CN103186744B - Terminal encipher-decipher method and terminal - Google Patents

Terminal encipher-decipher method and terminal Download PDF

Info

Publication number
CN103186744B
CN103186744B CN201110449922.7A CN201110449922A CN103186744B CN 103186744 B CN103186744 B CN 103186744B CN 201110449922 A CN201110449922 A CN 201110449922A CN 103186744 B CN103186744 B CN 103186744B
Authority
CN
China
Prior art keywords
terminal
deciphering
encryption
module
trace information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110449922.7A
Other languages
Chinese (zh)
Other versions
CN103186744A (en
Inventor
杨鹏辉
蒋国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201110449922.7A priority Critical patent/CN103186744B/en
Publication of CN103186744A publication Critical patent/CN103186744A/en
Application granted granted Critical
Publication of CN103186744B publication Critical patent/CN103186744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a kind of terminal encipher-decipher method, for thering is the terminal of displacement induction installation, comprising: step 102, utilize displacement induction installation to obtain first motion track of terminal in space, to generate encryption trace information; Step 104, utilizes and encrypts trace information, application module or file encryption that needs are encrypted; Step 106, utilizes displacement induction installation to obtain second motion track of terminal in space, to generate deciphering trace information; Step 108, compares deciphering trace information with encrypting trace information, if coupling, application modules or file decryption. Correspondingly, the invention allows for a kind of terminal. By technical scheme of the present invention, can set key according to user's hobby, and encryption function is more hidden, protection information can not be revealed effectively.

