the smart machine in password request message Know, if preserved, the smart machine is proved to be successful;Encrypted message after encryption is fed back to intelligence by password protection equipment During energy equipment, further by the identification feedback of password protection equipment to smart machine;
The smart machine 502 can be also used for, and receive and preserve the mark of password protection equipment;Judge whether to preserve The mark of the password protection equipment, if preserved, judges to be proved to be successful the password protection equipment, further to close Encrypted message after the encryption of code protection equipment feedback is decrypted.
In said system,
Password protection equipment 501 can be also used for, and the public key and private key of password protection equipment be preserved, by password protection equipment Public key send to smart machine, receive and preserve the public key of smart machine;After password reporting message is received, using password The information after encryption in the private key pair cryptography reporting message of protection equipment is decrypted, then uses the public key of smart machine to solution Information after close is encrypted, and obtains the encrypted message after re-encrypted, preserves the marks of the application scenarios and corresponding heavy Encrypted message after new encryption;
The smart machine 502 be can be also used for, and preserve the public key and private key of smart machine, and the public key of smart machine is sent out Password protection equipment is delivered to, the public key of password protection equipment is received and preserve;Before password reporting message is sent, using password Encrypted message is encrypted the public key of protection equipment;Encrypted message after the encryption of password protection equipment feedback is received Afterwards, it is decrypted using the encrypted message after the private key pair encryption of smart machine.
The present invention also proposes a kind of password protection equipment, and such as Fig. 6 is the structural scheme of mechanism of the password protection equipment, including:
Interactive module 601, the mark for receiving smart machine receives password reporting message from smart machine and close Code request message, and feed back the encrypted message after encryption to smart machine;Wherein, the password reporting message includes smart machine Mark, the mark of application scenarios and encryption after encrypted message, mark of the password request message package containing smart machine and The mark of application scenarios;
Smart machine identification module 602, the mark for preserving smart machine;The password received for interactive module 601 Reporting message and password request message, judge whether that the intelligence preserved in the password reporting message or password request message is set Standby mark, if preserved, is proved to be successful to the smart machine;
Encryption Decryption module 603, for preserving the public key and private key of password protection equipment and the public key of smart machine;Using Encrypted message after being encrypted in the private key pair cryptography reporting message of the password protection equipment is decrypted, then with smart machine Information after decryption is encrypted public key;
Encrypted message memory module 604, adds for storing the mark of application scenarios and the public key of corresponding use smart machine Encrypted message after close;
Encrypted message selecting module 605, for the identifier lookup message in cipher using the application scenarios in password request message Memory module 604 is ceased, the encrypted message after the public key encryption of corresponding use smart machine is obtained, for interactive module 601 to intelligence Equipment is fed back.
Above-mentioned password protection equipment can also include:Password protection equipment identifies memory module 606, is protected for storing password Protect the mark of equipment;
When the interactive module 601 feeds back the encrypted message after encryption to smart machine, further feedback cipher protection is set Standby mark.
In above-mentioned password protection equipment, interactive module 601 be can be also used for, and password protection equipment is sent to smart machine Public key, and receive the public key of the smart machine from smart machine.
Above-mentioned password protection equipment can also include:
Subscriber identification module 607, the identification information for pre-saving user;When the identification information for receiving user's input When, judge whether to have preserved the identification information, if preserved, the user is proved to be successful, it is allowed to which the user uses close Code protection equipment.
Wherein, the identification information of user can be the fingerprint of user, face information etc..
The present invention also proposes a kind of smart machine for realizing cryptoguard, and such as Fig. 7 is the structural representation of the smart machine, Including:
Interactive module 701, for sending password reporting message and password request message to password protection equipment, and receives close Encrypted message after the encryption of code protection equipment feedback;Wherein, mark of the password reporting message comprising smart machine, application Encrypted message after the mark of scene and encryption, the mark of mark and application scenarios of the password request message package containing smart machine Know;
Smart machine identifies memory module 702, the mark for storing the smart machine;
Encryption Decryption module 703, for preserving the public key and private key of smart machine and the public key of password protection equipment;Need to The encrypted message to be sent is encrypted using the public key of password protection equipment, and the encrypted message after the encryption received is used The private key of smart machine is decrypted;
Foreground application detection module 704, for detecting foreground application, interactive module is supplied to by the mark of application scenarios 701。
Above-mentioned smart machine can also include:
Password protection equipment identification module 705, the mark for preserving password protection equipment;Connect for interactive module 701 Encrypted message after the encryption of receipts, judges whether to preserve the mark of password protection equipment, if preserved, to the password Protection equipment is proved to be successful.
In above-mentioned smart machine, interactive module 701 be can be also used for, and the public affairs of smart machine are sent to password protection equipment Key, and receive the public key of the password protection equipment from password protection equipment.
Above-mentioned password protection equipment can also include:
Subscriber identification module 706, the identification information for pre-saving user;When the identification information for receiving user's input When, judge whether to have preserved the identification information, if preserved, the user is proved to be successful, it is allowed to which the user uses intelligence Can equipment.
Wherein, the identification information of user can be the fingerprint of user, face information etc..
In summary, the method, system and device proposed by the present invention for realizing cryptoguard, by intelligent terminal to user The wearable smart machine of cryptoguard asks the mode of username and password, is directly obtained username and password, and will obtain The username and password taken is input in application scenarios, conceals input through keyboard user name when user uses and Password Input Mode is logged in.The experience having great convenience for the user.It is effectively protected the user name password of user.User is not With memory cipher again, it is not necessary to input the cumbersome character such as username and password at the interface of application, the experience of the user of raising, User name, the safety of password, the password leakage that can be avoided being taken and cause are ensure that simultaneously.Lost also not even if intelligent terminal The leakage of password can be caused, because the storage of user and password is not present in intelligent terminal, using safer.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of protection of the invention.

