CN107958148A - A kind of encryption method, cipher authentication method and device - Google Patents
A kind of encryption method, cipher authentication method and device Download PDFInfo
- Publication number
- CN107958148A CN107958148A CN201610900405.XA CN201610900405A CN107958148A CN 107958148 A CN107958148 A CN 107958148A CN 201610900405 A CN201610900405 A CN 201610900405A CN 107958148 A CN107958148 A CN 107958148A
- Authority
- CN
- China
- Prior art keywords
- character
- password
- sliding trace
- sequence
- key lattice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
Abstract
The present invention relates to field of computer technology, more particularly to a kind of encryption method, cipher authentication method and device, the described method includes:Determine the character password sequence for encrypting target data;The sliding trace corresponding to slide that the character password sequence is carried out with user in figure inputting interface is associated, and generates character graphics password;The target data is encrypted using the character graphics password.The present invention is after character password sequence is determined; the sliding trace corresponding to slide that user is carried out in figure inputting interface is associated with the character password sequence; generate character graphics password; recycle character graphics password that target data is encrypted; improve the complexity of password; so that encrypted target data security is improved, beneficial to the protection to target data, the experience of user is improved.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of encryption method, cipher authentication method and device.
Background technology
Data encryption is the important step that user ensures data safety, wherein, it is exactly a kind of common to set password for data
Data encryption mode.It is higher and higher for the frequency of use of password now, it is also higher and higher to the safety requirements of password.Existing
Have in technology, usually using the combination producing password of the characters such as numeral and letter, therefore, limit the complexity of password, cause
The security of password is low, is unfavorable for the protection to data.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes the above problem in order to provide one kind or solves at least in part
State encryption method, cipher authentication method and the device of problem.
The embodiment of the present invention provides a kind of encryption method, including:
Determine the character password sequence for encrypting target data;
The slip rail corresponding to slide that the character password sequence and user are carried out in figure inputting interface
Mark is associated, and generates character graphics password;
The target data is encrypted using the character graphics password.
Preferably, the slide institute that the character password sequence and user are carried out in figure inputting interface is right
The sliding trace answered is associated, and generates character graphics password, including:
In at least one key lattice that Character Filling in the character password sequence to the figure inputting interface is included,
Each character corresponds to a key lattice;
Receive the slide of the user in the figure inputting interface, obtaining and the slide pair
Sequentially extracted while the sliding trace answered the sliding trace by way of each key lattice in character;
By the sliding trace by way of each key lattice be associated with the corresponding each character extracted, generate the word
Accord with graphical passwords.
Preferably, the slide institute that the character password sequence and user are carried out in figure inputting interface is right
The sliding trace answered is associated, and generates character graphics password, including:
Receive the slide of the user in the figure inputting interface comprising at least one key lattice, obtaining
Sequentially by the Character Filling in the character password sequence described in while obtaining sliding trace corresponding with the slide
Sliding trace by way of each key lattice in, each character corresponds to a key lattice;
By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, generate institute
State character graphics password.
Preferably, it is described sequentially by the Character Filling in the character password sequence to the sliding trace by way of it is each
After in a key lattice, the method further includes:
Completion character is filled in blank key lattice in the figure inputting interface;
By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, meanwhile,
The blank key lattice are associated with the completion character being filled into the blank key lattice, generate the character graphics password.
Preferably, the character password sequence determined for encrypting target data, including:
Selection operation based on user to preset characters sequence, determines the character password sequence;Or;
Input operation based on user, determines the character password sequence.
Preferably, the character password sequence is determined when the input based on user operates, in the generation character graphics
Before password, the method further includes:
The character password sequence is stored in local and/or high in the clouds.
Based on same inventive concept, the embodiment of the present invention also provides a kind of encryption device, including:
Determining module, for determining the character password sequence for encrypting target data;
Relating module, for the slide institute for carrying out the character password sequence and user in figure inputting interface
Corresponding sliding trace is associated, and generates character graphics password;
Encrypting module, for the target data to be encrypted using the character graphics password.
Preferably, the relating module includes:
Fills unit, for by the Character Filling in the character password sequence to the figure inputting interface include to
In few key lattice, each character corresponds to a key lattice;
Extraction unit, for receiving the slide of the user in the figure inputting interface, obtain with
Sequentially extracted while the slide corresponding sliding trace the sliding trace by way of each key lattice in character;
Associative cell, for by the sliding trace by way of each key lattice closed with the corresponding each character extracted
Connection, generates the character graphics password.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication method, including:
Receive the input operation that encryption data is decrypted in user, obtain character graphics password to be certified;
The character graphics password to be certified is matched with standard character graphical passwords, judges the character to be certified
Whether graphical passwords are identical with the standard character graphical passwords;
If the character graphics password to be certified is identical with the standard character graphical passwords, certification success, to institute
Encryption data is stated to be decrypted.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication device, including:
Module is obtained, the input operation that encryption data is decrypted for receiving user, obtains character graphics to be certified
Password;
Judgment module, for the character graphics password to be certified to be matched with standard character graphical passwords, judges
Whether the character graphics password to be certified is identical with the standard character graphical passwords;
Deciphering module, if identical with the standard character graphical passwords for the character graphics password to be certified,
Certification success, is decrypted the encryption data.
One or more of embodiment of the present invention technical solution, has at least the following technical effects or advantages:
The slide institute of the invention that after character password sequence is determined, user is carried out in figure inputting interface
Corresponding sliding trace is associated with the character password sequence, generates character graphics password, recycles character graphics password pair
Target data is encrypted, and improves the complexity of password, so that encrypted target data security is carried
Height, beneficial to the protection to target data, improves the experience of user.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area
Technical staff will be clear understanding.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole attached drawing, identical component is represented with identical reference pattern.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of encryption method of the embodiment of the present invention;
Fig. 2 shows the schematic diagram of step 102 one embodiment under the first embodiment of the embodiment of the present invention;
Fig. 3 shows the schematic diagram of step 102 second embodiment under the first embodiment of the embodiment of the present invention;
Fig. 4 shows the schematic diagram of step 102 one embodiment under second of embodiment of the embodiment of the present invention;
Fig. 5 shows the schematic diagram of step 102 second embodiment under second of embodiment of the embodiment of the present invention;
Fig. 6 shows the schematic diagram of step 102 the 3rd embodiment under second of embodiment of the embodiment of the present invention;
Fig. 7 shows a kind of structure diagram of encryption device of the embodiment of the present invention;
Fig. 8 shows a kind of flow chart of cipher authentication method of the embodiment of the present invention;
Fig. 9 shows a kind of structure diagram of cipher authentication device of the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
The embodiment of the present invention provides a kind of encryption method, for data to be encrypted, as shown in Figure 1, the encryption method
Comprise the following steps:
Step 101:Determine the character password sequence for encrypting target data.
Specifically, multiple character strings are previously provided with system, the preset characters sequence namely default character sequence.
The character included in preset characters sequence can be numeral, letter or symbol, also, preset characters sequence can be by numeral,
Letter and symbol are arbitrarily arranged in pairs or groups obtained combination.For example, preset characters sequence can be:“123456789”、“jklmopqr”、
" 2046, ap_ " etc..Selection operation based on user to preset characters sequence, can determine from default multigroup character string
Go out character password sequence, for example, according to the selection operation of user, " 123456789 " are determined as character password sequence.
In addition, user can also voluntarily input character password sequence, character password is determined in the input operation based on user
Sequence, for example, being operated according to the input of user, by " 2016az, sSy5k " are determined as character password sequence.Likewise, user is defeated
The character included in the character password sequence entered can be numeral, character or symbol, also, character password sequence can be by counting
Word, character and meet any obtained combination of arranging in pairs or groups.When character password sequence is sequence obtained from the input operation based on user
During row, after character password sequence is determined, which can be stored in local and/or high in the clouds, after convenient
It is continuous to use.
Step 102:Corresponding to the slide that the character password sequence and user are carried out in figure inputting interface
Sliding trace be associated, generate character graphics password.
Specifically, at least one key lattice are included in figure inputting interface, what key lattice were distributed in figure inputting interface
Position user can be according to any setting be actually needed, for example, figure inputting interface can include 9 key lattice, 9 key lattice are with nine
Palace case form is distributed in figure inputting interface.Further, receiving the slide of user in figure inputting interface can obtain
Obtain sliding trace corresponding with slide.
For how to be associated character password sequence with sliding trace, under the first embodiment, first, by word
In each key lattice that Character Filling in symbol keying sequence is included to figure inputting interface, each character corresponds to a key lattice.Its
In, when the quantity for the key lattice that the quantity for the character that character password sequence includes is included less than figure inputting interface, then according to default
After fill rule filling, a part of key lattice are filled with character, and another part key lattice remain as blank key lattice.When character password sequence
Comprising the quantity of character be equal to the quantity of key lattice that figure inputting interface includes, then after being filled according to default fill rule, figure
Character is filled with all key lattice in shape inputting interface.When the quantity for the character that character password sequence includes is defeated more than figure
Enter the quantity for the key lattice that interface includes, then only by the identical each key of Character Filling of the key lattice quantity included with figure inputting interface
In lattice.Wherein, default fill rule can be according to any setting of actual needs of user, for example, when in figure inputting interface
When key lattice distribution is nine grids, default fill rule can be from left to right from up to down to fill out the character in character password sequence
It is charged in each key lattice.Then, slide of the user in figure inputting interface is received, it is corresponding with slide obtaining
Sequentially extracted while sliding trace sliding trace by way of each key lattice in character, by sliding trace by way of each key lattice
It is associated with the corresponding each character extracted, generates character graphics password.
For example, when the character password sequence determined is " 123456789 ", it is defeated that " 123456789 " are filled into figure
Enter in the nine grids key lattice in interface, as shown in Fig. 2, then, receiving slide of the user in figure inputting interface, obtain
Sliding trace corresponding with slide, i.e. shape are the sliding trace of " 3 ", are obtaining shape as the same of the sliding trace of " 3 "
When extract the sliding trace by way of each key lattice in character, be followed successively by " 12487 ", will be each in " 12487 " that extract
A character is associated with shape for each key lattice in the sliding trace of " 3 ", so that, generate the first character graphics password.Again
Such as, when the character password sequence determined is " jklmnopqr ", " jklmnopqr " is filled into figure inputting interface
In nine grids key lattice, then, receive slide of the user in figure inputting interface, obtain slip corresponding with slide
Track, i.e. shape are the sliding trace of " 7 ", and sliding trace way is extracted while the sliding trace that shape is " 7 " is obtained
Character in each key lattice of warp, is followed successively by " jklnq ", is " 7 " by each character in " jklnq " that extracts and shape
Each key lattice in sliding trace are associated, so as to generate the second character graphics password.In this application, can be by multiple words
Symbol graphical passwords merge, and target data are encrypted using the character graphics password after merging, for example, in generation the
After one character graphics password, the first character graphics password is cached, then the second character figure is generated using same method
Shape password, as shown in figure 3, finally, being added using the first character graphics password and the second character graphics password to target data
It is close, so that, when encrypted target data is decrypted, it is necessary to ensure first to be proved to be successful the first character graphics password posteriority
Successfully the second character graphics password is demonstrate,proved, target data can be decrypted.
For associating character password sequence and sliding trace, under second of embodiment, first, receive user and exist
Slide in figure inputting interface, sequentially by character password sequence while sliding trace corresponding with slide is obtained
Character Filling in row to sliding trace by way of each key lattice in, each character corresponds to a key lattice.Wherein, character password is worked as
The quantity for the character that sequence includes less than sliding trace by way of key lattice quantity, then it is sliding after being filled according to default fill rule
Dynamic rail mark by way of key lattice in a part of key lattice be filled with character, another part key lattice are blank key lattice.When character password sequence
Comprising character quantity be equal to sliding trace by way of key lattice quantity, then according to default fill rule fill after, slide rail
Mark by way of key lattice in all key lattice be filled with character.When the quantity for the character that character password sequence includes is more than slip rail
Mark by way of key lattice quantity, then by with sliding trace by way of the identical Character Filling of key lattice quantity in each key lattice, together
When, the character not being filled in character password sequence is cached.Wherein, default fill rule can be according to the reality of user
Border needs any setting, for example, since sliding trace by way of first key lattice sequentially to sliding trace by way of each key
Fill character in lattice.Then, by sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice,
Generate character graphics password.
For example, when determine character password sequence is " 2016az, ", and the slip rail corresponding to the slide of user
Mark is the sliding trace that shape is " 3 ", then while the sliding trace that shape is " 3 " is obtained, sequentially fills " 2016az, "
To sliding trace by way of each key lattice in, as shown in figure 4, and by shape for " 3 " sliding trace by way of each key lattice with
Corresponding character in " 2016az, " is associated, and generates character graphics password.When the character password sequence determined is
" 2016az .sSy5k;" when, if the first sliding trace corresponding to the first slide of user is the slip that shape is " 3 "
Track, then " 2016az, " is filled into while obtaining shape and being " 3 " first sliding trace the first sliding trace by way of it is each
In a key lattice, and by shape for " 3 " the first sliding trace by way of each key lattice and " 2016az, " in correspondence character carry out
Association, generates the first character graphics password, while " sSy5k " is cached, after refresh graphics inputting interface, figure input
All key lattice in interface are in space state, if receiving second slide of the user in figure inputting interface,
The second sliding trace corresponding to the second slide is obtained, if the second sliding trace is the sliding trace that shape is " Z ",
By " .sSy5k while acquisition shape is second sliding trace of " Z ";" be filled into the second sliding trace by way of each key lattice
It is interior, as shown in figure 5, and by shape for " Z " the second sliding trace by way of each key lattice and " .sSy5k;" in correspondence character
It is associated, generates the second character graphics password.Finally, using the first character graphics password and the second character graphics password to mesh
Mark data are encrypted, so that, when encrypted target data is decrypted, it is necessary to ensure first to be proved to be successful the first character
The second character graphics password is proved to be successful after graphical passwords, target data can be decrypted.
When target data is encrypted using above-mentioned second of embodiment, generally, sliding trace only can be through
The part key lattice in figure inputting interface are crossed, if also including blank key lattice after slide, in figure inputting interface,
Then, completion character is filled in blank key lattice, completion character is generated at random by system, as shown in fig. 6, and then, rail will slided
Mark by way of each key lattice be associated with the corresponding character being filled into each key lattice while, blank key lattice and sky will be filled into
Completion character in white key lattice is associated, and generates character graphics password.Pass through completion character completion blank key lattice, it is possible to increase
The complexity of character graphics password is generated, so as to improve the security of character graphics password.
In this application, character password and graphical passwords, character password and figure are included in the character graphics password of generation
Cryptographic association.Include character password information in each key lattice in graphical passwords, in all key lattice included by graphical passwords
Character password information composition character password.In addition, each key lattice carry station location marker information, when key lattice and character association
Afterwards, character also carries the station location marker information of corresponding keys lattice, using station location marker information realization key lattice with before character
Association.
Step 103:Target data is encrypted using character graphics password.
Based on same inventive concept, the embodiment of the present invention also provides a kind of encryption device corresponding with encryption method, such as Fig. 7
Shown, described device includes:
Determining module 701, for determining the character password sequence for encrypting target data.
Relating module 702, the slip for the character password sequence and user to be carried out in figure inputting interface are grasped
Make corresponding sliding trace to be associated, generate character graphics password.
Encrypting module 703, for the target data to be encrypted using the character graphics password.
Relating module 702, including:
First fills unit, for the Character Filling in the character password sequence to be included to the figure inputting interface
At least one key lattice in, each character corresponds to a key lattice;
Extraction unit, for receiving the slide of the user in the figure inputting interface, obtain with
Sequentially extracted while the slide corresponding sliding trace the sliding trace by way of each key lattice in character;
First associative cell, for by the sliding trace by way of each key lattice and the corresponding each character extracted into
Row association, generates the character graphics password.
Relating module 702, including:
Second fills unit, for receiving the user in the figure inputting interface comprising at least one key lattice
The slide, sequentially by the character password sequence while sliding trace corresponding with the slide is obtained
Character Filling to the sliding trace by way of each key lattice in, each character corresponds to a key lattice;
Second associative cell, for by the sliding trace by way of each key lattice and the corresponding word being filled into each key lattice
Symbol is associated, and generates the character graphics password.
Described device further includes:
3rd fills unit, for filling completion character in the blank key lattice in the figure inputting interface;
3rd associative cell, for by the sliding trace by way of each key lattice and the corresponding word being filled into each key lattice
Symbol is associated, meanwhile, the blank key lattice are associated with the completion character being filled into the blank key lattice, generate institute
State character graphics password.
Determining module 701, including:
First determination unit, for the selection operation based on user to preset characters sequence, determines the character password
Sequence;Or;
Second determination unit, for the input operation based on user, determines the character password sequence.
Described device further includes:
Preserving module, for the character password sequence to be stored in local and/or high in the clouds.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication method corresponding with encryption method,
As shown in figure 8, it the described method comprises the following steps:
Step 801:Receive the input operation that encryption data is decrypted in user, obtain character graphics password to be certified.
Step 802:The character graphics password to be certified is matched with standard character graphical passwords, is treated described in judgement
Whether certification character graphics password is identical with the standard character graphical passwords.
Specifically, graphical passwords to be certified and character password to be certified are included in character graphics password to be certified, will
The character graphics password to be certified is matched with standard character graphical passwords, is judged in the character graphics password to be certified
Graphical passwords to be certified it is whether identical with the test pattern password in the standard character graphical passwords, and judge described in treat
Character password to be certified in certification character graphics password whether with the standard character password in the standard character graphical passwords
It is identical.
Step 803:If the character graphics password to be certified is identical with the standard character graphical passwords, certification into
Work(, is decrypted the encryption data.
Specifically, if the graphical passwords to be certified are identical with the test pattern password, and the word to be certified
It is identical with the standard character password to accord with password, then certification success, is decrypted the encryption data.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication dress corresponding with cipher authentication method
Put, as shown in figure 9, described device includes:
Module 901 is obtained, the input operation that encryption data is decrypted for receiving user, obtains character figure to be certified
Shape password;
Judgment module 902, for the character graphics password to be certified to be matched with standard character graphical passwords, sentences
Whether the character graphics password to be certified that breaks is identical with the standard character graphical passwords.
Deciphering module 903, if identical with the standard character graphical passwords for the character graphics password to be certified,
Then certification success, is decrypted the encryption data.
Technical solution in above-mentioned the embodiment of the present application, at least has the following technical effect that or advantage:
The slide institute of the invention that after character password sequence is determined, user is carried out in figure inputting interface
Corresponding sliding trace is associated with the character password sequence, generates character graphics password, recycles character graphics password pair
Target data is encrypted, and improves the complexity of password, so that encrypted target data security is carried
Height, beneficial to the protection to target data, improves the experience of user.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make these embodiments other change and modification.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these modification and variations.
Claims (10)
- A kind of 1. encryption method, it is characterised in that including:Determine the character password sequence for encrypting target data;The sliding trace corresponding to slide that the character password sequence and user are carried out in figure inputting interface into Row association, generates character graphics password;The target data is encrypted using the character graphics password.
- 2. encryption method as claimed in claim 1, it is characterised in that it is described by the character password sequence and user in figure The sliding trace corresponding to slide carried out in inputting interface is associated, and generates character graphics password, including:In at least one key lattice that Character Filling in the character password sequence to the figure inputting interface is included, each Character corresponds to a key lattice;Receive the slide of the user in the figure inputting interface, it is corresponding with the slide obtaining Sequentially extracted while sliding trace the sliding trace by way of each key lattice in character;By the sliding trace by way of each key lattice be associated with the corresponding each character extracted, generate the character figure Shape password.
- 3. encryption method as claimed in claim 1, it is characterised in that it is described by the character password sequence and user in figure The sliding trace corresponding to slide carried out in inputting interface is associated, and generates character graphics password, including:Receive the slide of the user in the figure inputting interface comprising at least one key lattice, obtain with Sequentially by the Character Filling in the character password sequence to the slip while slide corresponding sliding trace Track by way of each key lattice in, each character corresponds to a key lattice;By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, generate the word Accord with graphical passwords.
- 4. encryption method as claimed in claim 3, it is characterised in that described sequentially by the word in the character password sequence Symbol be filled into the sliding trace by way of each key lattice in after, the method further includes:Completion character is filled in blank key lattice in the figure inputting interface;By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, meanwhile, by institute State blank key lattice and be associated with the completion character being filled into the blank key lattice, generate the character graphics password.
- 5. encryption method as claimed in claim 1, it is characterised in that the character password determined for encrypting target data Sequence, including:Selection operation based on user to preset characters sequence, determines the character password sequence;Or;Input operation based on user, determines the character password sequence.
- 6. encryption method as claimed in claim 1, it is characterised in that when the character is determined in the input operation based on user Keying sequence, before the generation character graphics password, the method further includes:The character password sequence is stored in local and/or high in the clouds.
- A kind of 7. encryption device, it is characterised in that including:Determining module, for determining the character password sequence for encrypting target data;Relating module, for corresponding to the slide that carries out the character password sequence and user in figure inputting interface Sliding trace be associated, generate character graphics password;Encrypting module, for the target data to be encrypted using the character graphics password.
- 8. encryption device as claimed in claim 7, it is characterised in that the relating module includes:Fills unit, for the Character Filling in the character password sequence is included to the figure inputting interface at least one In a key lattice, each character corresponds to a key lattice;Extraction unit, for receiving the slide of the user in the figure inputting interface, obtain with it is described Sequentially extracted while slide corresponding sliding trace the sliding trace by way of each key lattice in character;Associative cell, for by the sliding trace by way of each key lattice be associated with the corresponding each character extracted, Generate the character graphics password.
- A kind of 9. cipher authentication method, it is characterised in that including:Receive the input operation that encryption data is decrypted in user, obtain character graphics password to be certified;The character graphics password to be certified is matched with standard character graphical passwords, judges the character graphics to be certified Whether password is identical with the standard character graphical passwords;If the character graphics password to be certified is identical with the standard character graphical passwords, certification success, adds to described Ciphertext data is decrypted.
- A kind of 10. cipher authentication device, it is characterised in that including:Module is obtained, the input operation that encryption data is decrypted for receiving user, obtains character graphics password to be certified;Judgment module, for the character graphics password to be certified to be matched with standard character graphical passwords, described in judgement Whether character graphics password to be certified is identical with the standard character graphical passwords;Deciphering module, if identical with the standard character graphical passwords for the character graphics password to be certified, certification Success, is decrypted the encryption data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610900405.XA CN107958148A (en) | 2016-10-17 | 2016-10-17 | A kind of encryption method, cipher authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610900405.XA CN107958148A (en) | 2016-10-17 | 2016-10-17 | A kind of encryption method, cipher authentication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107958148A true CN107958148A (en) | 2018-04-24 |
Family
ID=61954209
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610900405.XA Pending CN107958148A (en) | 2016-10-17 | 2016-10-17 | A kind of encryption method, cipher authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107958148A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103677644A (en) * | 2013-12-25 | 2014-03-26 | 北京航空航天大学 | Unlocking method and system for smart mobile terminal |
CN103824033A (en) * | 2014-01-02 | 2014-05-28 | 南京永泰电子有限公司 | Touch display device for safely inputting password information and password input method |
CN105184140A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Password input method and device as well as mobile terminal |
CN105224885A (en) * | 2015-10-08 | 2016-01-06 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data processing method and terminal |
CN105550565A (en) * | 2015-10-30 | 2016-05-04 | 东莞酷派软件技术有限公司 | Unlocking method and device |
CN105740691A (en) * | 2016-01-27 | 2016-07-06 | 深圳市金立通信设备有限公司 | Password authentication method and terminal |
-
2016
- 2016-10-17 CN CN201610900405.XA patent/CN107958148A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103677644A (en) * | 2013-12-25 | 2014-03-26 | 北京航空航天大学 | Unlocking method and system for smart mobile terminal |
CN103824033A (en) * | 2014-01-02 | 2014-05-28 | 南京永泰电子有限公司 | Touch display device for safely inputting password information and password input method |
CN105184140A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Password input method and device as well as mobile terminal |
CN105224885A (en) * | 2015-10-08 | 2016-01-06 | 宇龙计算机通信科技(深圳)有限公司 | A kind of data processing method and terminal |
CN105550565A (en) * | 2015-10-30 | 2016-05-04 | 东莞酷派软件技术有限公司 | Unlocking method and device |
CN105740691A (en) * | 2016-01-27 | 2016-07-06 | 深圳市金立通信设备有限公司 | Password authentication method and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109891418A (en) | Method for protecting the transaction executed from non-security terminal | |
CN104851071B (en) | A kind of digital image encryption method based on three-dimensional chaotic system | |
CN103618729A (en) | Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage | |
CN103491062B (en) | Method and device for generating password | |
CN103888468B (en) | Privacy protection method based on trusted third party attribute fuzzy grouping under cloud environment | |
CN107070660A (en) | A kind of design Storage method of block chain encrypted radio-frequency chip | |
CN102957688A (en) | Password input and verification method and device | |
CN104766264A (en) | Partitioning double-layer self-adaptation diffusion image encryption method | |
CN107181600A (en) | A kind of password login authentication method, system and user equipment and certificate server | |
CN103607274B (en) | A kind of method generating dynamic password with static password for source | |
CN106656459A (en) | Side channel energy analysis method and device for SM3-HMAC | |
CN102710657B (en) | A kind of one-time password generates method and system | |
CN105281898A (en) | Apparatus and method for generating key | |
CN110166784A (en) | A kind of adapting to image texture area steganographic algorithm based on block of pixels | |
CN108200098A (en) | A kind of method for controlling multilevel access and system based on more secret visual passwords | |
CN104112096B (en) | Multi-point touch method and device | |
CN104966014B (en) | The encryption method and encryption device of terminal, the decryption method of terminal and decryption device | |
CN107958148A (en) | A kind of encryption method, cipher authentication method and device | |
Kim et al. | FakePIN: Dummy key based mobile user authentication scheme | |
CN105872305A (en) | Full separable encryption domain image reversible data hiding method | |
CN109891821A (en) | Method for executing sensitive operation with using non-security terminal security | |
CN102594562A (en) | Human authentication method | |
CN105005806B (en) | A kind of matrix dot map logo, generates system and antifalsification label at generation method | |
CN108959898B (en) | Graph unlocking password authentication method based on graph addition algorithm | |
CN111597521A (en) | Transformer substation mobile terminal data security processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180424 |