Description

Terminal encipher-decipher method and terminal
Technical field
The present invention relates to encryption technology, in particular to a kind of terminal encipher-decipher method and eventually a kind ofEnd.
Background technology
In correlation technique, the terminal encryption technology of employing comprises following several: the first, is used wordSymbol encryption method, when a certain function (as start, address list, note etc.) needs in encrypted stateWhile deciphering, the prompting interface that please input password will be ejected, keyboard input character can only be received closeCode; The second, pattern solves, and encrypts as the pattern that Android carries, and screen has fixed position nIndividual, several points are wherein linked to be to certain shape as key; The third, utilize on PC existingFace, encrypting fingerprint technology be encrypted. But for above-mentioned several cipher modes, still have oneA little defects, whether as pointed out very significantly a certain function to encrypt, meanwhile, password is generallyNumeral or other character, easily forget, and also easily cracks by continuous trial.
Therefore, need a kind of new terminal encryption and decryption technology, can enter key according to user's hobbyRow is set, and encryption function is more hidden, and protection information can not be revealed effectively.
Summary of the invention
The present invention, just based on the problems referred to above, has proposed a kind of new terminal encryption and decryption technology, Ke YigenHobby according to user is set key, and encryption function is more hidden, protection information effectivelyCan not reveal.
In view of this, the present invention proposes a kind of terminal encipher-decipher method, for thering is displacement induction dressThe terminal of putting, comprising: step 102, and utilize described displacement induction installation to obtain described terminal in spaceThe first motion track, to generate encryption trace information; Step 104, utilizes described encryption track letterBreath, application module or file encryption that needs are encrypted; Step 106, utilizes described displacement induction dressPut and obtain second motion track of described terminal in space, to generate deciphering trace information; Step108, described deciphering trace information and described encryption trace information are compared, if coupling is rightDescribed application module or file decryption. In this technical scheme, terminal is moved in space,And by recording motion track, thereby can using this track as encrypt time use key, thisMode simple possible, and owing to noting be used in input or the demonstration of carrying out key on terminal interface, increaseConfidentiality, be also convenient to pretend, such as do not show any prompting on screen, or demonstrateThe input frame of a password, but reality is used track to be decrypted, thus increase security. ThisOutward, track when encryption and decryption allows certain error range, as long as error is no more than this scope,Can think order coupling.
In technique scheme, preferably, described encryption trace information comprises described the first moving railThe coordinate data of mark; And described deciphering trace information comprises the number of coordinates of described the second motion trackAccording to. In this technical scheme, when terminal is moved in space, terminal position the most at the beginning can be doneFor initial point, after moving in virtual coordinate system out in space, generate by a series of number of coordinatesAccording to the track forming.
In technique scheme, preferably, described step 108 specifically comprises: move described secondThe moving coordinate data of track and the coordinate data of described the first motion track compare, if coupling,To described application module or file decryption. In this technical scheme, if track matches, form railThe coordinate data of mark must match, and by the coordinate data in concrete relatively track, also can increaseAdd the accuracy of comparison.
In technique scheme, preferably, in described step 104, also comprise: described in inciting somebody to action, addClose trace information is generated as encryption trace graphics; In described step 106, also comprise: by described solutionClose trace information is generated as deciphering trace graphics; Described step 108 is specially: by described deciphering trackFigure and described encryption trace graphics compare, if coupling, to described application module or file solutionClose. In this technical scheme, also can generate track coordinate data and compare coordinate data, andThat the figure key of storage and the trace graphics of implementing to generate are carried out to the comparison of the aspects such as shape, ifJoin, be decrypted, this has reduced the pressure of terminal in data volume on the one hand, reduces on the other handThe required operation strength of comparison procedure.
In technique scheme, preferably, described encryption trace graphics is plane or solid figure;Described deciphering trace graphics is plane or solid figure; By described encryption trace graphics and/or deciphering railMark figure shows in described terminal. In this technical scheme, the rail that respective user generates in spaceMark figure, after can showing in terminal, is determined to enable or re-start by user and obtains.Here can be planar obit simulation figure, can be also three-dimensional trace graphics. If plane, is convenient to useThe memory at family and use, and if three-dimensional, owing to there being the deviation such as angle, visual angle. Therefore, such asBeing in space, to mark a circle equally, if from front, is a circle, if from the side,Being a line segment, if from other angles, is an ellipse, and user can be right in terminal soThe visual angle of the three-dimensional trace graphics showing etc. regulates, thereby can improve security.
In technique scheme, preferably, in described step 108, also comprise: if described in addClose trace information does not mate with described deciphering trace information, on the screen of described terminal, does not showChange, or enter default camouflage interface. In this technical scheme, at track after it fails to match, orWhen the frequency of failure has exceeded default frequency threshold value, can not be decrypted, or default by enteringCamouflage interface in, thereby improve secret ability.
According to another aspect of the invention, also propose a kind of terminal, there is displacement induction installation, bagDraw together: encrypt track generation module, utilize described displacement induction installation to obtain described terminal in the of spaceOne motion track, to generate encryption trace information; Encrypting module, utilizes described encryption track to generate mouldThe described encryption trace information that piece generates, application module or file encryption that needs are encrypted; Deciphering railMark generation module, utilizes described displacement induction installation to obtain second moving rail of described terminal in spaceMark, to generate deciphering trace information; Comparison module, the institute that described deciphering track generation module is generatedStating deciphering trace information and described encryption trace information compares; Deciphering module, at described relatively mouldThe comparative result of piece is in situation about matching, to described application module or file decryption. In this technologyIn scheme, terminal is moved in space, and by recording motion track, thus can be byThe key that this track uses when encrypting, this mode simple possible, and owing to noting be used in terminalOn interface, carry out input or the demonstration of key, increased confidentiality, be also convenient to pretend, such asOn screen, do not show any prompting, or demonstrate the input frame of a password, but the actual track that usesBe decrypted, thereby increased security. In addition, track when encryption and decryption allows certain mistakePoor scope, as long as error is no more than this scope, can think to match.
In technique scheme, preferably, described encryption track generation module also comprises: encrypt and sitMark record sub module, in the time generating described encryption trace information, records the seat of described the first motion trackMark data; And described deciphering track generation module also comprises: deciphering coordinate record submodule, giving birth toWhile becoming described deciphering trace information, record the coordinate data of described the second motion track. This technical sideIn case, in the time that terminal is moved in space, can be using terminal position the most at the beginning as initial point, at skyBetween in move in virtual coordinate system out after, generate the rail being formed by a series of coordinate datasMark.
In technique scheme, preferably, described comparison module also comprises: coordinate is submodule relativelyPiece, by the coordinate data of described the second motion track from described deciphering coordinate record submodule, withCoordinate data from described first motion track of described encryption coordinate record submodule compares;And described deciphering module also for: be what match at the comparative result of described coordinate comparison sub-moduleIn situation, to described application module or file decryption. In this technical scheme, if track matches,The coordinate data that forms track must match, and by the coordinate data in concrete relatively track,Also can increase the accuracy of comparison.
In technique scheme, preferably, also comprise: figure generation module, by described encryption railMark Information generation is encryption trace graphics, and described deciphering trace information is generated as to deciphering trajectory diagramShape; Described comparison module also comprises: figure comparison sub-module, by described deciphering trace graphics with described inEncryption trace graphics compares; And described deciphering module also for: in relatively submodule of described figureThe comparative result of piece is in situation about matching, to described application module or file decryption. In this technologyIn scheme, also can generate track coordinate data and compare coordinate data, but by the figure of storageShape key carries out the comparison of the aspects such as shape with the trace graphics of implementing to generate, if coupling is separatedClose, this has reduced the pressure of terminal in data volume on the one hand, has reduced on the other hand comparison procedure instituteThe operation strength needing.
In technique scheme, preferably, comprising: described figure generation module is by described encryption railMark figure is generated as plane or solid figure; Described figure generation module is raw by described deciphering trace graphicsBecome plane or solid figure; Display module, the planar graph that described figure generation module is generated orSolid figure shows in described terminal. In this technical scheme, respective user generates in spaceTrace graphics, after can showing in terminal, is determined to enable or re-start by user and obtainsGet. Here can be planar obit simulation figure, can be also three-dimensional trace graphics, if plane, justIn user's memory and use, and if three-dimensional, owing to there being the deviation such as angle, visual angle. Therefore,Such as be equally marks a circle in space, if from front, be a circle, if from the sideSeeing, is a line segment, if from other angles, is an ellipse, and user can be in terminal soThe upper visual angle to the three-dimensional trace graphics showing etc. regulates, thereby can improve security.
In technique scheme, preferably, also comprise: if described encryption trace information and described solutionClose trace information does not mate, and does not show variation, or enter default on the screen of described terminalCamouflage interface. In this technical scheme, at track after it fails to match, or the frequency of failure has exceeded defaultFrequency threshold value time, can not be decrypted, or by entering in default camouflage interface, therebyImprove secret ability.
By above technical scheme, can set key according to user's hobby, and encryptFunction is more hidden, and protection information can not be revealed effectively.
Brief description of the drawings
Fig. 1 shows the flow chart of terminal encipher-decipher method according to an embodiment of the invention;
Fig. 2 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 3 shows terminal according to an embodiment of the invention carries out the schematic diagram of encryption and decryption;
Fig. 4 A shows the flow chart that terminal is encrypted according to an embodiment of the invention;
Fig. 4 B shows the flow chart that terminal is decrypted according to an embodiment of the invention;
Fig. 5 A shows the floor map of trace graphics according to an embodiment of the invention;
Fig. 5 B to 5C shows the schematic perspective view of trace graphics according to an embodiment of the invention.
Detailed description of the invention
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with attachedFigure and detailed description of the invention are further described in detail the present invention.
Set forth in the following description a lot of details so that fully understand the present invention, still,The present invention can also adopt other to be different from other modes described here and implement, therefore, and the present inventionBe not limited to the restriction of following public specific embodiment.
Fig. 1 shows the flow chart of terminal encryption method according to an embodiment of the invention.
As shown in Figure 1, terminal encipher-decipher method according to an embodiment of the invention, for having displacementThe terminal of induction installation, comprising: step 102, and utilize displacement induction installation to obtain terminal in spaceThe first motion track, to generate encryption trace information; Step 104, utilizes and encrypts trace information, rightNeed application module or the file encryption encrypted; Step 106, utilizes displacement induction installation to obtain terminalAt second motion track in space, to generate deciphering trace information; Step 108, will decipher track letterBreath compares with encrypting trace information, if coupling, application modules or file decryption. In this skillIn art scheme, terminal is moved in space, and by recording motion track, thereby canThe key using during using this track as encryption, this mode simple possible, and owing to noting be used in endOn end interface, carry out input or the demonstration of key, increased confidentiality, be also convenient to pretend, such asOn screen, do not show any prompting, or demonstrate the input frame of a password, but the actual rail that usesMark is decrypted, thereby has increased security. In addition, track when encryption and decryption allows certainError range, as long as error is no more than this scope, can think to match.
In technique scheme, encrypt the coordinate data that trace information comprises the first motion track; WithAnd deciphering trace information comprises the coordinate data of the second motion track. In this technical scheme, in terminalWhile moving in space, can be using terminal position the most at the beginning as initial point, out virtual in spaceCoordinate system in move after, generate the track that formed by a series of coordinate datas.
In technique scheme, step 108 specifically comprises: by the coordinate data of the second motion trackCompare with the coordinate data of the first motion track, if coupling, application modules or file solutionClose. In this technical scheme, if track matches, form the inevitable phase of coordinate data of trackJoin, and by the coordinate data in concrete relatively track, also can increase the accuracy of comparison.
In technique scheme, in step 104, also comprise: encryption trace information is generated asEncrypt trace graphics; In step 106, also comprise: deciphering trace information is generated as to deciphering trackFigure; Step 108 is specially: deciphering trace graphics compared with encrypting trace graphics, ifJoin, application modules or file decryption. In this technical scheme, also can generate track and sitMark data and relatively coordinate data, but the figure key of storage and the trace graphics of implementing to generate are enteredThe comparison of the aspects such as row shape, if coupling is decrypted, this has reduced terminal on the one hand in dataPressure in amount, has reduced the required operation strength of comparison procedure on the other hand.
In technique scheme, encrypting trace graphics is plane or solid figure; Deciphering trace graphicsFor plane or solid figure; To encrypt trace graphics and/or decipher trace graphics and show in terminal.In this technical scheme, the trace graphics that respective user generates in space can carry out in terminalAfter demonstration, determined to enable or re-start by user and obtain. Here can be planar obit simulation figure,Also can be three-dimensional trace graphics, if plane is convenient to user's memory and use, and if verticalBody, owing to there is the deviation such as angle, visual angle, therefore, such as be equally marks a circle in spaceShape, if from front, is a circle, if from the side, is a line segment, if from other anglesSeeing, is an ellipse, so user can be in terminal to the three-dimensional trace graphics showingVisual angles etc. regulate, thereby can improve security.
In technique scheme, in step 108, also comprise: if encrypt trace information and decipheringTrace information does not mate, and does not show variation, or enter default camouflage circle on the screen of terminalFace. In this technical scheme, at track after it fails to match, or the frequency of failure has exceeded default number of timesWhen threshold value, can not be decrypted, or by entering in default camouflage interface, protect thereby improveClose ability.
Fig. 2 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 2, terminal 200 according to an embodiment of the invention, has displacement induction installation,Comprise: encrypt track generation module 202, utilize displacement induction installation to obtain terminal 200 in spaceThe first mobile encrypted track, to generate encryption trace information; Encrypting module 204, utilizes and encrypts trackThe encryption trace information that generation module 202 generates, application module or file encryption that needs are encrypted;Deciphering track generation module 206, utilizes displacement induction installation to obtain terminal 200 and moves in second of spaceMoving track, to generate deciphering trace information; Comparison module 208, will decipher track generation module 206The deciphering trace information generating compares with encryption trace information; Deciphering module 210, is comparing mouldThe comparative result of piece 208 is in situation about matching, application modules or file decryption. In this technologyIn scheme, terminal 200 is moved in space, and by recording motion track, thereby canUsing the key that this track is used when encrypting, this mode simple possible, and owing to noting be used inOn the interface of terminal 200, carry out input or the demonstration of key, increased confidentiality, be also convenient to carry out puppetDress, such as do not show any prompting on screen, or demonstrates the input frame of a password, but realBorder is used track to be decrypted, thereby has increased security. In addition, track when encryption and decryption is permittedPermitted certain error range, as long as error is no more than this scope, can think to match.
In technique scheme, encrypt track generation module 202 and also comprise: encrypt coordinate recordModule 2020, in the time generating encryption trace information, the coordinate data of record the first motion track; WithAnd deciphering track generation module 206 also comprises: deciphering coordinate record submodule 2060, and at generating solutionWhen close trace information, the coordinate data of record the second motion track. In this technical scheme, in terminal200 when move in space, can be using terminal 200 position the most at the beginning as initial point, in spaceAfter moving in virtual coordinate system out, generate the track being formed by a series of coordinate datas.
In technique scheme, comparison module 208 also comprises: coordinate comparison sub-module 2080,By the coordinate data of the second motion track from deciphering coordinate record submodule 2060, with from addingThe coordinate data of the first motion track of close coordinate record submodule 2020 compares; And decipheringModule 210 also for: be situation about matching at the comparative result of coordinate comparison sub-module 2080Under, application modules or file decryption. In this technical scheme, if track matches, form railThe coordinate data of mark must match, and by the coordinate data in concrete relatively track, also can increaseAdd the accuracy of comparison.
In technique scheme, also comprise: figure generation module 212, will encrypt trace information rawBecome encryption trace graphics, and deciphering trace information is generated as to deciphering trace graphics; Comparison moduleAlso comprise: figure comparison sub-module 2082, compares deciphering trace graphics and encryption trace graphics; And deciphering module 210 also for: be phase at the comparative result of figure comparison sub-module 2082In the situation of coupling, application modules or file decryption. In this technical scheme, also can give birth toBecome track coordinate data and compare coordinate data, but by the figure key of storage and the rail of implementing to generateMark figure carries out the comparison of the aspects such as shape, if coupling is decrypted, this has reduced end on the one handThe pressure of end 200 in data volume, has reduced the required operation strength of comparison procedure on the other hand.
In technique scheme, comprising: figure generation module 212 is generated as encryption trace graphicsPlane or solid figure; Deciphering trace graphics is generated as plane or stereogram by figure generation module 212Shape; Display module 214, the planar graph that figure generation module 212 is generated or solid figure are at endOn end 200, show. In this technical scheme, the trace graphics that respective user generates in space, canAfter showing in terminal 200, determined to enable or re-start by user and obtain. Here canTo be planar obit simulation figure, can be also three-dimensional trace graphics. If plane, is convenient to user'sMemory and using, and if three-dimensional, owing to there being the deviation such as angle, visual angle, therefore, such as equallyBeing in space, to mark a circle, if from front, is a circle, if from the side, is oneBar line segment, if from other angles, is an ellipse, and user can be right in terminal 200 soThe visual angle of the three-dimensional trace graphics showing etc. regulates, thereby can improve security.
In technique scheme, also comprise: if do not encrypt trace information and deciphering trace information notJoin, on the screen of terminal 200, do not show variation, or enter default camouflage interface. At thisIn technical scheme, at track after it fails to match, or the frequency of failure has been while having exceeded default frequency threshold value,Can not be decrypted, or by entering in default camouflage interface, thereby secret ability improved.
Fig. 3 shows the schematic diagram that terminal is encrypted according to an embodiment of the invention.
As shown in Figure 3, when terminal is encrypted operation according to an embodiment of the invention, by user's handHolding terminal, and terminal moved in space, such as terminal in space along a circleShape track moves.
In the process of moving in terminal, the displacement transducer 302 in terminal has recorded the fortune of terminalMoving track, this movement locus is made up of the coordinate data in terminal motion process, specifically can be by terminalVirtual coordinate system, as initial point, is set up in position when setting in motion in space, and records terminal motionIn process in the position of this coordinate system, thereby obtain coordinate data. Displacement transducer 302 is by these seatsMark data are sent to processor 304. Processor 304 can be directly using these coordinate datas as encryptionKey, and be stored in memory 308 and store, thus in the time that needs are decrypted, then shapeBecome the coordinate data of deciphering track, whether the track by relatively twice generation or track coordinate data beJoin, can judge whether to be decrypted.
Certainly, processor 304 can also generate trace graphics by the coordinate data of the track obtaining, andShow by display screen 306, check the shape of trace graphics for user, thereby determineFor being encrypted operation or re-starting obtaining of track. In addition, trace graphics can be planeFigure can be also solid figure. Suppose that terminal carried out a circular operation in space, ifFor planar graph, it is directly a circle; If solid figure, user can also to observeVisual angle is adjusted, thereby the figure obtaining may, for circular, oval, be even a line segment,Therefore alternative plan is more, is conducive to the guarantee of security.
Below in conjunction with Fig. 4 A and Fig. 4 B, to according to the encryption and decryption process under embodiments of the inventionDescribe, wherein, Fig. 4 A shows the stream that terminal is encrypted according to an embodiment of the inventionCheng Tu; Fig. 4 B shows the flow chart that terminal is decrypted according to an embodiment of the invention.
As shown in Figure 4 A, the step that terminal is encrypted is according to an embodiment of the invention as follows:
Step 402, open position displacement sensor. By displacement transducer displacement in space to terminalTrack carries out record. Here the position can adopt terminal setting in motion time is as initial point, in spaceIn set up virtual coordinate system, and record the position at this coordinate system in terminal motion process, thereby obtainCoordinate data.
The displacement transducer here comprises the multiple device such as gravity sensor, gyroscope, as long as can rememberDevice or the instrument etc. of the deformation trace of record terminal in space, all can be in the present invention.
Step 404, the movement locus of sampling terminal.
Step 406 demonstrates the movement locus of record in terminal. By to the track data obtainingAnalyze, can in terminal, generate corresponding trace graphics, and show in terminal, withAfter confirming for user, for terminal is encrypted to operation, or select to re-start the life of trackBecome.
Step 408, is confirmed whether to use this track to operate, and if NO, returns to step 404Re-start obtaining of track, if yes, enter step 410.
Step 410, is used the trace graphics after confirming to need application module or file etc. in terminalThe object being encrypted is encrypted operation, then stores this movement locus, so that when deciphering is for rightRatio and judgement. Certainly, also can directly use the key of track data as cryptographic operation here, fromAnd in the time being decrypted, track data is compared and judged.
As shown in Figure 4 B, the step that terminal is decrypted is according to an embodiment of the invention as follows:
Step 502, open position displacement sensor. By displacement transducer displacement in space to terminalTrack carries out record. Here the position can adopt terminal setting in motion time is as initial point, in spaceIn set up virtual coordinate system, and record the position at this coordinate system in terminal motion process, thereby obtainCoordinate data.
The displacement transducer here comprises the multiple device such as gravity sensor, gyroscope, as long as can rememberDevice or the instrument etc. of the deformation trace of record terminal in space, all can be in the present invention.
Step 504, the movement locus of sampling terminal.
Step 506 demonstrates the movement locus of record in terminal. By to the track data obtainingAnalyze, can in terminal, generate corresponding trace graphics, and show in terminal, withAfter confirming for user, for terminal is decrypted to operation, or select to re-start the life of trackBecome.
Step 508, is confirmed whether to use this track to operate, and if NO, returns to step 504Re-start obtaining of track, if yes, enter step 510.
Step 510, is used the trace graphics after confirming to need application module or file etc. in terminalThe object being decrypted is decrypted operation, specifically using in the track obtaining and terminal, store as closeThe track of key contrasts and judges. Certainly, if use to be track data as cryptographic operation closeKey,, in the time being decrypted, can comparing and judge track data.
Step 512, judges whether to match, and if so, enters step 514, if NO, returnsReturn step 504, again track is obtained. Certainly, also can, in unmatched situation, adoptWith not reacting, enter other modes such as default camouflage interface, thereby further improve safetyProperty.
Step 514, is decrypted operation.
Below in conjunction with Fig. 5 A to 5C, trace graphics is according to an embodiment of the invention described,Wherein, Fig. 5 A shows the floor map of trace graphics according to an embodiment of the invention; Fig. 5 BShow the schematic perspective view of trace graphics according to an embodiment of the invention to 5C.
As shown in Figure 5A, trace graphics according to an embodiment of the invention, supposes that terminal is in spaceAfter moving, generate the rectangular path shown in Fig. 5 A, what demonstrate here is planar graph,Be still the rectangle of a standard, and the shape of figure with terminal the basic phase of the true shape in spaceWith.
, can be found out by the arrow of the expression direction marking in figure, if adopt track data straight meanwhileConnect as the key of encrypting,, except the shape of track, can also be implied with the direction of motion to trackUse, thereby strengthened the guarantee to security.
As shown in Figure 5 B, be trace graphics as shown in Figure 5A have been carried out to the visual angle on space becomeThe solid figure obtaining after change, like this, although user carry out track generate time, use be as figureLarge rectangle shown in 5A, but use time change, so, in the time being decrypted, withSample can adopt: must first generate large rectangle as shown in Figure 5A, then in terminal to generateSolid figure carry out the adjustment at visual angle, and then obtain being similar to the trace graphics shown in Fig. 5 B, fromAnd be decrypted.
As shown in Figure 5 C, for solid figure, can also add transparent effect, thereby user coupleWhen three-dimensional trace graphics is confirmed, strengthen the understanding of user for trace graphics.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered adding in correlation techniqueSecret skill art exists prompting to encrypt, easily forgets etc. shortcoming, therefore, the invention provides a kind of terminal and addsDecryption method and a kind of terminal, can set key according to user's hobby, and encrypt meritCan be more hidden, protection information can not be revealed effectively.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, forThose skilled in the art, the present invention can have various modifications and variations. All in essence of the present inventionWithin god and principle, any amendment of doing, be equal to replacement, improvement etc., all should be included in the present inventionProtection domain within.

Claims (10)

1. a terminal encipher-decipher method, for having the terminal of displacement induction installation, its feature existsIn, comprising:
Step 102, utilizes described displacement induction installation to obtain first moving rail of described terminal in spaceMark, to generate encryption trace information;
Step 104, utilizes described encryption trace information, and application module or file that needs are encrypted addClose;
Step 106, utilizes described displacement induction installation to obtain second moving rail of described terminal in spaceMark, to generate deciphering trace information;
Step 108, compares described deciphering trace information and described encryption trace information, ifJoin, to described application module or file decryption; If described encryption trace information and described deciphering trackInformation is not mated, and does not show variation, or enter default camouflage circle on the screen of described terminalFace.
2. terminal encipher-decipher method according to claim 1, is characterized in that, described encryptionTrace information comprises the coordinate data of described the first motion track; And
Described deciphering trace information comprises the coordinate data of described the second motion track.
3. terminal encipher-decipher method according to claim 2, is characterized in that, described step108 specifically comprise:
The coordinate data of the coordinate data of described the second motion track and described the first motion track is carried outRelatively, if coupling, to described application module or file decryption.
4. terminal encipher-decipher method according to claim 1, is characterized in that,
In described step 104, also comprise: described encryption trace information is generated as to encryption trajectory diagramShape;
In described step 106, also comprise: described deciphering trace information is generated as to deciphering trajectory diagramShape;
Described step 108 is specially: described deciphering trace graphics and described encryption trace graphics are carried outRelatively, if coupling, to described application module or file decryption.
5. terminal encipher-decipher method according to claim 4, is characterized in that, described encryptionTrace graphics is plane or solid figure; Described deciphering trace graphics is plane or solid figure; By instituteState to encrypt trace graphics and/or decipher trace graphics and show in described terminal.
6. a terminal, has displacement induction installation, it is characterized in that, comprising:
Encrypt track generation module, utilize described displacement induction installation to obtain described terminal in the of spaceOne motion track, to generate encryption trace information;
Encrypting module, the described encryption trace information that utilizes described encryption track generation module to generate, rightNeed application module or the file encryption encrypted;
Deciphering track generation module, utilizes described displacement induction installation to obtain described terminal in the of spaceTwo motion tracks, to generate deciphering trace information;
Comparison module, the described deciphering trace information that described deciphering track generation module is generated with described inEncryption trace information compares;
Deciphering module is coupling, to described application at the comparative result of described comparison moduleModule or file decryption; If described encryption trace information does not mate with described deciphering trace information, in instituteState on the screen of terminal and do not show variation, or enter default camouflage interface.
7. terminal according to claim 6, is characterized in that, described encryption track generates mouldPiece also comprises:
Encrypt coordinate record submodule, in the time generating described encryption trace information, record described first and moveThe coordinate data of moving track; And
Described deciphering track generation module also comprises:
Deciphering coordinate record submodule, in the time generating described deciphering trace information, records described second and movesThe coordinate data of moving track.
8. terminal according to claim 7, is characterized in that, described comparison module also wrapsDraw together:
Coordinate comparison sub-module, by described the second moving rail from described deciphering coordinate record submoduleThe coordinate data of mark, with the seat of described the first motion track from described encryption coordinate record submoduleMark data compare; And
Described deciphering module also for: the comparative result of described coordinate comparison sub-module be coupling feelingsUnder condition, to described application module or file decryption.
9. terminal according to claim 6, is characterized in that, also comprises:
Figure generation module, is generated as encryption trace graphics by described encryption trace information, and by instituteState deciphering trace information and be generated as deciphering trace graphics;
Described comparison module also comprises:
Figure comparison sub-module, compares described deciphering trace graphics and described encryption trace graphics; And
Described deciphering module also for: the comparative result of described figure comparison sub-module be coupling feelingsUnder condition, to described application module or file decryption.
10. terminal according to claim 9, is characterized in that, comprising:
Described encryption trace graphics is generated as plane or solid figure by described figure generation module;
Described deciphering trace graphics is generated as plane or solid figure by described figure generation module;
Display module, the planar graph that described figure generation module is generated or solid figure are at described endOn end, show.
CN201110449922.7A 2011-12-29 2011-12-29 Terminal encipher-decipher method and terminal Active CN103186744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110449922.7A CN103186744B (en) 2011-12-29 2011-12-29 Terminal encipher-decipher method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110449922.7A CN103186744B (en) 2011-12-29 2011-12-29 Terminal encipher-decipher method and terminal

Publications (2)

Publication Number Publication Date
CN103186744A CN103186744A (en) 2013-07-03
CN103186744B true CN103186744B (en) 2016-05-04

Family

ID=48677907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110449922.7A Active CN103186744B (en) 2011-12-29 2011-12-29 Terminal encipher-decipher method and terminal

Country Status (1)

Country Link
CN (1) CN103186744B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104134043B (en) * 2013-07-22 2016-04-06 腾讯科技(深圳)有限公司 Content is hidden, separates method, device and the terminal hidden
CN104836778B (en) * 2014-02-11 2019-03-12 腾讯科技(深圳)有限公司 A kind of implementation method of identifying code, apparatus and system
CN103853951A (en) * 2014-04-01 2014-06-11 北京金山安全软件有限公司 Method and system for logging in mobile terminal
CN104657640A (en) * 2015-02-10 2015-05-27 苏州天平先进数字科技有限公司 Secret unlocking method for mobile terminal
CN106406686A (en) * 2015-07-31 2017-02-15 中兴通讯股份有限公司 Password authentication method and apparatus
CN105069360B (en) * 2015-08-27 2019-04-09 Oppo广东移动通信有限公司 A kind of file encryption, decryption method and terminal
CN114338182B (en) * 2021-12-29 2024-04-12 中国电信股份有限公司 Data encryption method and device, nonvolatile storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1424643A (en) * 2003-01-08 2003-06-18 无敌科技(西安)有限公司 Handwriting encrypting method and device thereof
CN1484785A (en) * 2001-01-10 2004-03-24 索尼公司 Information processing terminal
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1484785A (en) * 2001-01-10 2004-03-24 索尼公司 Information processing terminal
CN1424643A (en) * 2003-01-08 2003-06-18 无敌科技(西安)有限公司 Handwriting encrypting method and device thereof
CN1598750A (en) * 2004-07-27 2005-03-23 天津大学 Gradient induction encrypted method
CN101676926A (en) * 2008-09-16 2010-03-24 深圳富泰宏精密工业有限公司 Touch type electronic equipment and its authority control method

Also Published As

Publication number Publication date
CN103186744A (en) 2013-07-03

Similar Documents

Publication Publication Date Title
CN103186744B (en) Terminal encipher-decipher method and terminal
CN110291754A (en) It is accessed using the system of mobile device
CN102647276B (en) For the system and method for equipment and data authentication
CN107683582B (en) Authentication stylus device
JP2019531544A5 (en)
RU2011132695A (en) USE OF TOUCHES FOR TRANSFER OF INFORMATION BETWEEN DEVICES
US11734406B2 (en) Secure tamper resistant smart card
KR100526650B1 (en) Electronic value data communication method, communication system, IC card, portable terminal and communication terminal
CN109961294A (en) Commodity based on block chain are really weighed and ownership transfer method and system
CN102156843B (en) Data encryption method and system as well as data decryption method
CN102724034A (en) Encryption/decryption system and method based on space motion
CN110222531A (en) A kind of method, system and equipment accessing database
CN103051460B (en) Based on dynamic token system and the encryption method thereof of inertial technology
CN102694794A (en) Scene information protection method used for Android application program
CN109191142A (en) A kind of commodity tracing method, equipment and system
CN109147109A (en) Lockset, mobile terminal, lockset control method and Lock control system
JP2015194947A (en) Information processing device and computer program
Rullo et al. PUF-Based Authentication-Oriented Architecture for Identification Tags
CN103986572B (en) Cryptographic system and its disposable random cipher generation method based on spatial variations and application
CN102495811B (en) Method for generating and validating license and storage equipment
CN115331336A (en) Card simulation scheme-based NFC digital key mobile device adaptation method and device
TWI533158B (en) Verification of mobile device with signed gestures
CN106709300A (en) Gesture-based encryption method
CN110020513A (en) Signature recording method, verification method, device and storage medium
TWI559169B (en) Authorization method and architecture of card with user - side card authority control and traceability

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant