CN104363087A - Encryption and decryption method and device - Google Patents

Encryption and decryption method and device Download PDF

Info

Publication number
CN104363087A
CN104363087A CN201410663510.7A CN201410663510A CN104363087A CN 104363087 A CN104363087 A CN 104363087A CN 201410663510 A CN201410663510 A CN 201410663510A CN 104363087 A CN104363087 A CN 104363087A
Authority
CN
China
Prior art keywords
password
pause
input
information
length grade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201410663510.7A
Other languages
Chinese (zh)
Inventor
谢良良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen ZTE Mobile Telecom Co Ltd
Original Assignee
Shenzhen ZTE Mobile Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Mobile Telecom Co Ltd filed Critical Shenzhen ZTE Mobile Telecom Co Ltd
Priority to CN201410663510.7A priority Critical patent/CN104363087A/en
Publication of CN104363087A publication Critical patent/CN104363087A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption method and device. The encryption and decryption method includes the steps of obtaining an input password and pause information when the password is input, and carrying out encryption or decryption according to the password and the pause information. Due to the fact that pause information is a particular habit of a user during password inputting, the particular habit of the user during password inputting is also involved in the encryption and decryption processes, and even if stealing the input password of the user, other people can still not decrypt an encrypted object due to the fact that other people do not know the particular habit of the user during password inputting. Accordingly, the identity of the user is verified by combination of the password and the particular habit of the user, the risk that the password is disclosed is greatly reduced, decryption difficult of the encryption object is improved and data safety is improved.

Description

Encipher-decipher method and device
Technical field
The present invention relates to communication technical field, especially relate to a kind of encipher-decipher method and device.
Background technology
Along with developing rapidly of the communication technology, the fail safe of people to data is more and more paid attention to.In prior art, in order to ensure the safety of data, prevent data from leaking, be usually encrypted as password by inputting the character such as digital, alphabetical, Password Input figure place is more much more complicated, and other people crack also more difficult.Such as, but the password that user is arranged has risk stolen by others, when user inputs password, is easy to by third party software record, or is spied on by other people, thus cause password to be revealed, there is unsafe factor.
Summary of the invention
Main purpose of the present invention is to provide a kind of encipher-decipher method and device, is intended to reduce password leakage risk, improves the fail safe of data.
To achieve these objectives, the present invention proposes a kind of encipher-decipher method, comprises step:
Obtain the password of input, and pause information during input password;
Be encrypted according to described password and pause information or decipher.
Preferably, the password of described acquisition input and pause information when inputting password comprise:
Obtain the password of input;
Pause duration during record input password between every twice adjacent input;
All pause durations according to whole Password Input process record obtain pause information.
Preferably, described all pause durations acquisition pause information according to whole Password Input process record comprise:
According to preset rules, obtain the length grade belonging to described pause duration;
Using the combination of the length grade corresponding to all pause durations of whole Password Input process record as pause information.
Preferably, described all pause durations acquisition pause information according to whole Password Input process record comprise:
According to preset rules, obtain the length grade belonging to described pause duration;
According to pre-arranged code rule, the code that the length grade corresponding to all pause durations obtaining whole Password Input process record forms, using described code as pause information.
Preferably, the described length grade obtained belonging to described pause duration according to preset rules comprises:
According to the fuzzy membership function preset, obtain the length grade belonging to described pause duration.
The present invention proposes a kind of ciphering and deciphering device simultaneously, comprises acquisition module and encryption/decryption module, wherein:
Acquisition module, for obtaining the password of input, and pause information during input password;
Encryption/decryption module, for carrying out encryption and decryption computing according to described password and pause information.
Preferably, described acquisition module comprises acquiring unit, record cell and analytical calculation unit, wherein:
Acquiring unit, for obtaining the password of input;
Record cell, pause duration when inputting password for recording between every twice adjacent input;
Analytical calculation unit, obtains pause information for all pause durations according to whole Password Input process record.
Preferably, described analytical calculation unit is used for:
According to preset rules, obtain the length grade belonging to described pause duration;
Using the combination of the length grade corresponding to all pause durations of whole Password Input process record as pause information.
Preferably, described analytical calculation unit is used for:
According to preset rules, obtain the length grade belonging to described pause duration;
According to pre-arranged code rule, the code that the length grade corresponding to all pause durations obtaining whole Password Input process record forms, using described code as pause information.
Preferably, described analytical calculation unit is used for: according to the fuzzy membership function preset, obtain the length grade belonging to described pause duration.
A kind of encipher-decipher method provided by the present invention, pause information during by obtaining the password of input and inputting password, be encrypted according to this password and pause information or decipher again, due to pause information be user input password time particular custom, particular custom when making user input password is also included into encryption process, even if other people have stolen the input password of user, if but particular custom when not knowing that user inputs password still cannot crack cryptographic object.Therefore, carry out authentication by the particular custom in conjunction with user to user, greatly reduce the risk that password is revealed, what improve cryptographic object cracks difficulty, improves the fail safe of data.
Accompanying drawing explanation
Fig. 1 is the flow chart of encipher-decipher method first embodiment of the present invention;
Fig. 2 is the flow chart of encipher-decipher method first embodiment of the present invention;
Fig. 3 is the flow chart of encipher-decipher method first embodiment of the present invention;
Fig. 4 is the module diagram of ciphering and deciphering device one embodiment of the present invention;
Fig. 5 is the module diagram of acquisition module in Fig. 4.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In life, the frequency that everyone has oneself intrinsic: people can be sneezed by a people, footsteps differentiates a people, that is because they have fixing audible frequency and footfall frequency; Everyone has oneself dwell interval when report cell-phone number, and as 335-344 etc., this also can be considered as one " frequency "; These parts that can be taken as personal information verify the identity of a people.
Inventor studies discovery, and most people conveniently remembers all can use same password, and they are when inputting password like this, because factors such as memory habit, keystroke custom, qualifications, can produce distinctive Password Input custom.Such as input password time there is intrinsic pause information, namely continuously input password time adjacent twice input between dwell interval.If this part information can be extracted and carry out authentication, the fail safe of authentication will be improved.
Therefore, encipher-decipher method of the present invention, first obtains pause information during password and the input password of input, is then encrypted according to this password and pause information or deciphers.Wherein, pause information when user inputs password is the particular custom of user, and by including the particular custom of user in encryption process, that greatly can improve cryptographic object cracks difficulty, and then improves the fail safe of data.Be described in detail below by way of specific embodiment.
See Fig. 1, propose encipher-decipher method first embodiment of the present invention, described encipher-decipher method comprises the following steps:
Step S10: the password obtaining input
Terminal equipment obtains the password of user's input by touch-screen or physical button, also can be obtained the password of user's input (phonetic entry) by sound receivers such as microphones.Numeral, letter, symbol, word or combination in any that described password and user input when encrypting or decipher or say.
Step S11: pause duration during record input password between every twice adjacent input
Can to be paused duration by timer record, such as, start timing when Key stroke (or phonetic entry) first character, read the reading of timer when Key stroke second character, record the pause duration (interval time) between first and second inputs; Timer resets and again starts timing simultaneously, again reads the reading of timer when Key stroke the 3rd character, the pause duration between record second and third time input.The like, until Password Input is complete.
In fact, step S10 and step S11 does not have sequencing, synchronously carries out.
Step S12: using the combination of all pause durations of whole Password Input process record as pause information
Such as, user inputs password 123456, its input rhythm (or frequency) is 1.2.3-4.5.6, wherein ". " and "-" representative pauses, pause duration then often between adjacent twice input is respectively 0.1 second, 0.1 second, 0.3 second, 0.1 second, 0.1 second, all pause durations of record are combined as code information 0101030101, in order using this code information as pause information.
In certain embodiments, also can not according to sequential combination, i.e. pause information does not comprise built-up sequence, as long as there is the code of corresponding number.Such as, in previous example, the code information that pause information comprises is: four 01, one 03, can random order arrangement.Then in previous example, the input rhythm with input rhythm " 1.2.3-4.5.6 " with identical pause information also comprises " 1-2.3.4.5.6 ", " 1.2-3.4.5.6 ", " 1.2.3.4-5.6 " and " 1.2.3.4.5-6 ".
Step S13: be encrypted according to the password of input and pause information when inputting password or decipher
Described encryption or deciphering, can be encrypted the data stored or decipher, also can be lock the screen of terminal or terminal or unlock.
When carrying out encryption and decryption, the pause both information when password of input and input password can be combined the password as encryption or deciphering, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm; Or, using the pause both information when password of input and input password individually as the password encrypted or decipher, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm.Such as, when deciphering, using pause information during input password separately as password, before the password of checking input, comparing checking, being proved to be successful the password of rear checking input.
See Fig. 2, propose encipher-decipher method second embodiment of the present invention, described encipher-decipher method comprises the following steps:
Step S20: the password obtaining input
Terminal equipment obtains the password of user's input by touch-screen or physical button, also can be obtained the password of user's input (phonetic entry) by sound receivers such as microphones.Numeral, letter, symbol, word or combination in any that described password and user input when encrypting or decipher or say.
Step S21: pause duration during record input password between every twice adjacent input
Can to be paused duration by timer record, such as, start timing when Key stroke (or phonetic entry) first character, read the reading of timer when Key stroke second character, record the pause duration (interval time) between first and second inputs; Timer resets and again starts timing simultaneously, again reads the reading of timer when Key stroke the 3rd character, the pause duration between record second and third time input.The like, until Password Input is complete.
Step S22: obtain the length grade belonging to pause duration according to preset rules
Described preset rules is namely to the definition rule of length grade, and such as described length grade can be defined as 1 ~ n level, n be greater than 1 natural number.Such as, can define pause duration 0.1 second and be 1 grade below, within 0.1 ~ 0.3 second, being 2 grades, 0.3 ~ 0.5 is 3 grades, within 0.5 ~ 0.8 second, is 4 grades, the like.
Step S23: using the combination of the length grade corresponding to all pause durations of whole Password Input process record as pause information
Such as, user inputs password 123456, its input rhythm is 1--2-3..4.5.6, wherein ". " and "-" representative pauses, pause duration often between adjacent twice input is respectively 0.8 second, 0.4 second, 0.2 second, 0.1 second, 0.1 second, the length grade that then each pause duration is corresponding is 4 grades, 3 grades, 2 grades, 1 grade, 1 grade, and the length grade corresponding to all pause durations of whole Password Input process record is combined as code information 43211, in order using this code information as pause information.
In certain embodiments, also can not according to sequential combination, i.e. pause information does not comprise built-up sequence, as long as there is the code of corresponding number.Such as, in previous example, the code information that pause information comprises is: one 4, one 3, one 2 and two 1, can random order permutation and combination.
Step S24: be encrypted according to the password of input and pause information when inputting password or decipher
Described encryption or deciphering, can be encrypted the data stored or decipher, also can be lock the screen of terminal or terminal or unlock.
When carrying out encryption and decryption, the pause both information when password of input and input password can be combined the password as encryption or deciphering, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm; Or, using the pause both information when password of input and input password individually as the password encrypted or decipher, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm.Such as, when deciphering, using pause information during input password separately as password, before the password of checking input, comparing checking, being proved to be successful the password of rear checking input.
See Fig. 3, propose encipher-decipher method of the present invention 3rd embodiment, described encipher-decipher method comprises the following steps:
Step S30: the password obtaining input
Terminal equipment obtains the password of user's input by touch-screen or physical button, also can be obtained the password of user's input (phonetic entry) by sound receivers such as microphones.Numeral, letter, symbol, word or combination in any that described password and user input when encrypting or decipher or say.
Step S31: pause duration during record input password between every twice adjacent input
Can to be paused duration by timer record, such as, start timing when Key stroke (or phonetic entry) first character, read the reading of timer when Key stroke second character, record the pause duration (interval time) between first and second inputs; Timer resets and again starts timing simultaneously, again reads the reading of timer when Key stroke the 3rd character, the pause duration between record second and third time input.The like, until Password Input is complete.
Step S32: obtain the length grade belonging to pause duration according to preset rules
Described preset rules is namely to the definition rule of length grade, and such as described length grade can be defined as " length " and " short " two grades, or be defined as " length ", " in ", " short " Three Estate.
In order to avoid erroneous judgement or misoperation, can fuzzy membership function be preset, obtain the length grade belonging to pause duration according to fuzzy membership function.Such as, use fuzzy mathematics, calculate the fuzzy membership of certain pause duration in each length grade, will the length grade of the larger length grade of angle value as this pause duration be subordinate to.Wherein, degree of membership represents the degree (or probability) of certain value in a certain interval.
Such as, the fuzzy membership function defining length grade " short " is:
F(x)=1(x<0.1)
F(x)=1.25-2.5*x(0.1<=x<=0.5)
F(x)=0(x>0.5);
The fuzzy membership function of definition length grade " length " is:
F(x)=0(x<=0.1)
F(x)=2.5x-0.25(0.1<x<0.5)
F(x)=1(x>=0.5);
According to aforementioned functions, if a certain pause duration is 0.4 second, calculate the fuzzy membership of " short " and " length " two length grades so respectively, be respectively 0.25 and 0.75, that is the degree that 0.4 second this pause duration belongs to " short " length grade (keystroke is fast) is 0.25, the degree belonging to " length " length grade (keystroke is slow) is 0.75, due to 0.75>0.25, therefore assert that the pause duration length grade of 0.4 second is " length ".
Step S33: according to pre-arranged code rule, the code that the length grade corresponding to all pause durations obtaining whole Password Input process record forms, using this code as pause information
Such as, user inputs password 123456789, its input rhythm is 1.2.3-4.5.6-7.8.9, wherein ". " and "-" representative pauses, and ". " represents that dead time short namely corresponding length grade is " short ", "-" represents that dead time long namely corresponding length grade is " length ", extracts these length class informations for " ..-..-.. ", then obtains the code corresponding to these length grades according to preset rules.
Such as, the rule of the aforementioned length grade of definition reading is as follows:
A, to run into ". ", read next bit, continue to read next bit, maximum 5 ". " if be still ". ";
B if "-", then extracts "-" and ". " above, adding "-" below less than 5, polishing 5;
C, the information of running into run through still inadequate 5, after automatically supplement ". " to meet 5.
According to aforementioned rule, reading length class information " ..-..-.. " in previous example is " ..---..---..... ", according to Morse code coding rule, and contrast Morse code numeral long code, can obtain Morse code 225, this Morse code 225 is the pause information of this Password Input process.
Alternatively, also length grade ". " can be defined as 0, length grade "-" is defined as 1, then the code information that length class information " ..-..-.. " is corresponding is 00100100, and this code information 00100100 is the pause information of this Password Input process.
Step S34: be encrypted according to the password of input and pause information when inputting password or decipher
Described encryption or deciphering, can be encrypted the data stored or decipher, also can be lock the screen of terminal or terminal or unlock.
When carrying out encryption and decryption, the pause both information when password of input and input password can be combined the password as encryption or deciphering, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm; Or, using the pause both information when password of input and input password individually as the password encrypted or decipher, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm.Such as, when deciphering, using pause information during input password separately as password, before the password of checking input, comparing checking, being proved to be successful the password of rear checking input.
Encipher-decipher method of the present invention, pause information during by obtaining the password of input and inputting password, be encrypted according to this password and pause information or decipher again, due to pause information be user input password time particular custom, particular custom when making user input password is also included into encryption process, even if other people have stolen the input password of user, if but particular custom when not knowing that user inputs password still cannot crack cryptographic object.Therefore, carry out authentication by the particular custom in conjunction with user to user, greatly reduce the risk that password is revealed, what improve cryptographic object cracks difficulty, improves the fail safe of data.
See Fig. 4, Fig. 5, ciphering and deciphering device one embodiment of the present invention is proposed, described ciphering and deciphering device comprises acquisition module and encryption/decryption module, pause information when acquisition module is for obtaining the password of input and inputting password, encryption/decryption module is used for carrying out encryption and decryption computing according to this password and pause information.
Acquisition module comprises acquiring unit, record cell and analytical calculation unit, wherein:
Acquiring unit: for obtaining the password of input.
Terminal equipment obtains the password of user's input by touch-screen or physical button, also can be obtained the password of user's input (phonetic entry) by sound receivers such as microphones.Numeral, letter, symbol, word or combination in any that described password and user input when encrypting or decipher or say.
Record cell: pause duration when inputting password for recording between every twice adjacent input.
Record cell can be paused duration by timer record, such as, timing is started when Key stroke (or phonetic entry) first character, read the reading of timer when Key stroke second character, record the pause duration (interval time) between first and second inputs; Timer resets and again starts timing simultaneously, again reads the reading of timer when Key stroke the 3rd character, the pause duration between record second and third time input.The like, until Password Input is complete.
Analytical calculation unit: obtain pause information for all pause durations according to whole Password Input process record.
In certain embodiments, analytical calculation unit using the combination of all pause durations of whole Password Input process record as pause information.Such as, user inputs password 123456, its input rhythm (or frequency) is 1.2.3-4.5.6, wherein ". " and "-" representative pauses, the pause duration of recording unit records often between adjacent twice input is respectively 0.1 second, 0.1 second, 0.3 second, 0.1 second, 0.1 second, all pause durations of record are then combined as code information 0101030101, using this code information as pause information by analytical calculation unit in order.
Alternatively, also can not according to sequential combination, i.e. pause information does not comprise built-up sequence, as long as there is the code of corresponding number.Such as, in previous example, the code information that pause information comprises is: four 01, one 03, can random order arrangement.Then in previous example, the input rhythm with input rhythm " 1.2.3-4.5.6 " with identical pause information also comprises " 1-2.3.4.5.6 ", " 1.2-3.4.5.6 ", " 1.2.3.4-5.6 " and " 1.2.3.4.5-6 ".
In further embodiments, analytical calculation unit obtains the length grade belonging to pause duration, using the combination of the length grade corresponding to all pause durations of whole Password Input process record as pause information according to preset rules.
Concrete, described preset rules is namely to the definition rule of length grade, and such as described length grade can be defined as 1 ~ n level, n be greater than 1 natural number.Such as, can define pause duration 0.1 second and be 1 grade below, within 0.1 ~ 0.3 second, being 2 grades, 0.3 ~ 0.5 is 3 grades, within 0.5 ~ 0.8 second, is 4 grades, the like.
Suppose that user inputs password 123456, its input rhythm is 1--2-3..4.5.6, wherein ". " and "-" representative pauses, the pause duration of recording unit records often between adjacent twice input is respectively 0.8 second, 0.4 second, 0.2 second, 0.1 second, 0.1 second, it is 4 grades, 3 grades, 2 grades, 1 grade, 1 grade that analytical calculation unit then obtains length grade corresponding to each pause duration according to aforementioned rule, length grade corresponding to all pause durations of whole Password Input process record is combined as code information 43211, in order using this code information as pause information.
Alternatively, also can not according to sequential combination, i.e. pause information does not comprise built-up sequence, as long as there is the code of corresponding number.Such as, in previous example, the code information that pause information comprises is: one 4, one 3, one 2 and two 1, can random order permutation and combination.
Also have in some embodiments, analytical calculation unit obtains the length grade belonging to pause duration according to preset rules, the code that length grade again corresponding to all pause durations of pre-arranged code Rule whole Password Input process record forms, using this code as pause information.
Concrete, described preset rules is namely to the definition rule of length grade, and such as described length grade can be defined as " length " and " short " two grades, or be defined as " length ", " in ", " short " Three Estate.
In order to avoid erroneous judgement or misoperation, can preset fuzzy membership function, analytical calculation unit obtains the length grade belonging to pause duration according to fuzzy membership function.Such as, use fuzzy mathematics, calculate the fuzzy membership of certain pause duration in each length grade, will the length grade of the larger length grade of angle value as this pause duration be subordinate to.Wherein, degree of membership represents the degree (or probability) of certain value in a certain interval.
Such as, the fuzzy membership function defining length grade " short " is:
F(x)=1(x<0.1)
F(x)=1.25-2.5*x(0.1<=x<=0.5)
F(x)=0(x>0.5);
The fuzzy membership function of definition length grade " length " is:
F(x)=0(x<=0.1)
F(x)=2.5x-0.25(0.1<x<0.5)
F(x)=1(x>=0.5);
According to aforementioned functions, if a certain pause duration is 0.4 second, calculate the fuzzy membership of " short " and " length " two length grades so respectively, be respectively 0.25 and 0.75, that is the degree that 0.4 second this pause duration belongs to " short " length grade (keystroke is fast) is 0.25, the degree belonging to " length " length grade (keystroke is slow) is 0.75, due to 0.75>0.25, therefore assert that the pause duration length grade of 0.4 second is " length ".
Suppose that user inputs password 123456789, its input rhythm is 1.2.3-4.5.6-7.8.9, wherein ". " and "-" representative pauses, and ". " represents that dead time short namely corresponding length grade is " short ", "-" represents that dead time long namely corresponding length grade is " length ", analytical calculation unit then extracts these length class informations for " ..-..-.. ", then obtains the code corresponding to these length grades according to preset rules.
Further, the rule reading aforementioned length grade can be defined as follows:
A, to run into ". ", read next bit, continue to read next bit, maximum 5 ". " if be still ". ";
B if "-", then extracts "-" and ". " above, adding "-" below less than 5, polishing 5;
C, the information of running into run through still inadequate 5, after automatically supplement ". " to meet 5.
According to aforementioned rule, it is " ..---..---..... " that analytical calculation unit reads length class information " ..-..-.. " in previous example, according to Morse code coding rule, contrast Morse code numeral long code, can obtain Morse code 225, this Morse code 225 is the pause information of this Password Input process.
Alternatively, also length grade ". " can be defined as 0, length grade "-" is defined as 1, then the code information that length class information " ..-..-.. " is corresponding is 00100100, and this code information 00100100 is the pause information of this Password Input process.
Encryption/decryption module: be encrypted according to the password of input and pause information when inputting password or decipher.
Described encryption or deciphering, can be encrypted the data stored or decipher, also can be lock the screen of terminal or terminal or unlock.
When carrying out encryption and decryption, the pause both information when password of input and input password can be combined the password as encryption or deciphering by encryption/decryption module, or uses as the key (key) of the encryptions such as md5, dec or decipherment algorithm; Or, using the pause both information when password of input and input password individually as the password encrypted or decipher, or use as the key (key) of the encryptions such as md5, dec or decipherment algorithm.Such as, when deciphering, using pause information during input password separately as password, before the password of checking input, comparing checking, being proved to be successful the password of rear checking input.
Ciphering and deciphering device of the present invention, pause information during by obtaining the password of input and inputting password, be encrypted according to this password and pause information or decipher again, due to pause information be user input password time particular custom, particular custom when making user input password is also included into encryption process, even if other people have stolen the input password of user, if but particular custom when not knowing that user inputs password still cannot crack cryptographic object.Therefore, carry out authentication by the particular custom in conjunction with user to user, greatly reduce the risk that password is revealed, what improve cryptographic object cracks difficulty, improves the fail safe of data.
It should be noted that: the ciphering and deciphering device that above-described embodiment provides is when carrying out encryption and decryption, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, internal structure by terminal equipment is divided into different functional modules, to complete all or part of function described above.In addition, the ciphering and deciphering device that above-described embodiment provides and encipher-decipher method embodiment belong to same design, and its specific implementation process refers to embodiment of the method, and the technical characteristic in embodiment of the method is all corresponding applicable in device embodiment, repeats no more here.
One of ordinary skill in the art will appreciate that, realize the hardware that all or part of step in above-described embodiment method can control to be correlated with by program to complete, described program can be stored in a computer read/write memory medium, and described storage medium can be ROM/RAM, disk, CD etc.
Above with reference to the accompanying drawings of the preferred embodiments of the present invention, not thereby limit to interest field of the present invention.Those skilled in the art do not depart from the scope and spirit of the present invention, and multiple flexible program can be had to realize the present invention, and the feature such as an embodiment can be used for another embodiment and obtains another embodiment.All use do within technical conceive of the present invention any amendment, equivalently replace and improve, all should within interest field of the present invention.

Claims (10)

1. an encipher-decipher method, is characterized in that, comprises step:
Obtain the password of input, and pause information during input password;
Be encrypted according to described password and pause information or decipher.
2. encipher-decipher method according to claim 1, is characterized in that, the pause information when password of described acquisition input and input password comprises:
Obtain the password of input;
Pause duration during record input password between every twice adjacent input;
All pause durations according to whole Password Input process record obtain pause information.
3. encipher-decipher method according to claim 2, is characterized in that, described all pause durations according to whole Password Input process record obtain pause information and comprise:
According to preset rules, obtain the length grade belonging to described pause duration;
Using the combination of the length grade corresponding to all pause durations of whole Password Input process record as pause information.
4. encipher-decipher method according to claim 2, is characterized in that, described all pause durations according to whole Password Input process record obtain pause information and comprise:
According to preset rules, obtain the length grade belonging to described pause duration;
According to pre-arranged code rule, the code that the length grade corresponding to all pause durations obtaining whole Password Input process record forms, using described code as pause information.
5. the encipher-decipher method according to claim 3 or 4, is characterized in that, the described length grade obtained belonging to described pause duration according to preset rules comprises:
According to the fuzzy membership function preset, obtain the length grade belonging to described pause duration.
6. a ciphering and deciphering device, is characterized in that, comprises acquisition module and encryption/decryption module, wherein:
Acquisition module, for obtaining the password of input, and pause information during input password;
Encryption/decryption module, for carrying out encryption and decryption computing according to described password and pause information.
7. ciphering and deciphering device according to claim 6, is characterized in that, described acquisition module comprises acquiring unit, record cell and analytical calculation unit, wherein:
Acquiring unit, for obtaining the password of input;
Record cell, pause duration when inputting password for recording between every twice adjacent input;
Analytical calculation unit, obtains pause information for all pause durations according to whole Password Input process record.
8. ciphering and deciphering device according to claim 7, is characterized in that, described analytical calculation unit is used for:
According to preset rules, obtain the length grade belonging to described pause duration;
Using the combination of the length grade corresponding to all pause durations of whole Password Input process record as pause information.
9. ciphering and deciphering device according to claim 7, is characterized in that, described analytical calculation unit is used for:
According to preset rules, obtain the length grade belonging to described pause duration;
According to pre-arranged code rule, the code that the length grade corresponding to all pause durations obtaining whole Password Input process record forms, using described code as pause information.
10. ciphering and deciphering device according to claim 8 or claim 9, it is characterized in that, described analytical calculation unit is used for: according to the fuzzy membership function preset, obtain the length grade belonging to described pause duration.
CN201410663510.7A 2014-11-19 2014-11-19 Encryption and decryption method and device Withdrawn CN104363087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410663510.7A CN104363087A (en) 2014-11-19 2014-11-19 Encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410663510.7A CN104363087A (en) 2014-11-19 2014-11-19 Encryption and decryption method and device

Publications (1)

Publication Number Publication Date
CN104363087A true CN104363087A (en) 2015-02-18

Family

ID=52530315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410663510.7A Withdrawn CN104363087A (en) 2014-11-19 2014-11-19 Encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN104363087A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844144A (en) * 2016-03-23 2016-08-10 惠州Tcl移动通信有限公司 Touch screen based mobile terminal input detection method and system
CN106452787A (en) * 2016-10-13 2017-02-22 广东欧珀移动通信有限公司 Data verification method and device
CN106488007A (en) * 2016-09-12 2017-03-08 努比亚技术有限公司 A kind of auth method and terminal
CN106791060A (en) * 2016-12-12 2017-05-31 努比亚技术有限公司 Mobile terminal and its method of password authentication
CN107092817A (en) * 2016-02-17 2017-08-25 杭州纳雄科技有限公司 Input information analysis method and equipment, data inputting method and equipment
CN109102597A (en) * 2018-06-28 2018-12-28 北京拜克洛克科技有限公司 Password identification method and device smart lock

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040076372A (en) * 2003-02-25 2004-09-01 필립닷컴 simple log-in system using mouse rhythm
CN1547688A (en) * 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
CN101364407A (en) * 2008-09-17 2009-02-11 清华大学 Karaoke singing marking method keeping subjective consistency
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
CN102592088A (en) * 2011-12-28 2012-07-18 广东欧珀移动通信有限公司 Password setting and verifying method
WO2012156785A1 (en) * 2011-05-13 2012-11-22 Shenoy Gurudatt Systems and methods for device based password-less user authentication using encryption
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
CN103078863A (en) * 2013-01-08 2013-05-01 青岛海信宽带多媒体技术有限公司 Method, device and system for login authentication

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547688A (en) * 2001-07-27 2004-11-17 ����л����Үά�桤ŬŬ���޷� Method and device for entering computer database password
KR20040076372A (en) * 2003-02-25 2004-09-01 필립닷컴 simple log-in system using mouse rhythm
CN101364407A (en) * 2008-09-17 2009-02-11 清华大学 Karaoke singing marking method keeping subjective consistency
CN102170348A (en) * 2010-11-08 2011-08-31 无敌科技(西安)有限公司 Method for achieving encryption and decryption of data through recording user input speed
WO2012156785A1 (en) * 2011-05-13 2012-11-22 Shenoy Gurudatt Systems and methods for device based password-less user authentication using encryption
CN102955908A (en) * 2011-08-31 2013-03-06 国际商业机器公司 Method and device for creating rhythm password and carrying out verification according to rhythm password
CN102592088A (en) * 2011-12-28 2012-07-18 广东欧珀移动通信有限公司 Password setting and verifying method
CN103078863A (en) * 2013-01-08 2013-05-01 青岛海信宽带多媒体技术有限公司 Method, device and system for login authentication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107092817A (en) * 2016-02-17 2017-08-25 杭州纳雄科技有限公司 Input information analysis method and equipment, data inputting method and equipment
CN105844144A (en) * 2016-03-23 2016-08-10 惠州Tcl移动通信有限公司 Touch screen based mobile terminal input detection method and system
CN106488007A (en) * 2016-09-12 2017-03-08 努比亚技术有限公司 A kind of auth method and terminal
CN106452787A (en) * 2016-10-13 2017-02-22 广东欧珀移动通信有限公司 Data verification method and device
CN106452787B (en) * 2016-10-13 2019-05-24 Oppo广东移动通信有限公司 Data verification method and device
CN106791060A (en) * 2016-12-12 2017-05-31 努比亚技术有限公司 Mobile terminal and its method of password authentication
CN109102597A (en) * 2018-06-28 2018-12-28 北京拜克洛克科技有限公司 Password identification method and device smart lock

Similar Documents

Publication Publication Date Title
CN106656476B (en) Password protection method and device and computer readable storage medium
CN104363087A (en) Encryption and decryption method and device
US8959357B2 (en) Biometric encryption and key generation
CN104935429A (en) Data processing method and system employing multi-encryption technology
CN103929306A (en) Intelligent secret key device and information management method of intelligent secret key device
CN103236930A (en) Data encryption method and system
CN103152157A (en) Secure encrypted method and relevant device
CN104134022A (en) Information hiding and protecting method based on image
CN101964789A (en) Method and system for safely accessing protected resources
CN103560892A (en) Secret key generation method and secret key generation device
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN103326866A (en) Authentication method and system based on equipment MAC address
CN105897417A (en) Encrypted data input method and encrypted data input device
CN106648583B (en) Information processing method and terminal
CN105703901A (en) Encrypted data input method and encrypted data input device
CN111028392A (en) Combined password verification method, hardware terminal and password system
CN105550626A (en) Iris identification method and apparatus
CN101877195A (en) Password protection method
CN109617703B (en) Key management method and device, electronic equipment and storage medium
WO2015196642A1 (en) Data encryption method, decryption method and device
Bailey et al. " I have no idea what they're trying to {accomplish:}" Enthusiastic and Casual Signal Users' Understanding of Signal {PINs}
KR101339723B1 (en) Text message security system and method for prevention of identity theft and smishing
CN113672886A (en) Prompting method and device
CN105354462B (en) A kind of guard method of mobile memory and mobile memory
CN111127019B (en) Method, system and device for backing up mnemonic words

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

COR Change of bibliographic data
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20150218