CN102724034A - Encryption/decryption system and method based on space motion - Google Patents
Encryption/decryption system and method based on space motion Download PDFInfo
- Publication number
- CN102724034A CN102724034A CN2012101534613A CN201210153461A CN102724034A CN 102724034 A CN102724034 A CN 102724034A CN 2012101534613 A CN2012101534613 A CN 2012101534613A CN 201210153461 A CN201210153461 A CN 201210153461A CN 102724034 A CN102724034 A CN 102724034A
- Authority
- CN
- China
- Prior art keywords
- key
- module
- information
- user
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an encryption/decryption system and method based on space motion. The encryption/decryption system mainly comprises a motion sensing module, a private key generation module, an encryption module, a decryption module, a control module and a private key storage module, wherein the motion sensing module is used for receiving direction data generated by a direction sensor hardware; the private key generation module is used for processing the direction data and converting the direction data into a vector which is used as a user private key; the encryption module and the decryption module are used for completing the encryption and decryption process of the information by adopting the data encryption standard (DES), AES (Advanced Encryption Standard) and other optional symmetrical private key systems; the control module is used for controlling the system and calling other modules for intentions of different users; and the private key storage module is used for storing different generated private keys according to the information of different users in a ciphertext form. By utilizing the system and the method, the quick private key generation and encryption/decryption technology is provided by utilizing the motion sensing capability of portable equipment, such as a gyroscope and an acceleration transducer, and a user can finish the encryption/decryption operations on the information by utilizing the private keys.
Description
Technical field
The invention belongs to information security field; Be specifically related to a kind of portable equipment that has gyroscope and acceleration transducer; Movement properties through the detecting portable equipment produces key, and adopts symmetric encipherment algorithm to use this key to encrypt, and then writes down the mode of this equipment moving; Carry out the checking of key according to the attribute similarity of twice motion, and information is deciphered.
Background technology
The quantity of holding that moves portable equipment is increasing year by year, and so far, global mobile subscriber surpasses 5,000,000,000.This rapid growth phenomenon has reflected that along with epoch and development of technology human demand to mobility and convenient computing equipment sharply rises.
In this simultaneously, along with the intellectuality of moving portable equipment and the enhancing of computing capability, the safety problem of mobile device is also more and more outstanding, and encrypting and decrypting method is the core of security fields, and the mode of on PC, importing key through the user realizes the generation of key.But on mobile device, because the restriction of mobile terminal screen size and interaction capabilities, make the user in the key input process, have inconvenient operation, problem such as loaded down with trivial details, particularly the user that inputs to for some long keys brings very big puzzlement.
Summary of the invention
In view of this; Main purpose of the present invention is to provide a kind of encrypting and decrypting system and method based on spatial movement; Through utilizing the motion perception of portable equipments such as gyroscope and acceleration transducer etc.; Key generation efficiently and encryption and decryption technique are provided, and the user can utilize this technology to accomplish the encryption and decryption to information.When the user need import key, movement locus that defines when setting key by the user and speed moved portable equipment, can accomplish the typing of key.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of encrypting and decrypting system based on spatial movement, this system mainly comprises motion sensing module, key production module, key authentication module, encrypting module, deciphering module, control module and key storage block; Wherein:
The motion sensing module is used for the bearing data that recipient's level sensor hardware produces;
Key production module is used to handle said bearing data, this bearing data is changed into vector representation, as user key;
Encrypting module adopts DES, AES or other any symmetric-key systems to accomplish the ciphering process to above-mentioned information;
Deciphering module adopts DES, AES or other any symmetric-key systems to accomplish said enciphered message is deciphered;
Control module is used for said system is controlled, to call other different modules to the different intention of user; And,
Key storage block is directed against the different different generation key of information stores of user with the ciphertext form.
Wherein, This system further comprises the key authentication module, through the orientation change information of typing user portable equipment once more, adopts certain error tolerance to be provided with the key that keeps before and compares; If be in the tolerance interval then checking is passed through, and the key before adopting is deciphered.
Said motion sensing module can utilize the hardware drive program of portable equipment or the correlation module of portable device system.
Said aspect sensor comprises gyroscope, acceleration transducer.
A kind of encryption method based on spatial movement, this method comprises:
A, state that from the user password typing begins, through control module initialization user's motion state attribute;
B, user begin to begin in some way to move portable equipment simultaneously, and control module is then called the motion state information that the motion sensing module obtains portable equipment with certain frequency;
C, after motion sequence produces, utilize key production module to adopt certain algorithm that the motion state sequence that generates is calculated the generation key sequence;
D, said key is adopted private key encryption and deposits key storage block in the ciphertext form;
E, employing symmetric key algorithm such as DES etc. encrypt information.
Wherein, The said control module of step B is called the motion state information that the motion sensing module obtains portable equipment with certain frequency; Be specially: move till the said portable equipment certain time, each motion back inquiry produces the information of motion state, generates the motion state sequence.
A kind of decryption method based on spatial movement, this method comprises:
A, state that from the user password typing begins, utilize control module initialization user's motion state attribute, the motion state definition defines consistent with ciphering process;
B, user begin to begin in some way to move portable equipment simultaneously, control module with ciphering process in identical frequency coordination motion sensing module obtain the motion state information sequence of portable equipment;
After c, motion state sequence produce, call key production module it is generated key to be matched
;
D, in key storage block, extract key and the deciphering treat decryption information; With its called after key P, compare with key to be matched
then;
If the e comparative result equates, then adopt key P that information is adopted with the corresponding decipherment algorithm of ciphering process and decipher, otherwise, prompting user error information.
Wherein, the said prompting user error of step e information comprises that the prompting user records and input password again.
Encrypting and decrypting system and method based on spatial movement provided by the present invention have the following advantages:
1) input of key can be accomplished in the user position that only need move portable equipment; The encryption and decryption of completion information; And need not loaded down with trivial details keyboard operation; Particularly more effective for the small screen such as mobile portable equipment and the restricted equipment of interactive function, so have easy and simple to handle, advantage efficiently.
2) function of current portable equipment is not limited only to communication and calculates, and the shared proportion of its amusement function is increasing, and portable equipment more and more becomes converter tools, and this key typing of the present invention and verification method have strengthened the interest of portable equipment.
Description of drawings
Fig. 1 is the system configuration sketch map of the encrypting and decrypting system based on spatial movement of the present invention;
Fig. 2 carries out the encrypted process sketch map for utilizing system of the present invention;
Fig. 3 is the process sketch map that utilizes system of the present invention to decipher.
Embodiment
Below in conjunction with accompanying drawing and embodiments of the invention system and method for the present invention is done further detailed explanation.
Fig. 1 is the system configuration sketch map of the encrypting and decrypting system based on spatial movement of the present invention, and this system mainly operates on the portable equipment.As shown in Figure 1, this system mainly comprises: motion sensing module 10, key production module 11, key authentication module 12, encrypting module 13, deciphering module 14, control module 15 and key storage block 16.Wherein:
Key production module 11 is used to handle bearing data, bearing data is changed into vector representation, as user key.
Key authentication module 12 through the orientation change information of typing user portable equipment once more, adopts certain error tolerance method and the key that keeps before to compare, if be in the scope of acceptance then checking is passed through, the key before adopting is deciphered.
Control module 15 is used for whole system is controlled, to call other different modules to the different intention of user.
Key storage block 16 is directed against the different different generation key of information stores of user with the ciphertext form.
Be the hardware components introduction of the encrypting and decrypting system based on spatial movement of the present invention as stated.Utilize this encrypting and decrypting system to generate key in the face of the present invention down and describe based on the method for the encrypting and decrypting of spatial movement.Said encrypting and decrypting based on spatial movement is two separate processes.
Fig. 2 carries out the encrypted process sketch map for utilizing system of the present invention; As shown in Figure 2, this process comprises the steps:
Step 21: state that from the user password typing begins, through control module 15 initialization users' motion state attribute.
The motion state of portable equipment is defined as the function of the vector that attribute constituted of one group of motion, can be expressed as formula 1.
Wherein: with X, Y, Z represent respectively the locus (being equivalent to spatial value) of moving also to can be the relative position with respect to initial condition; A is a vector acceleration, and X is arranged, Y, and the component of three directions of Z is formed, and v is a velocity vector, and X is also arranged, Y, the component of Z direction.
Step 22: the user begins to begin in some way to move portable equipment simultaneously, 15 motion state information of calling motion sensing module 10 acquisition portable equipments with certain frequency
of control module.
Here; Said step 22 lasts till till the certain hour; Each motion back inquiry produces the information of motion state, generates motion state sequence
at last.
Step 23: after motion sequence produces, utilize key production module 11 to adopt certain algorithm that this sequence is calculated the generation key sequence, can be expressed as formula 2.
Wherein: P is the key that is generated.
Step 24: key P is adopted private key encryption and deposits key storage block in the ciphertext form.
Step 25: adopt symmetric key algorithm such as DES etc. that information is encrypted.
In this example, be example with text T (with filename N sign).State that from the user ciphering process typing key begins, control module 15 initialization users' motion state attribute also can adopt a kind of simple form of formula 1 to carry out the definition of motion state, in this example shown in formula 3.
The user begins to begin in some way to move portable equipment simultaneously; Control module 15 starts with certain hour interval (like 50ms) calls the motion state information
that motion sensing module 10 obtains portable equipments; Finish in several times (as 40 times) back; Obtain motion state sequence
; Call key production module 11 and generate key sequence; Adopt the simple form of formula 2 to calculate the generation key in the present embodiment, shown in formula 4.
This instance adopts privately owned key (as 123456) to adopt the des encryption algorithm will generate key P and encrypts and deposit text name N and ciphertext key in key storage block 16.Call encrypting module 13, use key P to adopt the DES algorithm that text T is encrypted and generate ciphertext
.
Wherein: X, Y, Z are respectively the displacement component with respect to last position, are X axle positive direction with the level north, and horizontal east is Y direction, and vertical direction is a Z axle positive direction.
Said formula 4 is following:
Fig. 3 is the process sketch map that utilizes system of the present invention to decipher; As shown in Figure 3, this decrypting process mainly comprises the steps:
Step 31: the user states that the password typing begins, control module 15 initialization users' motion state attribute, and the motion state definition is consistent with the ciphering process definition.
Step 32: the user begins to begin in some way to move portable equipment simultaneously, control module 15 with ciphering process in identical frequency coordination motion sensing module 10 obtain the motion state information sequence of portable equipments.
Step 33: after motion sequence produces, call key production module 11 and generate key to be matched
;
Step 34: in key storage block, extract key and the deciphering of treating decryption information,, adopt formula 5 to compare with its called after key P.
... Formula 5;
Said formula 5 is with the judgement that returns success or fail of certain error tolerance.
Step 35: equal if formula 5 returns, then adopt key P that the information employing is deciphered with the corresponding decipherment algorithm in the ciphering process step 25, otherwise prompting user error information.
Here, state that from the user decrypting process typing key begins, control module 15 initialization users' motion state attribute adopts formula 3 to carry out the definition of motion state equally.The user begins to begin in some way to move portable equipment simultaneously; Control module 15 starts the motion state of calling motion sensing module 10 acquisition portable equipments with the time interval same with ciphering process (like 50ms); Finishing with the same number of times of ciphering process (as 40 times); Obtain the movable information sequence; Calling key production module 11 adopts formula 4 to generate key
; In key storage block 16, search and use private key (as 123456) that original cipher key deciphering is obtained clear text key P through filename N, adopt 6 couples of P of simple form formula of formula 5 and
to compare.Obtain expressly T if compare successfully then adopt key P and DES algorithm that ciphertext
is deciphered, otherwise the prompting user records and inputs password again.
Wherein: K is constant (as getting 100);
is the function about sequence vector P, and it defines shown in formula 7:
Wherein:
;
;
all belongs to the motion state information
of portable equipment, and unit is centimetre.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.
Claims (8)
1. the encrypting and decrypting system based on spatial movement is characterized in that, this system mainly comprises motion sensing module, key production module, key authentication module, encrypting module, deciphering module, control module and key storage block; Wherein:
The motion sensing module is used for the bearing data that recipient's level sensor hardware produces;
Key production module is used to handle said bearing data, this bearing data is changed into vector representation, as user key;
Encrypting module adopts DES, AES or other any symmetric-key systems to accomplish the ciphering process to above-mentioned information;
Deciphering module adopts DES, AES or other any symmetric-key systems to accomplish said enciphered message is deciphered;
Control module is used for said system is controlled, to call other different modules to the different intention of user; And,
Key storage block is directed against the different different generation key of information stores of user with the ciphertext form.
2. the encrypting and decrypting system based on spatial movement according to claim 1; It is characterized in that; This system further comprises the key authentication module, through the orientation change information of typing user portable equipment once more, adopts certain error tolerance to be provided with the key that keeps before and compares; If be in the tolerance interval then checking is passed through, and the key before adopting is deciphered.
3. the encrypting and decrypting system based on spatial movement according to claim 1 is characterized in that, said motion sensing module can utilize the hardware drive program of portable equipment or the correlation module of portable device system.
4. the encrypting and decrypting system based on spatial movement according to claim 1 is characterized in that said aspect sensor comprises gyroscope, acceleration transducer.
5. the encryption method based on spatial movement is characterized in that, this method comprises:
A, state that from the user password typing begins, through control module initialization user's motion state attribute;
B, user begin to begin in some way to move portable equipment simultaneously, and control module is then called the motion state information that the motion sensing module obtains portable equipment with certain frequency;
C, after motion sequence produces, utilize key production module to adopt certain algorithm that the motion state sequence that generates is calculated the generation key sequence;
D, said key is adopted private key encryption and deposits key storage block in the ciphertext form;
E, employing symmetric key algorithm such as DES etc. encrypt information.
6. the encryption method based on spatial movement according to claim 5; It is characterized in that; The said control module of step B is called the motion state information that the motion sensing module obtains portable equipment with certain frequency; Be specially: move till the said portable equipment certain time, each motion back inquiry produces the information of motion state, generates the motion state sequence.
7. the decryption method based on spatial movement is characterized in that, this method comprises:
A, state that from the user password typing begins, utilize control module initialization user's motion state attribute, the motion state definition defines consistent with ciphering process;
B, user begin to begin in some way to move portable equipment simultaneously, control module with ciphering process in identical frequency coordination motion sensing module obtain the motion state information sequence of portable equipment;
After c, motion state sequence produce, call key production module it is generated key to be matched
;
D, in key storage block, extract key and the deciphering treat decryption information; With its called after key P, compare with key to be matched
then;
If the e comparative result equates, then adopt key P that information is adopted with the corresponding decipherment algorithm of ciphering process and decipher, otherwise, prompting user error information.
8. the decryption method based on spatial movement according to claim 7 is characterized in that, the said prompting user error of step e information comprises that the prompting user records and input password again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101534613A CN102724034A (en) | 2012-05-17 | 2012-05-17 | Encryption/decryption system and method based on space motion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101534613A CN102724034A (en) | 2012-05-17 | 2012-05-17 | Encryption/decryption system and method based on space motion |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102724034A true CN102724034A (en) | 2012-10-10 |
Family
ID=46949706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101534613A Pending CN102724034A (en) | 2012-05-17 | 2012-05-17 | Encryption/decryption system and method based on space motion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102724034A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051460A (en) * | 2013-01-29 | 2013-04-17 | 赵忠华 | Dynamic token system based on inertial technology and encryption method thereof |
CN103324891A (en) * | 2013-05-10 | 2013-09-25 | 四川省林业调查规划院 | Stand growth and yield model dynamic management method based on encryption technique |
CN103986572A (en) * | 2014-04-15 | 2014-08-13 | 苏州太游信息科技有限公司 | Cipher system and one-time random cipher generation method and application based on space variation thereof |
CN105357011A (en) * | 2015-10-22 | 2016-02-24 | 上海斐讯数据通信技术有限公司 | Encryption and decryption methods and systems, and terminal |
CN106210240A (en) * | 2016-07-28 | 2016-12-07 | 武汉斗鱼网络科技有限公司 | A kind of encryption and decryption method and system based on intelligent terminal's gyroscope |
CN106789950A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information protecting method, device and terminal |
CN107040371A (en) * | 2015-12-15 | 2017-08-11 | 罗伯特·博世有限公司 | The method for producing secret value sequence in a device according to the physical characteristic of transmission channel |
CN108737988A (en) * | 2017-04-18 | 2018-11-02 | 通用汽车环球科技运作有限责任公司 | The system and method for carrying out out-of-band communication on vehicle using mechanical oscillation |
WO2021218088A1 (en) * | 2020-04-30 | 2021-11-04 | 平安科技(深圳)有限公司 | Communication data processing method and apparatus, and computer system and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789862A (en) * | 2010-01-25 | 2010-07-28 | 中兴通讯股份有限公司 | Encryption and decryption device and method based on gravity acceleration |
-
2012
- 2012-05-17 CN CN2012101534613A patent/CN102724034A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789862A (en) * | 2010-01-25 | 2010-07-28 | 中兴通讯股份有限公司 | Encryption and decryption device and method based on gravity acceleration |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051460B (en) * | 2013-01-29 | 2015-08-19 | 赵忠华 | Based on dynamic token system and the encryption method thereof of inertial technology |
CN103051460A (en) * | 2013-01-29 | 2013-04-17 | 赵忠华 | Dynamic token system based on inertial technology and encryption method thereof |
CN103324891A (en) * | 2013-05-10 | 2013-09-25 | 四川省林业调查规划院 | Stand growth and yield model dynamic management method based on encryption technique |
CN103986572A (en) * | 2014-04-15 | 2014-08-13 | 苏州太游信息科技有限公司 | Cipher system and one-time random cipher generation method and application based on space variation thereof |
CN105357011A (en) * | 2015-10-22 | 2016-02-24 | 上海斐讯数据通信技术有限公司 | Encryption and decryption methods and systems, and terminal |
CN107040371A (en) * | 2015-12-15 | 2017-08-11 | 罗伯特·博世有限公司 | The method for producing secret value sequence in a device according to the physical characteristic of transmission channel |
CN107040371B (en) * | 2015-12-15 | 2021-07-06 | 罗伯特·博世有限公司 | Method for generating a sequence of secret values in a device based on physical characteristics of a transmission channel |
CN106210240B (en) * | 2016-07-28 | 2019-04-23 | 武汉斗鱼网络科技有限公司 | A kind of encryption and decryption method and system based on intelligent terminal gyroscope |
CN106210240A (en) * | 2016-07-28 | 2016-12-07 | 武汉斗鱼网络科技有限公司 | A kind of encryption and decryption method and system based on intelligent terminal's gyroscope |
CN106789950A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information protecting method, device and terminal |
CN106789950B (en) * | 2016-11-30 | 2020-04-10 | Oppo广东移动通信有限公司 | Information protection method, device and terminal |
CN108737988A (en) * | 2017-04-18 | 2018-11-02 | 通用汽车环球科技运作有限责任公司 | The system and method for carrying out out-of-band communication on vehicle using mechanical oscillation |
CN108737988B (en) * | 2017-04-18 | 2021-03-23 | 通用汽车环球科技运作有限责任公司 | System and method for out-of-band communication on a vehicle using mechanical vibrations |
WO2021218088A1 (en) * | 2020-04-30 | 2021-11-04 | 平安科技(深圳)有限公司 | Communication data processing method and apparatus, and computer system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102724034A (en) | Encryption/decryption system and method based on space motion | |
US10476674B2 (en) | Systems and methods to secure searchable data having personally identifiable information | |
CN107145791B (en) | K-means clustering method and system with privacy protection function | |
CN114756886B (en) | Method and device for inquiring hiding trace | |
US20210224421A1 (en) | Systems and methods to secure personally identifiable information | |
CN102170357B (en) | Combined secret key dynamic security management system | |
Wei et al. | An intelligent terminal based privacy-preserving multi-modal implicit authentication protocol for internet of connected vehicles | |
EP3304258B1 (en) | Authenticating stylus device | |
CN108491184B (en) | Entropy source acquisition method of random number generator, computer equipment and storage medium | |
US10693641B2 (en) | Secure container based protection of password accessible master encryption keys | |
WO2014083335A4 (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
CN102017676B (en) | System and method for electronic data security | |
CN107038383A (en) | A kind of method and apparatus of data processing | |
CN102880836A (en) | Security device | |
CN107453880B (en) | Cloud data secure storage method and system | |
CN102156843B (en) | Data encryption method and system as well as data decryption method | |
CN101789862A (en) | Encryption and decryption device and method based on gravity acceleration | |
CN103186744B (en) | Terminal encipher-decipher method and terminal | |
CN105825142A (en) | Method and device for encrypting and decrypting documents in mobile terminal | |
CN104954362B (en) | The encryption and decryption approaches and its device of sequence number | |
CN102647277B (en) | Password protection method based on position information | |
CN106951865B (en) | Privacy protection biological identification method based on Hamming distance | |
CN104683358A (en) | Anti-repudiation dynamic password generating method and dynamic password verification system | |
CN104683355A (en) | Anti-repudiation dynamic password generating method and dynamic password verification system | |
CN112865958A (en) | Privacy protection system and method for searching target through Internet of things camera |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20121010 |