Claims (12)

1. a kind of cipher code protection method, it is characterised in that methods described includes:
Password protection equipment receives the password reporting message from smart machine, and the password reporting message includes smart machine Encrypted message after mark, the mark of application scenarios and encryption;After being proved to be successful to the smart machine, the application is preserved Encrypted message after the mark of scene and corresponding encryption;
Password protection equipment receives the password request message from smart machine, and the password request message package is containing smart machine The mark of mark and application scenarios;After being proved to be successful to the smart machine, according to the identifier lookup pair of the application scenarios Encrypted message after the encryption answered, the smart machine is fed back to by the encrypted message after the encryption found;
Encrypted message after encryption is decrypted the smart machine, is inputted in the application scenarios close after the decryption Code information;
The password protection equipment is received before the password reporting message from smart machine, is further comprised:The password is protected Shield equipment receives and preserves the mark of smart machine, also, the smart machine receives and preserves the mark of password protection equipment;
The mode that the password protection equipment is verified to smart machine is:Judge whether to preserve the password reporting message or close The mark of smart machine in code request message, if preserved, is proved to be successful to the smart machine;
When encrypted message after encryption is fed back to smart machine by the password protection equipment, further by password protection equipment Identification feedback is to smart machine;Smart machine judges whether to preserve the mark of the password protection equipment, if preserved, Judgement is proved to be successful to the password protection equipment, further performs the step that the encrypted message after described pair of encryption is decrypted Suddenly.
2. according to the method described in claim 1, it is characterised in that password protection equipment is received on the password from smart machine Report before message, further comprise:Password protection equipment preserves the public key and private key of password protection equipment, by password protection equipment Public key send to smart machine, smart machine preserves the public key of password protection equipment;Also, smart machine preserves smart machine Public key and private key, the public key of smart machine is sent to password protection equipment, password protection equipment preserves the public affairs of smart machine Key;
The encrypted message after encryption in the password reporting message is:Using the password after the public key encryption of password protection equipment Information;
The password protection equipment preserve application scenarios mark and corresponding encryption after the mode of encrypted message be:Using close Information after the private key pair encryption of code protection equipment is decrypted, then the information after decryption is carried out using the public key of smart machine Encryption, obtains the encrypted message after re-encrypted, preserves the password after the mark and corresponding re-encrypted of the application scenarios Information;
The mode that encrypted message after encryption is decrypted smart machine is:Using close after the private key pair encryption of smart machine Code information is decrypted.
3. according to the method described in claim 1, it is characterised in that password protection equipment is received on the password from smart machine Report before message, further comprise:Password protection equipment and smart machine preserve identical symmetric key;
The encrypted message after encryption in the password reporting message is:Using the encrypted message after the symmetric key encryption;
The mode that encrypted message after encryption is decrypted smart machine is:Using the symmetric key to the password after encryption Information is decrypted.
4. a kind of cipher protection system, it is characterised in that the system includes:Password protection equipment and more than one intelligence are set It is standby, wherein:
The password protection equipment, for receiving the password reporting message from smart machine, the password reporting message is included Encrypted message after the mark of smart machine, the mark of application scenarios and encryption, after being proved to be successful to the smart machine, is protected Deposit the application scenarios mark and corresponding encryption after encrypted message;It is additionally operable to receive the password request from smart machine Message, the mark of mark and application scenarios of the password request message package containing smart machine is verified to the smart machine , will be close after the encryption found according to the encrypted message after the corresponding encryption of the identifier lookup of the application scenarios after success Code feedback of the information is to the smart machine;
The smart machine, for reporting password reporting message and password request message to password protection equipment, is additionally operable to close Encrypted message after the encryption of code protection equipment feedback is decrypted, the password inputted in the application scenarios after the decryption Information;
The password protection equipment is additionally operable to, and receives and preserve the mark of smart machine;Password protection equipment is tested smart machine The mode of card is:Judge whether to preserve the mark of the password reporting message or the smart machine in password request message, such as Fruit has preserved, then the smart machine is proved to be successful;Encrypted message after encryption is fed back to intelligence and set by password protection equipment When standby, further by the identification feedback of password protection equipment to smart machine;
The smart machine is additionally operable to, and receives and preserve the mark of password protection equipment;Judge whether that preserving the password protects The mark of equipment is protected, if preserved, judges to be proved to be successful the password protection equipment, further to password protection equipment Encrypted message after the encryption of feedback is decrypted.
5. system according to claim 4, it is characterised in that
Password protection equipment is additionally operable to, and preserves the public key and private key of password protection equipment, and the public key of password protection equipment is sent To smart machine, the public key of smart machine is received and preserved;After password reporting message is received, using password protection equipment The information after encryption in private key pair cryptography reporting message is decrypted, then using smart machine public key to the information after decryption It is encrypted, obtains the encrypted message after re-encrypted, after the mark and corresponding re-encrypted that preserve the application scenarios Encrypted message;
The smart machine is additionally operable to, and preserves the public key and private key of smart machine, and the public key of smart machine is sent to password and protected Equipment is protected, the public key of password protection equipment is received and preserve;Before password reporting message is sent, using password protection equipment Encrypted message is encrypted public key;After the encrypted message after receiving the encryption of password protection equipment feedback, using intelligence Encrypted message after the private key pair encryption of equipment is decrypted.
6. a kind of password protection equipment, it is characterised in that the password protection equipment includes:
Interactive module, the mark for receiving smart machine receives password reporting message and password request from smart machine Message, and feed back the encrypted message after encryption to smart machine;Wherein, the password reporting message includes the mark of smart machine Encrypted message after knowledge, the mark of application scenarios and encryption, mark and application of the password request message package containing smart machine The mark of scene;
Smart machine identification module, the mark for preserving smart machine;For interactive module receive password reporting message and Password request message, judges whether to preserve the mark of the password reporting message or the smart machine in password request message, If preserved, the smart machine is proved to be successful;
Encryption Decryption module, for preserving the public key and private key of password protection equipment and the public key of smart machine;Using described close Encrypted message after being encrypted in the private key pair cryptography reporting message of code protection equipment is decrypted, then with the public key pair of smart machine Information after decryption is encrypted;
Encrypted message memory module, it is close after the mark of application scenarios and the public key encryption of corresponding use smart machine for storing Code information;
Encrypted message selecting module, for storing mould using the identifier lookup encrypted message of the application scenarios in password request message Block, obtains the encrypted message after the public key encryption of corresponding use smart machine, is fed back for interactive module to smart machine.
7. password protection equipment according to claim 6, it is characterised in that the password protection equipment also includes:Password Protection equipment identifies memory module, the mark for storing password protection equipment;
When the interactive module feeds back the encrypted message after encryption to smart machine, the mark of further feedback cipher protection equipment Know.
8. the password protection equipment according to claim 6 or 7, it is characterised in that the interactive module is additionally operable to, to intelligence Equipment sends the public key of password protection equipment, and receives the public key of the smart machine from smart machine.
9. the password protection equipment according to claim 6 or 7, it is characterised in that the password protection equipment also includes:
Subscriber identification module, the identification information for pre-saving user;When receiving the identification information of user's input, judge The identification information whether has been preserved, if preserved, the user has been proved to be successful, it is allowed to which the user is set using cryptoguard It is standby.
10. a kind of smart machine for realizing cryptoguard, it is characterised in that the smart machine includes:
Interactive module, for sending password reporting message and password request message to password protection equipment, and receives cryptoguard Encrypted message after the encryption of equipment feedback;Wherein, the password reporting message includes the mark of smart machine, application scenarios Encrypted message after mark and encryption, the mark of mark and application scenarios of the password request message package containing smart machine;
Smart machine identifies memory module, the mark for storing the smart machine;
Encryption Decryption module, for preserving the public key and private key of smart machine and the public key of password protection equipment;It will need to send Encrypted message be encrypted using the public key of password protection equipment, the encrypted message after the encryption received is set using intelligence Standby private key is decrypted;
Foreground application detection module, for detecting foreground application, interactive module is supplied to by the mark of application scenarios;
The smart machine also includes:
Password protection equipment identification module, the mark for preserving password protection equipment;After the encryption received for interactive module Encrypted message, judge whether to preserve the mark of password protection equipment, if preserved, the password protection equipment tested Demonstrate,prove successfully.
11. smart machine according to claim 10, it is characterised in that the interactive module is additionally operable to, to cryptoguard Equipment sends the public key of smart machine, and receives the public key of the password protection equipment from password protection equipment.
12. smart machine according to claim 10, it is characterised in that the password protection equipment also includes:
Subscriber identification module, the identification information for pre-saving user;When receiving the identification information of user's input, judge The identification information whether has been preserved, if preserved, the user has been proved to be successful, it is allowed to which the user uses smart machine.
CN201410352498.8A 2014-07-23 2014-07-23 Cipher code protection method, system and device Active CN104092550B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410352498.8A CN104092550B (en) 2014-07-23 2014-07-23 Cipher code protection method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410352498.8A CN104092550B (en) 2014-07-23 2014-07-23 Cipher code protection method, system and device

