CN102724034A - Encryption/decryption system and method based on space motion - Google Patents

Encryption/decryption system and method based on space motion Download PDF

Info

Publication number
CN102724034A
CN102724034A CN2012101534613A CN201210153461A CN102724034A CN 102724034 A CN102724034 A CN 102724034A CN 2012101534613 A CN2012101534613 A CN 2012101534613A CN 201210153461 A CN201210153461 A CN 201210153461A CN 102724034 A CN102724034 A CN 102724034A
Authority
CN
China
Prior art keywords
key
module
information
user
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101534613A
Other languages
Chinese (zh)
Inventor
李智杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PEOPLE SEARCH NETWORK AG
Original Assignee
PEOPLE SEARCH NETWORK AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PEOPLE SEARCH NETWORK AG filed Critical PEOPLE SEARCH NETWORK AG
Priority to CN2012101534613A priority Critical patent/CN102724034A/en
Publication of CN102724034A publication Critical patent/CN102724034A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption/decryption system and method based on space motion. The encryption/decryption system mainly comprises a motion sensing module, a private key generation module, an encryption module, a decryption module, a control module and a private key storage module, wherein the motion sensing module is used for receiving direction data generated by a direction sensor hardware; the private key generation module is used for processing the direction data and converting the direction data into a vector which is used as a user private key; the encryption module and the decryption module are used for completing the encryption and decryption process of the information by adopting the data encryption standard (DES), AES (Advanced Encryption Standard) and other optional symmetrical private key systems; the control module is used for controlling the system and calling other modules for intentions of different users; and the private key storage module is used for storing different generated private keys according to the information of different users in a ciphertext form. By utilizing the system and the method, the quick private key generation and encryption/decryption technology is provided by utilizing the motion sensing capability of portable equipment, such as a gyroscope and an acceleration transducer, and a user can finish the encryption/decryption operations on the information by utilizing the private keys.

Description

A kind of encrypting and decrypting system and method based on spatial movement
Technical field
The invention belongs to information security field; Be specifically related to a kind of portable equipment that has gyroscope and acceleration transducer; Movement properties through the detecting portable equipment produces key, and adopts symmetric encipherment algorithm to use this key to encrypt, and then writes down the mode of this equipment moving; Carry out the checking of key according to the attribute similarity of twice motion, and information is deciphered.
Background technology
The quantity of holding that moves portable equipment is increasing year by year, and so far, global mobile subscriber surpasses 5,000,000,000.This rapid growth phenomenon has reflected that along with epoch and development of technology human demand to mobility and convenient computing equipment sharply rises.
In this simultaneously, along with the intellectuality of moving portable equipment and the enhancing of computing capability, the safety problem of mobile device is also more and more outstanding, and encrypting and decrypting method is the core of security fields, and the mode of on PC, importing key through the user realizes the generation of key.But on mobile device, because the restriction of mobile terminal screen size and interaction capabilities, make the user in the key input process, have inconvenient operation, problem such as loaded down with trivial details, particularly the user that inputs to for some long keys brings very big puzzlement.
Summary of the invention
In view of this; Main purpose of the present invention is to provide a kind of encrypting and decrypting system and method based on spatial movement; Through utilizing the motion perception of portable equipments such as gyroscope and acceleration transducer etc.; Key generation efficiently and encryption and decryption technique are provided, and the user can utilize this technology to accomplish the encryption and decryption to information.When the user need import key, movement locus that defines when setting key by the user and speed moved portable equipment, can accomplish the typing of key.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of encrypting and decrypting system based on spatial movement, this system mainly comprises motion sensing module, key production module, key authentication module, encrypting module, deciphering module, control module and key storage block; Wherein:
The motion sensing module is used for the bearing data that recipient's level sensor hardware produces;
Key production module is used to handle said bearing data, this bearing data is changed into vector representation, as user key;
Encrypting module adopts DES, AES or other any symmetric-key systems to accomplish the ciphering process to above-mentioned information;
Deciphering module adopts DES, AES or other any symmetric-key systems to accomplish said enciphered message is deciphered;
Control module is used for said system is controlled, to call other different modules to the different intention of user; And,
Key storage block is directed against the different different generation key of information stores of user with the ciphertext form.
Wherein, This system further comprises the key authentication module, through the orientation change information of typing user portable equipment once more, adopts certain error tolerance to be provided with the key that keeps before and compares; If be in the tolerance interval then checking is passed through, and the key before adopting is deciphered.
Said motion sensing module can utilize the hardware drive program of portable equipment or the correlation module of portable device system.
Said aspect sensor comprises gyroscope, acceleration transducer.
A kind of encryption method based on spatial movement, this method comprises:
A, state that from the user password typing begins, through control module initialization user's motion state attribute;
B, user begin to begin in some way to move portable equipment simultaneously, and control module is then called the motion state information that the motion sensing module obtains portable equipment with certain frequency;
C, after motion sequence produces, utilize key production module to adopt certain algorithm that the motion state sequence that generates is calculated the generation key sequence;
D, said key is adopted private key encryption and deposits key storage block in the ciphertext form;
E, employing symmetric key algorithm such as DES etc. encrypt information.
Wherein, The said control module of step B is called the motion state information that the motion sensing module obtains portable equipment with certain frequency; Be specially: move till the said portable equipment certain time, each motion back inquiry produces the information of motion state, generates the motion state sequence.
A kind of decryption method based on spatial movement, this method comprises:
A, state that from the user password typing begins, utilize control module initialization user's motion state attribute, the motion state definition defines consistent with ciphering process;
B, user begin to begin in some way to move portable equipment simultaneously, control module with ciphering process in identical frequency coordination motion sensing module obtain the motion state information sequence of portable equipment;
After c, motion state sequence produce, call key production module it is generated key to be matched
Figure 509293DEST_PATH_IMAGE001
;
D, in key storage block, extract key and the deciphering treat decryption information; With its called after key P, compare with key to be matched then;
If the e comparative result equates, then adopt key P that information is adopted with the corresponding decipherment algorithm of ciphering process and decipher, otherwise, prompting user error information.
Wherein, the said prompting user error of step e information comprises that the prompting user records and input password again.
Encrypting and decrypting system and method based on spatial movement provided by the present invention have the following advantages:
1) input of key can be accomplished in the user position that only need move portable equipment; The encryption and decryption of completion information; And need not loaded down with trivial details keyboard operation; Particularly more effective for the small screen such as mobile portable equipment and the restricted equipment of interactive function, so have easy and simple to handle, advantage efficiently.
2) function of current portable equipment is not limited only to communication and calculates, and the shared proportion of its amusement function is increasing, and portable equipment more and more becomes converter tools, and this key typing of the present invention and verification method have strengthened the interest of portable equipment.
Description of drawings
Fig. 1 is the system configuration sketch map of the encrypting and decrypting system based on spatial movement of the present invention;
Fig. 2 carries out the encrypted process sketch map for utilizing system of the present invention;
Fig. 3 is the process sketch map that utilizes system of the present invention to decipher.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention system and method for the present invention is done further detailed explanation.
Fig. 1 is the system configuration sketch map of the encrypting and decrypting system based on spatial movement of the present invention, and this system mainly operates on the portable equipment.As shown in Figure 1, this system mainly comprises: motion sensing module 10, key production module 11, key authentication module 12, encrypting module 13, deciphering module 14, control module 15 and key storage block 16.Wherein:
Motion sensing module 10 is used to receive and handle the data that aspect sensor hardware such as gyroscope, acceleration transducer produce, and this module can adopt the hardware drive program of portable equipment or the correlation module of portable device system.
Key production module 11 is used to handle bearing data, bearing data is changed into vector representation, as user key.
Key authentication module 12 through the orientation change information of typing user portable equipment once more, adopts certain error tolerance method and the key that keeps before to compare, if be in the scope of acceptance then checking is passed through, the key before adopting is deciphered.
Encrypting module 13 and deciphering module 14 adopt DES, AES or other any symmetric-key systems to accomplish the actual encrypted decipher function to information.
Control module 15 is used for whole system is controlled, to call other different modules to the different intention of user.
Key storage block 16 is directed against the different different generation key of information stores of user with the ciphertext form.
Be the hardware components introduction of the encrypting and decrypting system based on spatial movement of the present invention as stated.Utilize this encrypting and decrypting system to generate key in the face of the present invention down and describe based on the method for the encrypting and decrypting of spatial movement.Said encrypting and decrypting based on spatial movement is two separate processes.
Fig. 2 carries out the encrypted process sketch map for utilizing system of the present invention; As shown in Figure 2, this process comprises the steps:
Step 21: state that from the user password typing begins, through control module 15 initialization users' motion state attribute.
The motion state of portable equipment is defined as the function of the vector that attribute constituted of one group of motion, can be expressed as formula 1.
Figure 2012101534613100002DEST_PATH_IMAGE001
... Formula 1;
Wherein: with X, Y, Z represent respectively the locus (being equivalent to spatial value) of moving also to can be the relative position with respect to initial condition; A is a vector acceleration, and X is arranged, Y, and the component of three directions of Z is formed, and v is a velocity vector, and X is also arranged, Y, the component of Z direction.
Step 22: the user begins to begin in some way to move portable equipment simultaneously, 15 motion state information of calling motion sensing module 10 acquisition portable equipments with certain frequency
Figure 2012101534613100002DEST_PATH_IMAGE002
of control module.
Here; Said step 22 lasts till till the certain hour; Each motion back inquiry produces the information of motion state, generates motion state sequence
Figure 2012101534613100002DEST_PATH_IMAGE003
at last.
Step 23: after motion sequence produces, utilize key production module 11 to adopt certain algorithm that this sequence is calculated the generation key sequence, can be expressed as formula 2.
Figure 2012101534613100002DEST_PATH_IMAGE004
... Formula 2;
Wherein: P is the key that is generated.
Step 24: key P is adopted private key encryption and deposits key storage block in the ciphertext form.
Step 25: adopt symmetric key algorithm such as DES etc. that information is encrypted.
In this example, be example with text T (with filename N sign).State that from the user ciphering process typing key begins, control module 15 initialization users' motion state attribute also can adopt a kind of simple form of formula 1 to carry out the definition of motion state, in this example shown in formula 3.
The user begins to begin in some way to move portable equipment simultaneously; Control module 15 starts with certain hour interval (like 50ms) calls the motion state information
Figure 798640DEST_PATH_IMAGE006
that motion sensing module 10 obtains portable equipments; Finish in several times (as 40 times) back; Obtain motion state sequence
Figure 2012101534613100002DEST_PATH_IMAGE005
; Call key production module 11 and generate key sequence; Adopt the simple form of formula 2 to calculate the generation key in the present embodiment, shown in formula 4.
This instance adopts privately owned key (as 123456) to adopt the des encryption algorithm will generate key P and encrypts and deposit text name N and ciphertext key in key storage block 16.Call encrypting module 13, use key P to adopt the DES algorithm that text T is encrypted and generate ciphertext
Figure 2012101534613100002DEST_PATH_IMAGE006
.
Figure 2012101534613100002DEST_PATH_IMAGE007
... Formula 3;
Wherein: X, Y, Z are respectively the displacement component with respect to last position, are X axle positive direction with the level north, and horizontal east is Y direction, and vertical direction is a Z axle positive direction.
Said formula 4 is following:
Figure 2012101534613100002DEST_PATH_IMAGE008
... Formula 4.
  
Fig. 3 is the process sketch map that utilizes system of the present invention to decipher; As shown in Figure 3, this decrypting process mainly comprises the steps:
Step 31: the user states that the password typing begins, control module 15 initialization users' motion state attribute, and the motion state definition is consistent with the ciphering process definition.
Step 32: the user begins to begin in some way to move portable equipment simultaneously, control module 15 with ciphering process in identical frequency coordination motion sensing module 10 obtain the motion state information sequence of portable equipments.
Step 33: after motion sequence produces, call key production module 11 and generate key to be matched
Figure 693259DEST_PATH_IMAGE001
;
Step 34: in key storage block, extract key and the deciphering of treating decryption information,, adopt formula 5 to compare with its called after key P.
... Formula 5;
Said formula 5 is with the judgement that returns success or fail of certain error tolerance.
Step 35: equal if formula 5 returns, then adopt key P that the information employing is deciphered with the corresponding decipherment algorithm in the ciphering process step 25, otherwise prompting user error information.
Here, state that from the user decrypting process typing key begins, control module 15 initialization users' motion state attribute adopts formula 3 to carry out the definition of motion state equally.The user begins to begin in some way to move portable equipment simultaneously; Control module 15 starts the motion state of calling motion sensing module 10 acquisition portable equipments with the time interval same with ciphering process (like 50ms); Finishing with the same number of times of ciphering process (as 40 times); Obtain the movable information sequence; Calling key production module 11 adopts formula 4 to generate key
Figure 558447DEST_PATH_IMAGE001
; In key storage block 16, search and use private key (as 123456) that original cipher key deciphering is obtained clear text key P through filename N, adopt 6 couples of P of simple form formula of formula 5 and
Figure 962884DEST_PATH_IMAGE001
to compare.Obtain expressly T if compare successfully then adopt key P and DES algorithm that ciphertext is deciphered, otherwise the prompting user records and inputs password again.
Figure 2012101534613100002DEST_PATH_IMAGE010
... Formula 6;
Wherein: K is constant (as getting 100);
Figure 391088DEST_PATH_IMAGE013
is the function about sequence vector P, and it defines shown in formula 7:
Figure 258720DEST_PATH_IMAGE011
... Formula 7;
Wherein:
Figure 2012101534613100002DEST_PATH_IMAGE012
; ;
Figure 2012101534613100002DEST_PATH_IMAGE014
all belongs to the motion state information
Figure 2012101534613100002DEST_PATH_IMAGE015
of portable equipment, and unit is centimetre.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.

Claims (8)

1. the encrypting and decrypting system based on spatial movement is characterized in that, this system mainly comprises motion sensing module, key production module, key authentication module, encrypting module, deciphering module, control module and key storage block; Wherein:
The motion sensing module is used for the bearing data that recipient's level sensor hardware produces;
Key production module is used to handle said bearing data, this bearing data is changed into vector representation, as user key;
Encrypting module adopts DES, AES or other any symmetric-key systems to accomplish the ciphering process to above-mentioned information;
Deciphering module adopts DES, AES or other any symmetric-key systems to accomplish said enciphered message is deciphered;
Control module is used for said system is controlled, to call other different modules to the different intention of user; And,
Key storage block is directed against the different different generation key of information stores of user with the ciphertext form.
2. the encrypting and decrypting system based on spatial movement according to claim 1; It is characterized in that; This system further comprises the key authentication module, through the orientation change information of typing user portable equipment once more, adopts certain error tolerance to be provided with the key that keeps before and compares; If be in the tolerance interval then checking is passed through, and the key before adopting is deciphered.
3. the encrypting and decrypting system based on spatial movement according to claim 1 is characterized in that, said motion sensing module can utilize the hardware drive program of portable equipment or the correlation module of portable device system.
4. the encrypting and decrypting system based on spatial movement according to claim 1 is characterized in that said aspect sensor comprises gyroscope, acceleration transducer.
5. the encryption method based on spatial movement is characterized in that, this method comprises:
A, state that from the user password typing begins, through control module initialization user's motion state attribute;
B, user begin to begin in some way to move portable equipment simultaneously, and control module is then called the motion state information that the motion sensing module obtains portable equipment with certain frequency;
C, after motion sequence produces, utilize key production module to adopt certain algorithm that the motion state sequence that generates is calculated the generation key sequence;
D, said key is adopted private key encryption and deposits key storage block in the ciphertext form;
E, employing symmetric key algorithm such as DES etc. encrypt information.
6. the encryption method based on spatial movement according to claim 5; It is characterized in that; The said control module of step B is called the motion state information that the motion sensing module obtains portable equipment with certain frequency; Be specially: move till the said portable equipment certain time, each motion back inquiry produces the information of motion state, generates the motion state sequence.
7. the decryption method based on spatial movement is characterized in that, this method comprises:
A, state that from the user password typing begins, utilize control module initialization user's motion state attribute, the motion state definition defines consistent with ciphering process;
B, user begin to begin in some way to move portable equipment simultaneously, control module with ciphering process in identical frequency coordination motion sensing module obtain the motion state information sequence of portable equipment;
After c, motion state sequence produce, call key production module it is generated key to be matched
Figure 2012101534613100001DEST_PATH_IMAGE001
;
D, in key storage block, extract key and the deciphering treat decryption information; With its called after key P, compare with key to be matched
Figure 407637DEST_PATH_IMAGE001
then;
If the e comparative result equates, then adopt key P that information is adopted with the corresponding decipherment algorithm of ciphering process and decipher, otherwise, prompting user error information.
8. the decryption method based on spatial movement according to claim 7 is characterized in that, the said prompting user error of step e information comprises that the prompting user records and input password again.
CN2012101534613A 2012-05-17 2012-05-17 Encryption/decryption system and method based on space motion Pending CN102724034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101534613A CN102724034A (en) 2012-05-17 2012-05-17 Encryption/decryption system and method based on space motion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101534613A CN102724034A (en) 2012-05-17 2012-05-17 Encryption/decryption system and method based on space motion

Publications (1)

Publication Number Publication Date
CN102724034A true CN102724034A (en) 2012-10-10

Family

ID=46949706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101534613A Pending CN102724034A (en) 2012-05-17 2012-05-17 Encryption/decryption system and method based on space motion

Country Status (1)

Country Link
CN (1) CN102724034A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051460A (en) * 2013-01-29 2013-04-17 赵忠华 Dynamic token system based on inertial technology and encryption method thereof
CN103324891A (en) * 2013-05-10 2013-09-25 四川省林业调查规划院 Stand growth and yield model dynamic management method based on encryption technique
CN103986572A (en) * 2014-04-15 2014-08-13 苏州太游信息科技有限公司 Cipher system and one-time random cipher generation method and application based on space variation thereof
CN105357011A (en) * 2015-10-22 2016-02-24 上海斐讯数据通信技术有限公司 Encryption and decryption methods and systems, and terminal
CN106210240A (en) * 2016-07-28 2016-12-07 武汉斗鱼网络科技有限公司 A kind of encryption and decryption method and system based on intelligent terminal's gyroscope
CN106789950A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN107040371A (en) * 2015-12-15 2017-08-11 罗伯特·博世有限公司 The method for producing secret value sequence in a device according to the physical characteristic of transmission channel
CN108737988A (en) * 2017-04-18 2018-11-02 通用汽车环球科技运作有限责任公司 The system and method for carrying out out-of-band communication on vehicle using mechanical oscillation
WO2021218088A1 (en) * 2020-04-30 2021-11-04 平安科技(深圳)有限公司 Communication data processing method and apparatus, and computer system and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051460B (en) * 2013-01-29 2015-08-19 赵忠华 Based on dynamic token system and the encryption method thereof of inertial technology
CN103051460A (en) * 2013-01-29 2013-04-17 赵忠华 Dynamic token system based on inertial technology and encryption method thereof
CN103324891A (en) * 2013-05-10 2013-09-25 四川省林业调查规划院 Stand growth and yield model dynamic management method based on encryption technique
CN103986572A (en) * 2014-04-15 2014-08-13 苏州太游信息科技有限公司 Cipher system and one-time random cipher generation method and application based on space variation thereof
CN105357011A (en) * 2015-10-22 2016-02-24 上海斐讯数据通信技术有限公司 Encryption and decryption methods and systems, and terminal
CN107040371A (en) * 2015-12-15 2017-08-11 罗伯特·博世有限公司 The method for producing secret value sequence in a device according to the physical characteristic of transmission channel
CN107040371B (en) * 2015-12-15 2021-07-06 罗伯特·博世有限公司 Method for generating a sequence of secret values in a device based on physical characteristics of a transmission channel
CN106210240B (en) * 2016-07-28 2019-04-23 武汉斗鱼网络科技有限公司 A kind of encryption and decryption method and system based on intelligent terminal gyroscope
CN106210240A (en) * 2016-07-28 2016-12-07 武汉斗鱼网络科技有限公司 A kind of encryption and decryption method and system based on intelligent terminal's gyroscope
CN106789950A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Information protecting method, device and terminal
CN106789950B (en) * 2016-11-30 2020-04-10 Oppo广东移动通信有限公司 Information protection method, device and terminal
CN108737988A (en) * 2017-04-18 2018-11-02 通用汽车环球科技运作有限责任公司 The system and method for carrying out out-of-band communication on vehicle using mechanical oscillation
CN108737988B (en) * 2017-04-18 2021-03-23 通用汽车环球科技运作有限责任公司 System and method for out-of-band communication on a vehicle using mechanical vibrations
WO2021218088A1 (en) * 2020-04-30 2021-11-04 平安科技(深圳)有限公司 Communication data processing method and apparatus, and computer system and storage medium

Similar Documents

Publication Publication Date Title
CN102724034A (en) Encryption/decryption system and method based on space motion
US10476674B2 (en) Systems and methods to secure searchable data having personally identifiable information
CN107145791B (en) K-means clustering method and system with privacy protection function
CN114756886B (en) Method and device for inquiring hiding trace
US20210224421A1 (en) Systems and methods to secure personally identifiable information
CN102170357B (en) Combined secret key dynamic security management system
Wei et al. An intelligent terminal based privacy-preserving multi-modal implicit authentication protocol for internet of connected vehicles
EP3304258B1 (en) Authenticating stylus device
CN108491184B (en) Entropy source acquisition method of random number generator, computer equipment and storage medium
US10693641B2 (en) Secure container based protection of password accessible master encryption keys
WO2014083335A4 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
CN102017676B (en) System and method for electronic data security
CN107038383A (en) A kind of method and apparatus of data processing
CN102880836A (en) Security device
CN107453880B (en) Cloud data secure storage method and system
CN102156843B (en) Data encryption method and system as well as data decryption method
CN101789862A (en) Encryption and decryption device and method based on gravity acceleration
CN103186744B (en) Terminal encipher-decipher method and terminal
CN105825142A (en) Method and device for encrypting and decrypting documents in mobile terminal
CN104954362B (en) The encryption and decryption approaches and its device of sequence number
CN102647277B (en) Password protection method based on position information
CN106951865B (en) Privacy protection biological identification method based on Hamming distance
CN104683358A (en) Anti-repudiation dynamic password generating method and dynamic password verification system
CN104683355A (en) Anti-repudiation dynamic password generating method and dynamic password verification system
CN112865958A (en) Privacy protection system and method for searching target through Internet of things camera

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20121010