CN107958148A - A kind of encryption method, cipher authentication method and device - Google Patents

A kind of encryption method, cipher authentication method and device Download PDF

Info

Publication number
CN107958148A
CN107958148A CN201610900405.XA CN201610900405A CN107958148A CN 107958148 A CN107958148 A CN 107958148A CN 201610900405 A CN201610900405 A CN 201610900405A CN 107958148 A CN107958148 A CN 107958148A
Authority
CN
China
Prior art keywords
character
password
sliding trace
sequence
key lattice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610900405.XA
Other languages
Chinese (zh)
Inventor
何俊峰
李进舟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Samsung Electronics Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Tianjin Samsung Electronics Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Samsung Electronics Co Ltd, Samsung Electronics Co Ltd filed Critical Tianjin Samsung Electronics Co Ltd
Priority to CN201610900405.XA priority Critical patent/CN107958148A/en
Publication of CN107958148A publication Critical patent/CN107958148A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention relates to field of computer technology, more particularly to a kind of encryption method, cipher authentication method and device, the described method includes:Determine the character password sequence for encrypting target data;The sliding trace corresponding to slide that the character password sequence is carried out with user in figure inputting interface is associated, and generates character graphics password;The target data is encrypted using the character graphics password.The present invention is after character password sequence is determined; the sliding trace corresponding to slide that user is carried out in figure inputting interface is associated with the character password sequence; generate character graphics password; recycle character graphics password that target data is encrypted; improve the complexity of password; so that encrypted target data security is improved, beneficial to the protection to target data, the experience of user is improved.

Description

A kind of encryption method, cipher authentication method and device
Technical field
The present invention relates to field of computer technology, more particularly to a kind of encryption method, cipher authentication method and device.
Background technology
Data encryption is the important step that user ensures data safety, wherein, it is exactly a kind of common to set password for data Data encryption mode.It is higher and higher for the frequency of use of password now, it is also higher and higher to the safety requirements of password.Existing Have in technology, usually using the combination producing password of the characters such as numeral and letter, therefore, limit the complexity of password, cause The security of password is low, is unfavorable for the protection to data.
The content of the invention
In view of the above problems, it is proposed that the present invention overcomes the above problem in order to provide one kind or solves at least in part State encryption method, cipher authentication method and the device of problem.
The embodiment of the present invention provides a kind of encryption method, including:
Determine the character password sequence for encrypting target data;
The slip rail corresponding to slide that the character password sequence and user are carried out in figure inputting interface Mark is associated, and generates character graphics password;
The target data is encrypted using the character graphics password.
Preferably, the slide institute that the character password sequence and user are carried out in figure inputting interface is right The sliding trace answered is associated, and generates character graphics password, including:
In at least one key lattice that Character Filling in the character password sequence to the figure inputting interface is included, Each character corresponds to a key lattice;
Receive the slide of the user in the figure inputting interface, obtaining and the slide pair Sequentially extracted while the sliding trace answered the sliding trace by way of each key lattice in character;
By the sliding trace by way of each key lattice be associated with the corresponding each character extracted, generate the word Accord with graphical passwords.
Preferably, the slide institute that the character password sequence and user are carried out in figure inputting interface is right The sliding trace answered is associated, and generates character graphics password, including:
Receive the slide of the user in the figure inputting interface comprising at least one key lattice, obtaining Sequentially by the Character Filling in the character password sequence described in while obtaining sliding trace corresponding with the slide Sliding trace by way of each key lattice in, each character corresponds to a key lattice;
By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, generate institute State character graphics password.
Preferably, it is described sequentially by the Character Filling in the character password sequence to the sliding trace by way of it is each After in a key lattice, the method further includes:
Completion character is filled in blank key lattice in the figure inputting interface;
By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, meanwhile, The blank key lattice are associated with the completion character being filled into the blank key lattice, generate the character graphics password.
Preferably, the character password sequence determined for encrypting target data, including:
Selection operation based on user to preset characters sequence, determines the character password sequence;Or;
Input operation based on user, determines the character password sequence.
Preferably, the character password sequence is determined when the input based on user operates, in the generation character graphics Before password, the method further includes:
The character password sequence is stored in local and/or high in the clouds.
Based on same inventive concept, the embodiment of the present invention also provides a kind of encryption device, including:
Determining module, for determining the character password sequence for encrypting target data;
Relating module, for the slide institute for carrying out the character password sequence and user in figure inputting interface Corresponding sliding trace is associated, and generates character graphics password;
Encrypting module, for the target data to be encrypted using the character graphics password.
Preferably, the relating module includes:
Fills unit, for by the Character Filling in the character password sequence to the figure inputting interface include to In few key lattice, each character corresponds to a key lattice;
Extraction unit, for receiving the slide of the user in the figure inputting interface, obtain with Sequentially extracted while the slide corresponding sliding trace the sliding trace by way of each key lattice in character;
Associative cell, for by the sliding trace by way of each key lattice closed with the corresponding each character extracted Connection, generates the character graphics password.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication method, including:
Receive the input operation that encryption data is decrypted in user, obtain character graphics password to be certified;
The character graphics password to be certified is matched with standard character graphical passwords, judges the character to be certified Whether graphical passwords are identical with the standard character graphical passwords;
If the character graphics password to be certified is identical with the standard character graphical passwords, certification success, to institute Encryption data is stated to be decrypted.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication device, including:
Module is obtained, the input operation that encryption data is decrypted for receiving user, obtains character graphics to be certified Password;
Judgment module, for the character graphics password to be certified to be matched with standard character graphical passwords, judges Whether the character graphics password to be certified is identical with the standard character graphical passwords;
Deciphering module, if identical with the standard character graphical passwords for the character graphics password to be certified, Certification success, is decrypted the encryption data.
One or more of embodiment of the present invention technical solution, has at least the following technical effects or advantages:
The slide institute of the invention that after character password sequence is determined, user is carried out in figure inputting interface Corresponding sliding trace is associated with the character password sequence, generates character graphics password, recycles character graphics password pair Target data is encrypted, and improves the complexity of password, so that encrypted target data security is carried Height, beneficial to the protection to target data, improves the experience of user.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole attached drawing, identical component is represented with identical reference pattern.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of encryption method of the embodiment of the present invention;
Fig. 2 shows the schematic diagram of step 102 one embodiment under the first embodiment of the embodiment of the present invention;
Fig. 3 shows the schematic diagram of step 102 second embodiment under the first embodiment of the embodiment of the present invention;
Fig. 4 shows the schematic diagram of step 102 one embodiment under second of embodiment of the embodiment of the present invention;
Fig. 5 shows the schematic diagram of step 102 second embodiment under second of embodiment of the embodiment of the present invention;
Fig. 6 shows the schematic diagram of step 102 the 3rd embodiment under second of embodiment of the embodiment of the present invention;
Fig. 7 shows a kind of structure diagram of encryption device of the embodiment of the present invention;
Fig. 8 shows a kind of flow chart of cipher authentication method of the embodiment of the present invention;
Fig. 9 shows a kind of structure diagram of cipher authentication device of the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
The embodiment of the present invention provides a kind of encryption method, for data to be encrypted, as shown in Figure 1, the encryption method Comprise the following steps:
Step 101:Determine the character password sequence for encrypting target data.
Specifically, multiple character strings are previously provided with system, the preset characters sequence namely default character sequence. The character included in preset characters sequence can be numeral, letter or symbol, also, preset characters sequence can be by numeral, Letter and symbol are arbitrarily arranged in pairs or groups obtained combination.For example, preset characters sequence can be:“123456789”、“jklmopqr”、 " 2046, ap_ " etc..Selection operation based on user to preset characters sequence, can determine from default multigroup character string Go out character password sequence, for example, according to the selection operation of user, " 123456789 " are determined as character password sequence.
In addition, user can also voluntarily input character password sequence, character password is determined in the input operation based on user Sequence, for example, being operated according to the input of user, by " 2016az, sSy5k " are determined as character password sequence.Likewise, user is defeated The character included in the character password sequence entered can be numeral, character or symbol, also, character password sequence can be by counting Word, character and meet any obtained combination of arranging in pairs or groups.When character password sequence is sequence obtained from the input operation based on user During row, after character password sequence is determined, which can be stored in local and/or high in the clouds, after convenient It is continuous to use.
Step 102:Corresponding to the slide that the character password sequence and user are carried out in figure inputting interface Sliding trace be associated, generate character graphics password.
Specifically, at least one key lattice are included in figure inputting interface, what key lattice were distributed in figure inputting interface Position user can be according to any setting be actually needed, for example, figure inputting interface can include 9 key lattice, 9 key lattice are with nine Palace case form is distributed in figure inputting interface.Further, receiving the slide of user in figure inputting interface can obtain Obtain sliding trace corresponding with slide.
For how to be associated character password sequence with sliding trace, under the first embodiment, first, by word In each key lattice that Character Filling in symbol keying sequence is included to figure inputting interface, each character corresponds to a key lattice.Its In, when the quantity for the key lattice that the quantity for the character that character password sequence includes is included less than figure inputting interface, then according to default After fill rule filling, a part of key lattice are filled with character, and another part key lattice remain as blank key lattice.When character password sequence Comprising the quantity of character be equal to the quantity of key lattice that figure inputting interface includes, then after being filled according to default fill rule, figure Character is filled with all key lattice in shape inputting interface.When the quantity for the character that character password sequence includes is defeated more than figure Enter the quantity for the key lattice that interface includes, then only by the identical each key of Character Filling of the key lattice quantity included with figure inputting interface In lattice.Wherein, default fill rule can be according to any setting of actual needs of user, for example, when in figure inputting interface When key lattice distribution is nine grids, default fill rule can be from left to right from up to down to fill out the character in character password sequence It is charged in each key lattice.Then, slide of the user in figure inputting interface is received, it is corresponding with slide obtaining Sequentially extracted while sliding trace sliding trace by way of each key lattice in character, by sliding trace by way of each key lattice It is associated with the corresponding each character extracted, generates character graphics password.
For example, when the character password sequence determined is " 123456789 ", it is defeated that " 123456789 " are filled into figure Enter in the nine grids key lattice in interface, as shown in Fig. 2, then, receiving slide of the user in figure inputting interface, obtain Sliding trace corresponding with slide, i.e. shape are the sliding trace of " 3 ", are obtaining shape as the same of the sliding trace of " 3 " When extract the sliding trace by way of each key lattice in character, be followed successively by " 12487 ", will be each in " 12487 " that extract A character is associated with shape for each key lattice in the sliding trace of " 3 ", so that, generate the first character graphics password.Again Such as, when the character password sequence determined is " jklmnopqr ", " jklmnopqr " is filled into figure inputting interface In nine grids key lattice, then, receive slide of the user in figure inputting interface, obtain slip corresponding with slide Track, i.e. shape are the sliding trace of " 7 ", and sliding trace way is extracted while the sliding trace that shape is " 7 " is obtained Character in each key lattice of warp, is followed successively by " jklnq ", is " 7 " by each character in " jklnq " that extracts and shape Each key lattice in sliding trace are associated, so as to generate the second character graphics password.In this application, can be by multiple words Symbol graphical passwords merge, and target data are encrypted using the character graphics password after merging, for example, in generation the After one character graphics password, the first character graphics password is cached, then the second character figure is generated using same method Shape password, as shown in figure 3, finally, being added using the first character graphics password and the second character graphics password to target data It is close, so that, when encrypted target data is decrypted, it is necessary to ensure first to be proved to be successful the first character graphics password posteriority Successfully the second character graphics password is demonstrate,proved, target data can be decrypted.
For associating character password sequence and sliding trace, under second of embodiment, first, receive user and exist Slide in figure inputting interface, sequentially by character password sequence while sliding trace corresponding with slide is obtained Character Filling in row to sliding trace by way of each key lattice in, each character corresponds to a key lattice.Wherein, character password is worked as The quantity for the character that sequence includes less than sliding trace by way of key lattice quantity, then it is sliding after being filled according to default fill rule Dynamic rail mark by way of key lattice in a part of key lattice be filled with character, another part key lattice are blank key lattice.When character password sequence Comprising character quantity be equal to sliding trace by way of key lattice quantity, then according to default fill rule fill after, slide rail Mark by way of key lattice in all key lattice be filled with character.When the quantity for the character that character password sequence includes is more than slip rail Mark by way of key lattice quantity, then by with sliding trace by way of the identical Character Filling of key lattice quantity in each key lattice, together When, the character not being filled in character password sequence is cached.Wherein, default fill rule can be according to the reality of user Border needs any setting, for example, since sliding trace by way of first key lattice sequentially to sliding trace by way of each key Fill character in lattice.Then, by sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, Generate character graphics password.
For example, when determine character password sequence is " 2016az, ", and the slip rail corresponding to the slide of user Mark is the sliding trace that shape is " 3 ", then while the sliding trace that shape is " 3 " is obtained, sequentially fills " 2016az, " To sliding trace by way of each key lattice in, as shown in figure 4, and by shape for " 3 " sliding trace by way of each key lattice with Corresponding character in " 2016az, " is associated, and generates character graphics password.When the character password sequence determined is " 2016az .sSy5k;" when, if the first sliding trace corresponding to the first slide of user is the slip that shape is " 3 " Track, then " 2016az, " is filled into while obtaining shape and being " 3 " first sliding trace the first sliding trace by way of it is each In a key lattice, and by shape for " 3 " the first sliding trace by way of each key lattice and " 2016az, " in correspondence character carry out Association, generates the first character graphics password, while " sSy5k " is cached, after refresh graphics inputting interface, figure input All key lattice in interface are in space state, if receiving second slide of the user in figure inputting interface, The second sliding trace corresponding to the second slide is obtained, if the second sliding trace is the sliding trace that shape is " Z ", By " .sSy5k while acquisition shape is second sliding trace of " Z ";" be filled into the second sliding trace by way of each key lattice It is interior, as shown in figure 5, and by shape for " Z " the second sliding trace by way of each key lattice and " .sSy5k;" in correspondence character It is associated, generates the second character graphics password.Finally, using the first character graphics password and the second character graphics password to mesh Mark data are encrypted, so that, when encrypted target data is decrypted, it is necessary to ensure first to be proved to be successful the first character The second character graphics password is proved to be successful after graphical passwords, target data can be decrypted.
When target data is encrypted using above-mentioned second of embodiment, generally, sliding trace only can be through The part key lattice in figure inputting interface are crossed, if also including blank key lattice after slide, in figure inputting interface, Then, completion character is filled in blank key lattice, completion character is generated at random by system, as shown in fig. 6, and then, rail will slided Mark by way of each key lattice be associated with the corresponding character being filled into each key lattice while, blank key lattice and sky will be filled into Completion character in white key lattice is associated, and generates character graphics password.Pass through completion character completion blank key lattice, it is possible to increase The complexity of character graphics password is generated, so as to improve the security of character graphics password.
In this application, character password and graphical passwords, character password and figure are included in the character graphics password of generation Cryptographic association.Include character password information in each key lattice in graphical passwords, in all key lattice included by graphical passwords Character password information composition character password.In addition, each key lattice carry station location marker information, when key lattice and character association Afterwards, character also carries the station location marker information of corresponding keys lattice, using station location marker information realization key lattice with before character Association.
Step 103:Target data is encrypted using character graphics password.
Based on same inventive concept, the embodiment of the present invention also provides a kind of encryption device corresponding with encryption method, such as Fig. 7 Shown, described device includes:
Determining module 701, for determining the character password sequence for encrypting target data.
Relating module 702, the slip for the character password sequence and user to be carried out in figure inputting interface are grasped Make corresponding sliding trace to be associated, generate character graphics password.
Encrypting module 703, for the target data to be encrypted using the character graphics password.
Relating module 702, including:
First fills unit, for the Character Filling in the character password sequence to be included to the figure inputting interface At least one key lattice in, each character corresponds to a key lattice;
Extraction unit, for receiving the slide of the user in the figure inputting interface, obtain with Sequentially extracted while the slide corresponding sliding trace the sliding trace by way of each key lattice in character;
First associative cell, for by the sliding trace by way of each key lattice and the corresponding each character extracted into Row association, generates the character graphics password.
Relating module 702, including:
Second fills unit, for receiving the user in the figure inputting interface comprising at least one key lattice The slide, sequentially by the character password sequence while sliding trace corresponding with the slide is obtained Character Filling to the sliding trace by way of each key lattice in, each character corresponds to a key lattice;
Second associative cell, for by the sliding trace by way of each key lattice and the corresponding word being filled into each key lattice Symbol is associated, and generates the character graphics password.
Described device further includes:
3rd fills unit, for filling completion character in the blank key lattice in the figure inputting interface;
3rd associative cell, for by the sliding trace by way of each key lattice and the corresponding word being filled into each key lattice Symbol is associated, meanwhile, the blank key lattice are associated with the completion character being filled into the blank key lattice, generate institute State character graphics password.
Determining module 701, including:
First determination unit, for the selection operation based on user to preset characters sequence, determines the character password Sequence;Or;
Second determination unit, for the input operation based on user, determines the character password sequence.
Described device further includes:
Preserving module, for the character password sequence to be stored in local and/or high in the clouds.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication method corresponding with encryption method, As shown in figure 8, it the described method comprises the following steps:
Step 801:Receive the input operation that encryption data is decrypted in user, obtain character graphics password to be certified.
Step 802:The character graphics password to be certified is matched with standard character graphical passwords, is treated described in judgement Whether certification character graphics password is identical with the standard character graphical passwords.
Specifically, graphical passwords to be certified and character password to be certified are included in character graphics password to be certified, will The character graphics password to be certified is matched with standard character graphical passwords, is judged in the character graphics password to be certified Graphical passwords to be certified it is whether identical with the test pattern password in the standard character graphical passwords, and judge described in treat Character password to be certified in certification character graphics password whether with the standard character password in the standard character graphical passwords It is identical.
Step 803:If the character graphics password to be certified is identical with the standard character graphical passwords, certification into Work(, is decrypted the encryption data.
Specifically, if the graphical passwords to be certified are identical with the test pattern password, and the word to be certified It is identical with the standard character password to accord with password, then certification success, is decrypted the encryption data.
Based on same inventive concept, the embodiment of the present invention also provides a kind of cipher authentication dress corresponding with cipher authentication method Put, as shown in figure 9, described device includes:
Module 901 is obtained, the input operation that encryption data is decrypted for receiving user, obtains character figure to be certified Shape password;
Judgment module 902, for the character graphics password to be certified to be matched with standard character graphical passwords, sentences Whether the character graphics password to be certified that breaks is identical with the standard character graphical passwords.
Deciphering module 903, if identical with the standard character graphical passwords for the character graphics password to be certified, Then certification success, is decrypted the encryption data.
Technical solution in above-mentioned the embodiment of the present application, at least has the following technical effect that or advantage:
The slide institute of the invention that after character password sequence is determined, user is carried out in figure inputting interface Corresponding sliding trace is associated with the character password sequence, generates character graphics password, recycles character graphics password pair Target data is encrypted, and improves the complexity of password, so that encrypted target data security is carried Height, beneficial to the protection to target data, improves the experience of user.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make these embodiments other change and modification.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these modification and variations.

Claims (10)

  1. A kind of 1. encryption method, it is characterised in that including:
    Determine the character password sequence for encrypting target data;
    The sliding trace corresponding to slide that the character password sequence and user are carried out in figure inputting interface into Row association, generates character graphics password;
    The target data is encrypted using the character graphics password.
  2. 2. encryption method as claimed in claim 1, it is characterised in that it is described by the character password sequence and user in figure The sliding trace corresponding to slide carried out in inputting interface is associated, and generates character graphics password, including:
    In at least one key lattice that Character Filling in the character password sequence to the figure inputting interface is included, each Character corresponds to a key lattice;
    Receive the slide of the user in the figure inputting interface, it is corresponding with the slide obtaining Sequentially extracted while sliding trace the sliding trace by way of each key lattice in character;
    By the sliding trace by way of each key lattice be associated with the corresponding each character extracted, generate the character figure Shape password.
  3. 3. encryption method as claimed in claim 1, it is characterised in that it is described by the character password sequence and user in figure The sliding trace corresponding to slide carried out in inputting interface is associated, and generates character graphics password, including:
    Receive the slide of the user in the figure inputting interface comprising at least one key lattice, obtain with Sequentially by the Character Filling in the character password sequence to the slip while slide corresponding sliding trace Track by way of each key lattice in, each character corresponds to a key lattice;
    By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, generate the word Accord with graphical passwords.
  4. 4. encryption method as claimed in claim 3, it is characterised in that described sequentially by the word in the character password sequence Symbol be filled into the sliding trace by way of each key lattice in after, the method further includes:
    Completion character is filled in blank key lattice in the figure inputting interface;
    By the sliding trace by way of each key lattice be associated with the corresponding character being filled into each key lattice, meanwhile, by institute State blank key lattice and be associated with the completion character being filled into the blank key lattice, generate the character graphics password.
  5. 5. encryption method as claimed in claim 1, it is characterised in that the character password determined for encrypting target data Sequence, including:
    Selection operation based on user to preset characters sequence, determines the character password sequence;Or;
    Input operation based on user, determines the character password sequence.
  6. 6. encryption method as claimed in claim 1, it is characterised in that when the character is determined in the input operation based on user Keying sequence, before the generation character graphics password, the method further includes:
    The character password sequence is stored in local and/or high in the clouds.
  7. A kind of 7. encryption device, it is characterised in that including:
    Determining module, for determining the character password sequence for encrypting target data;
    Relating module, for corresponding to the slide that carries out the character password sequence and user in figure inputting interface Sliding trace be associated, generate character graphics password;
    Encrypting module, for the target data to be encrypted using the character graphics password.
  8. 8. encryption device as claimed in claim 7, it is characterised in that the relating module includes:
    Fills unit, for the Character Filling in the character password sequence is included to the figure inputting interface at least one In a key lattice, each character corresponds to a key lattice;
    Extraction unit, for receiving the slide of the user in the figure inputting interface, obtain with it is described Sequentially extracted while slide corresponding sliding trace the sliding trace by way of each key lattice in character;
    Associative cell, for by the sliding trace by way of each key lattice be associated with the corresponding each character extracted, Generate the character graphics password.
  9. A kind of 9. cipher authentication method, it is characterised in that including:
    Receive the input operation that encryption data is decrypted in user, obtain character graphics password to be certified;
    The character graphics password to be certified is matched with standard character graphical passwords, judges the character graphics to be certified Whether password is identical with the standard character graphical passwords;
    If the character graphics password to be certified is identical with the standard character graphical passwords, certification success, adds to described Ciphertext data is decrypted.
  10. A kind of 10. cipher authentication device, it is characterised in that including:
    Module is obtained, the input operation that encryption data is decrypted for receiving user, obtains character graphics password to be certified;
    Judgment module, for the character graphics password to be certified to be matched with standard character graphical passwords, described in judgement Whether character graphics password to be certified is identical with the standard character graphical passwords;
    Deciphering module, if identical with the standard character graphical passwords for the character graphics password to be certified, certification Success, is decrypted the encryption data.
CN201610900405.XA 2016-10-17 2016-10-17 A kind of encryption method, cipher authentication method and device Pending CN107958148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610900405.XA CN107958148A (en) 2016-10-17 2016-10-17 A kind of encryption method, cipher authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610900405.XA CN107958148A (en) 2016-10-17 2016-10-17 A kind of encryption method, cipher authentication method and device

Publications (1)

Publication Number Publication Date
CN107958148A true CN107958148A (en) 2018-04-24

Family

ID=61954209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610900405.XA Pending CN107958148A (en) 2016-10-17 2016-10-17 A kind of encryption method, cipher authentication method and device

Country Status (1)

Country Link
CN (1) CN107958148A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677644A (en) * 2013-12-25 2014-03-26 北京航空航天大学 Unlocking method and system for smart mobile terminal
CN103824033A (en) * 2014-01-02 2014-05-28 南京永泰电子有限公司 Touch display device for safely inputting password information and password input method
CN105184140A (en) * 2015-07-30 2015-12-23 广东欧珀移动通信有限公司 Password input method and device as well as mobile terminal
CN105224885A (en) * 2015-10-08 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of data processing method and terminal
CN105550565A (en) * 2015-10-30 2016-05-04 东莞酷派软件技术有限公司 Unlocking method and device
CN105740691A (en) * 2016-01-27 2016-07-06 深圳市金立通信设备有限公司 Password authentication method and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677644A (en) * 2013-12-25 2014-03-26 北京航空航天大学 Unlocking method and system for smart mobile terminal
CN103824033A (en) * 2014-01-02 2014-05-28 南京永泰电子有限公司 Touch display device for safely inputting password information and password input method
CN105184140A (en) * 2015-07-30 2015-12-23 广东欧珀移动通信有限公司 Password input method and device as well as mobile terminal
CN105224885A (en) * 2015-10-08 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of data processing method and terminal
CN105550565A (en) * 2015-10-30 2016-05-04 东莞酷派软件技术有限公司 Unlocking method and device
CN105740691A (en) * 2016-01-27 2016-07-06 深圳市金立通信设备有限公司 Password authentication method and terminal

Similar Documents

Publication Publication Date Title
CN109891418A (en) Method for protecting the transaction executed from non-security terminal
CN104851071B (en) A kind of digital image encryption method based on three-dimensional chaotic system
CN103618729A (en) Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage
CN103491062B (en) Method and device for generating password
CN103888468B (en) Privacy protection method based on trusted third party attribute fuzzy grouping under cloud environment
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN102957688A (en) Password input and verification method and device
CN104766264A (en) Partitioning double-layer self-adaptation diffusion image encryption method
CN107181600A (en) A kind of password login authentication method, system and user equipment and certificate server
CN103607274B (en) A kind of method generating dynamic password with static password for source
CN106656459A (en) Side channel energy analysis method and device for SM3-HMAC
CN102710657B (en) A kind of one-time password generates method and system
CN105281898A (en) Apparatus and method for generating key
CN110166784A (en) A kind of adapting to image texture area steganographic algorithm based on block of pixels
CN108200098A (en) A kind of method for controlling multilevel access and system based on more secret visual passwords
CN104112096B (en) Multi-point touch method and device
CN104966014B (en) The encryption method and encryption device of terminal, the decryption method of terminal and decryption device
CN107958148A (en) A kind of encryption method, cipher authentication method and device
Kim et al. FakePIN: Dummy key based mobile user authentication scheme
CN105872305A (en) Full separable encryption domain image reversible data hiding method
CN109891821A (en) Method for executing sensitive operation with using non-security terminal security
CN102594562A (en) Human authentication method
CN105005806B (en) A kind of matrix dot map logo, generates system and antifalsification label at generation method
CN108959898B (en) Graph unlocking password authentication method based on graph addition algorithm
CN111597521A (en) Transformer substation mobile terminal data security processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180424