Publications (2)

Publication Number Publication Date
CN104092550A CN104092550A (en) 2014-10-08
CN104092550B true CN104092550B (en) 2017-10-17

Family

ID=51640232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410352498.8A Active CN104092550B (en) 2014-07-23 2014-07-23 Cipher code protection method, system and device

Country Status (1)

Country Link
CN (1) CN104092550B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301886A (en) * 2014-10-21 2015-01-21 中国联合网络通信集团有限公司 Short message reading method and system, terminal and wearable device
CN105591733A (en) * 2014-10-24 2016-05-18 小米科技有限责任公司 Encryption and decryption methods and apparatuses
CN106156549B (en) * 2015-04-28 2019-12-06 阿里巴巴集团控股有限公司 application program authorization processing method and device
CN106357588B (en) * 2015-07-13 2019-11-26 阿里巴巴集团控股有限公司 A kind of method and system logging in application
CN105592056A (en) * 2015-09-24 2016-05-18 中国银联股份有限公司 Password safety system for mobile device and password safety input method thereof
CN107026736A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Input number of times is reduced by it
CN107026737B (en) * 2016-01-29 2021-02-09 李明 System for managing passwords through wearable equipment
CN105827625A (en) * 2016-04-27 2016-08-03 乐视控股(北京)有限公司 Authentication method and authentication system, electronic device based on biological identification information
CN109547991A (en) * 2018-12-30 2019-03-29 北京深思数盾科技股份有限公司 Password providing method and bluetooth equipment between bluetooth equipment
CN111147447A (en) * 2019-12-03 2020-05-12 苏宁云计算有限公司 Data protection method and system
CN111159696A (en) * 2019-12-31 2020-05-15 中国银行股份有限公司 Password storage and checking method, system and password management system
CN111800273B (en) * 2020-06-30 2021-12-24 联想(北京)有限公司 Information processing method, electronic device, and storage medium
CN116401654A (en) * 2023-06-07 2023-07-07 深圳奥联信息安全技术有限公司 Password security management system and method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216867A (en) * 2007-01-05 2008-07-09 黄承雄 A logging-on process cipher protection method by means of background synchronization
CN102638471A (en) * 2012-04-25 2012-08-15 杭州晟元芯片技术有限公司 Password protection and management method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8161545B2 (en) * 2008-01-29 2012-04-17 Craine Dean A Keyboard with programmable username and password keys and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216867A (en) * 2007-01-05 2008-07-09 黄承雄 A logging-on process cipher protection method by means of background synchronization
CN102638471A (en) * 2012-04-25 2012-08-15 杭州晟元芯片技术有限公司 Password protection and management method

Also Published As

Publication number Publication date
CN104092550A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN104092550B (en) Cipher code protection method, system and device
US11025414B2 (en) Key exchange method and apparatus
CN103391541B (en) The collocation method of wireless device and device, system
CN101641976B (en) An authentication method
CN102420821B (en) Method and system for improving transmission security of file
CN105391676B (en) Instant communication information processing method and processing device and system
CN105337740B (en) A kind of auth method, client, trunking and server
CN103812651B (en) Method of password authentication, apparatus and system
CN107800539A (en) Authentication method, authentication device and Verification System
CN107888560A (en) A kind of mobile intelligent terminal mail security Transmission system and method
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN106411926A (en) Data encryption communication method and system
CN101335615A (en) Method used in key consultation of USB KEY audio ciphering and deciphering device
CN106572427A (en) Establishment method and device for establishing short-range communication
CN104270516A (en) Decryption method and mobile terminal
CN104954378A (en) Asymmetric message encryption method and system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN105142134A (en) Parameter obtaining and transmission methods/devices
CN105281897A (en) File encryption method and device and file decryption method and device
CN104618397A (en) Encryption method and system for instant messaging software
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN104506509B (en) A kind of authentication method based on multifunctional safe certification terminal
CN104253692B (en) Key management method and device based on SE
CN111541603B (en) Independent intelligent safety mail terminal and encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant