CN104935429A - Data processing method and system employing multi-encryption technology - Google Patents

Data processing method and system employing multi-encryption technology Download PDF

Info

Publication number
CN104935429A
CN104935429A CN201410096796.5A CN201410096796A CN104935429A CN 104935429 A CN104935429 A CN 104935429A CN 201410096796 A CN201410096796 A CN 201410096796A CN 104935429 A CN104935429 A CN 104935429A
Authority
CN
China
Prior art keywords
data
encryption
user
mobile terminal
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410096796.5A
Other languages
Chinese (zh)
Other versions
CN104935429B (en
Inventor
龙秀萍
陈国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201410096796.5A priority Critical patent/CN104935429B/en
Publication of CN104935429A publication Critical patent/CN104935429A/en
Application granted granted Critical
Publication of CN104935429B publication Critical patent/CN104935429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data processing method and system employing the multi-encryption technology, and the method comprises the steps that a receiving mobile terminal receives an instruction that a user carries out data backup, obtains and recognizes a voice instruction of the user, and determines an encryption algorithm and an encryption key according to the voice instruction; the mobile terminal receives a selection instruction of the user, and determines whether the multi-encryption of data to be backed up is carried out or not; the first encryption of the encryption key is carried out when the multi-encryption of data to be backed up is carried out, thereby obtaining the first ciphertext; the first ciphertext is taken as a secrete key for the second encryption of the data to be backed up; the encryption key is taken as the secrete key when the multi-encryption of data to be backed up is not carried out, so as to achieve the encryption of the data to be backed up; and the encrypted data is uploaded to a server after the encryption of the data to be backed up is completed. Because the multi-encryption of data to be backed up can be selected, the safety of data information is greatly improved, and the data information cannot be cracked even if being leaked, thereby preventing the personal privacy information from being leaked.

Description

A kind of data processing method and system thereof adopting multi-enciphering
Technical field
The present invention relates to information security field, in particular a kind of data processing method and system thereof adopting multi-enciphering.
Background technology
Day by day universal along with smart machine, how safety, effectively back up the user data information such as address list, note, multimedia message, the individual cultivation of equipment, mounted application of user, become a problem needing to solve.At present, the user data backup method of smart machine has a variety of, and wherein most methods is all that data are stored in high in the clouds.If but account is stolen, information will be revealed.The data importing of leakage can be equipped with in the machine of the systems such as iphone, android, Firefox OS by the other side, thus causes note, the leakage of the information such as contact person.
Although current data ciphering method has multiple, such as RSA, DES, AES, RC4 etc., but current techniques is often only encrypted the data on this equipment by a kind of encryption technology, once a certain data are cracked, then this storage device or cloud store in other data be also cracked.
Therefore, prior art has yet to be improved and developed.
Summary of the invention
In view of above-mentioned the deficiencies in the prior art, the object of the present invention is to provide a kind of data processing method and the system thereof that adopt multi-enciphering, thus solve problem that is single to data cipher mode in prior art data backup procedure and that be easily cracked.
Technical scheme of the present invention is as follows:
Adopt a data processing method for multi-enciphering, wherein, described method comprises step:
A, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key;
B, mobile terminal receive the selection instruction of user, select whether carry out multi-enciphering to data to be backed up; When being, then first by cryptographic algorithm, the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for key carries out the second re-encryption by cryptographic algorithm to described data to be backed up; When no, then with described encryption key for key is encrypted described data to be backed up by cryptographic algorithm;
C, after completing the encryption to data to be backed up, by encryption after data upload to server.
The data processing method of described employing multi-enciphering, wherein, also comprises after described step C:
D, mobile terminal first receive the instruction of user's synchrodata, obtain and identify the checking verbal instructions of user, and then according to described checking verbal instructions, server determines whether that the Data Concurrent after by described mobile terminal encryption delivers to described mobile terminal;
E, mobile terminal are according to described checking verbal instructions determination decruption key and decipherment algorithm; When detecting that the data after described encryption are through multi-enciphering, then first to described decruption key carry out first heavily deciphering obtain first heavy expressly, then the data after described encryption are heavily deciphered for key carries out second with described first heavy plaintext; When no, then with described decruption key for described in double secret key encryption after decrypt data; Wherein, described first heavy plaintext is identical with the described first heavy ciphertext;
F, when completing the deciphering to the data of described encryption, by deciphering after the corresponding database of data importing mobile terminal, check the data after described deciphering for user.
The data processing method of described employing multi-enciphering, wherein, described steps A specifically comprises:
A1, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user;
A2, mobile terminal generate user identity identification code according to described verbal instructions, are uploaded onto the server by described user identity identification code;
A3, mobile terminal are according to the verbal instructions content determination cryptographic algorithm of user and encryption key.
The data processing method of described employing multi-enciphering, wherein, described step D specifically comprises:
D1, mobile terminal receive the instruction of user synchrodata, obtain and identify the checking verbal instructions of user;
D2, mobile terminal generate the authentication code of user according to described checking verbal instructions, and described authentication code are uploaded onto the server;
D3, when described authentication code is consistent with the user identity identification code generating user according to described verbal instructions, then the data after described encryption are sent to described mobile terminal.
The data processing method of described employing multi-enciphering, wherein, the verbal instructions of described user first obtains the binary coding corresponding with described verbal instructions content through HMM method, and generate a selective factor B for Choice encryption algorithm and the encryption key for enciphered data by described binary coding, then chaos initial value is generated, finally according to chaotic maps Choice encryption algorithm according to described selective factor B.
The data processing method of described employing multi-enciphering, wherein, when carrying out multi-enciphering in described step B be obtain mobile terminal equipment exclusive identification code and with the equipment exclusive identification code of mobile terminal for encryption key described in double secret key carries out the first re-encryption.
The data processing method of described employing multi-enciphering, wherein, is stored to server after the data after encryption described in described step C associate with the user identity identification code generated according to described verbal instructions.
Adopt a data handling system for multi-enciphering, wherein, comprising:
Gather and generation module, for receiving the instruction of user ID data, obtaining and identifying the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key;
Selecting and encrypting module, for receiving the selection instruction of user, selecting whether multi-enciphering is carried out to data to be backed up; When being, then first by cryptographic algorithm, the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for key carries out the second re-encryption by cryptographic algorithm to described data to be backed up; When no, then with described encryption key for key is encrypted described data to be backed up by cryptographic algorithm;
Upper transmission module, for after completing the encryption to data to be backed up, by the data upload after encryption to server.
The data handling system of described employing multi-enciphering, wherein, when selecting to be encrypted data to be backed up in described selection and encrypting module, be obtain described selection and encrypting module place mobile terminal equipment exclusive identification code and with described equipment exclusive identification code for encryption key described in double secret key carries out the first re-encryption.
The data handling system of described employing multi-enciphering, wherein, also comprises:
To when sending module, for receiving the instruction of user's synchrodata, obtaining and identifying the checking verbal instructions of user, then determining whether that the Data Concurrent after by described mobile terminal encryption delivers to described mobile terminal according to described checking verbal instructions;
Deciphering module, for according to described checking verbal instructions determination decruption key and decipherment algorithm; When detecting that the data after described encryption are through multi-enciphering, then first to described decruption key carry out first heavily deciphering obtain first heavy expressly, then the data after described encryption are heavily deciphered for key carries out second with described first heavy plaintext; When no, then with described decruption key for described in double secret key encryption after decrypt data; Wherein, described first heavy plaintext is identical with the described first heavy ciphertext;
Display module, for when completing the deciphering to the data of described encryption, by the corresponding database of mobile terminal at display module place described in the data importing after deciphering, checks the data after described deciphering for user.
A kind of data processing method and system thereof adopting multi-enciphering provided by the present invention, described method comprises step: mobile terminal receives the instruction of user ID data, obtain and identify the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key; Mobile terminal receives the selection instruction of user, selects whether carry out multi-enciphering to data to be backed up; When being, then first the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for data to be backed up described in double secret key carry out the second re-encryption; When no, then with described encryption key for data to be backed up described in double secret key are encrypted; After completing the encryption to data to be backed up, by the data upload after encryption to server.Due to the data treating backup can be selected whether to carry out multi-enciphering, drastically increase the fail safe of data message, even if leaking data can not be cracked easily and cause the leakage of individual privacy information.
Accompanying drawing explanation
Fig. 1 is the flow chart of the data processing method preferred embodiment of employing multi-enciphering of the present invention.
Fig. 2 is the particular flow sheet that cryptographic algorithm of the present invention and encryption key generate.
Fig. 3 is the structured flowchart of the preferred embodiment of the data handling system of employing multi-enciphering of the present invention.
Embodiment
The invention provides a kind of data processing method and the system thereof that adopt multi-enciphering, for making object of the present invention, technical scheme and effect clearly, clearly, developing simultaneously referring to accompanying drawing, the present invention is described in more detail for embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Refer to Fig. 1, Fig. 1 is the flow chart of the preferred embodiment of the data processing method of employing multi-enciphering of the present invention.As shown in Figure 1, the data processing method of described employing multi-enciphering, comprises the following steps:
Step S101, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key;
Step S102, mobile terminal receive the selection instruction of user, select whether carry out multi-enciphering to data to be backed up; When being, then first by cryptographic algorithm, the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for key carries out the second re-encryption by cryptographic algorithm to described data to be backed up; When no, then with described encryption key for key is encrypted described data to be backed up by cryptographic algorithm;
Step S103, after completing the encryption to data to be backed up, by encryption after data upload to server.
In the embodiment of the present invention, its main process is data encryption process.The mathematic sign of ciphering process is described below:
S={P, C, K, E, D};
Wherein, P is plaintext space, represents all plaintext set that may occur;
C is the cryptogram space, represents all ciphertext set that may occur;
K is key space, represents the variable element in cryptographic algorithm;
E is cryptographic algorithm, is made up of some formula, rule or program;
D is decipherment algorithm, and it is the inverse of cryptographic algorithm E;
As given key k, between each symbol, there is following relation: , after namely plaintext P being encrypted, obtain ciphertext C; Simultaneously , namely obtain expressly P to after ciphertext C deciphering.As with represent that E's is inverse, represent that D's is inverse, then have: and .Therefore, Encryption Design mainly determines E, D, k.
Embodiment further, user, before carrying out Backup Data operation, needs to carry out account registration and logon operation, specifically comprises: mobile terminal receives the operational order of user to server registration username and password for Backup Data; When carrying out data backup operation, mobile terminal receives the operational order input username and password game server of user.After user completes registration and logon operation, can start to carry out other operations to data to be backed up.
Embodiment further, as shown in Figure 2, described step S101 specifically comprises:
Step S201, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user;
Step S202, mobile terminal generate user identity identification code according to described verbal instructions, and are uploaded onto the server by described user identity identification code;
Step S203, mobile terminal are according to the verbal instructions content determination cryptographic algorithm of user and encryption key.
Obviously, need to determine cryptographic algorithm and encryption key before being encrypted data to be backed up.In present pre-ferred embodiments, be determine cryptographic algorithm and encryption key by obtaining the verbal instructions of user.In step s 201, obtain by the MIC equipment (as microphone) in mobile terminal and identify the verbal instructions of user.Need first to carry out preliminary treatment (as noise reduction, preemphasis, framing, windowing and end-point detection etc.) to voice signal in the process obtaining verbal instructions, then corresponding vocal print characteristic sequence is extracted (as extracted MFCC coefficient (Mel Frequency Cepstral Coefficents, i.e. mel-frequency cepstrum coefficient) and LPC cepstrum coefficient (Linear Prediction Cepstrum Coefficient, i.e. linear prediction residue error) etc., generate corresponding vector model).In step S202, then by vocal print characteristic sequence according to the recognition template in corresponding algorithm (as gauss hybrid models algorithm (GMM)) generate pattern identification, be used as to identify user identity identification code.
By described user speech password content determination cryptographic algorithm and encryption key in step S203, detailed process comprises: be first that described user speech password content is through HMM(Hidden Markov Model, i.e. hidden Markov model) method, be converted into the binary coding corresponding with described verbal instructions, and generate a selective factor B for Choice encryption algorithm and the encryption key for enciphered data by this binary coding, then chaos initial value is generated, finally according to chaotic maps determination cryptographic algorithm according to described selective factor B.Wherein chaotic maps mechanism adopts Logistic iterative formula, namely ; In formula, μ is controling parameters, and , n is natural number.Verified in research, when time, system is in chaos state, therefore chooses in present pre-ferred embodiments .
After completing said process, the real number set produced is processed into the pseudo random sequence be made up of integer through chaotic maps, as the foundation of Stochastic choice cryptographic algorithm.Now, corresponding chaos initial value X(0 is generated by selective factor B); Then utilize iterative formula iteration 100 times, obtain X(100); Get X(100 again) 4,5 after decimal point, 6 composition integer Y; Finally try to achieve Z=Y mod N, obtain the integer Z being less than N, wherein N is the number of cryptographic algorithm, and Z is exactly the tried to achieve pseudo random number in order to Choice encryption algorithm, the corresponding cryptographic algorithm 2 of such as 0 corresponding cryptographic algorithm 1,1, and the rest may be inferred; Wherein said cryptographic algorithm 1,2 ... N pre-determines well.
In step S203, mobile terminal is according to after the verbal instructions content determination cryptographic algorithm of user and encryption key, namely in step s 102, terminal use now can select to be by obtaining cryptographic algorithm in step S203 and encryption key is directly encrypted data to be backed up, also can select by first once encrypting obtain the first heavy ciphertext to obtaining cryptographic algorithm and encryption key in step S203, then with the first heavy ciphertext for data to be backed up described in double secret key carry out the second re-encryption.
During to described encryption keys, IMEI code (the International Mobile Equipment Identity of mobile terminal can be selected, mobile device international identity code, also can be described as equipment unique identifier) as the described encryption keys obtained in double secret key step S203.Mobile device international identity code, is made up of " electronics string number " 15 bit digital, it and every platform mobile phone one_to_one corresponding, and this yard is that the whole world is unique.Each mobile phone all will be endowed a globally unique sets of numbers after finishing assembly, and this number is delivered for use all by institute of the manufacturer of manufactured production record from producing to.Choose the key of IMEI code as described encryption key, the uniqueness of key can be guaranteed.This process is also equivalent to the operation of binding mobile phone, when choosing multi-enciphering mode, is then the data backup of binding mobile phone mode; When choosing non-multi-enciphering mode, then it is the data backup of not binding mobile phone mode.By step S102, mobile phone users can be selected whether to carry out multi-enciphering to improve the safe class of data to data to be backed up.
In present pre-ferred embodiments, chaotic maps method is adopted to encrypt one by one each byte in described data to be backed up.No matter whether choose multi-enciphering mode to be in step s 102 encrypted data to be backed up, the main object of its encryption is still data to be backed up, by being encrypted described data to be backed up, obtains the data after encrypting.The step adopting chaotic maps method to be encrypted described data to be backed up in step S102 and encryption key corresponding to this byte of byte-by-byte generation are encrypted, and are specially:
1) by the secret generating initial value X of enciphered data 1(0);
2) Logistic chaotic maps iterative formula iteration is utilized to try to achieve X 1000 times 1(1000);
3) X is got 1(1000) 4 after decimal point, 5,6 composition integer Y 1;
4) Z is tried to achieve 1=Y 1mod 256, obtains the integer Z being less than 256 1; Z 1tried to achieve exactly saves to first character the key be encrypted;
5) to X 1(1000) iteration 5 times again, repeats 3,4 steps, the Z tried to achieve 2exactly to the key that second byte is encrypted;
6) again to X 1(1005) iteration 5 times, repeats 3,4 steps, the Z tried to achieve 3exactly to the 3rd key that byte is encrypted;
7) the rest may be inferred, obtains the key be encrypted all bytes.
Like this, although are same cryptographic algorithm to data to be backed up, the key that each byte is encrypted is different, effectively prevent and cracks enciphered data by " frequency statistics method ".
After completing in step S203 the encryption treating Backup Data, by the data upload after encryption to server, and be associated with the described user identity identification code uploaded onto the server in step S202.Its realize function as " electronic tag ", show that the data of described encryption are specific to a certain user.
Embodiment further, as shown in Figure 1, after completing the upload operation of the data after to described encryption, also comprises in step S103:
Step S104, mobile terminal first receive the instruction of user's synchrodata, obtain and identify the checking verbal instructions of user, and then according to described checking verbal instructions, server determines whether that the Data Concurrent after by described mobile terminal encryption delivers to described mobile terminal;
Step S105, mobile terminal are according to described checking verbal instructions determination decruption key and decipherment algorithm; When detecting that the data after described encryption are through multi-enciphering, then first to described decruption key carry out first heavily deciphering obtain first heavy expressly, then the data of described encryption are heavily deciphered for key carries out second with described first heavy plaintext; When no, then with described decruption key for described in double secret key encryption after decrypt data; Wherein, described first heavy plaintext is identical with the described first heavy ciphertext;
Step S106, when completing the deciphering to the data of described encryption, by deciphering after the corresponding database of data importing mobile terminal, check the data after described deciphering for user.
In present pre-ferred embodiments, when user need data from server after synchronous described encryption time, need user input voice to verify password.After the operational order of mobile terminal reception user utilizes MIC equipment to receive the checking verbal instructions of user, first preliminary treatment is carried out (as noise reduction to checking verbal instructions, preemphasis, framing, windowing and end-point detection etc.), then corresponding vocal print characteristic sequence is extracted (as extracted MFCC coefficient and LPC cepstrum coefficient etc., generate corresponding vector model), again vocal print characteristic sequence is generated the voice to be measured being used for pattern matching according to corresponding algorithm (as gauss hybrid models algorithm (GMM)), finally the described user identity identification code generated in the voice described to be measured being used for pattern matching generated and step S202 is compared, decision making according to similarity criteria, carry out as utilized log likelihood measuring (the user identity identification code that the vocal print characteristic sequence template of voice to be measured and server end store is contrasted), when both phase knowledge and magnanimity reach the threshold value preset, then be judged to be this user, data after allowing it to extract described encryption, otherwise, refuse the extraction of this user to the data after described encryption.
Completing after the data extraction process process server, first equally speech recognition being carried out to pretreated checking phonetic order, obtaining the binary coding of corresponding text; Then mobile terminal obtains the encryption algorithm type used of the data after described encryption and the secret key of corresponding deciphering according to this binary coding; Sentencing user in the data after described encryption is again "Yes" or "No" to the result of the selection of multi-enciphering, if be "Yes", then obtain equipment exclusive identification code (IMEI code), utilize this IMEI value to carry out the operating process the same with cryptographic operation to the secret key of deciphering, otherwise directly carry out next step; Finally the data after the described encryption obtained from server are carried out byte-by-byte decryption oprerations, finally import obtaining clear data (also just counting described data to be backed up) after deciphering in the database of mobile terminal to be synchronized, data are presented to user.
By adopting Speaker Identification, automatic speech recognition and multi-enciphering mode, data to be backed up are processed, for user provides safe and effective user data backup method, even if user lost server end account, the enciphered message data being stored in server end are also not easily cracked.
Based on said method, present invention also offers a kind of data handling system adopting multi-enciphering, as shown in Figure 3, comprising:
Gather and generation module 210, for receiving the instruction of user ID data, obtaining and identifying the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key; As detailed above.
Selecting and encrypting module 220, for receiving the selection instruction of user, selecting whether multi-enciphering is carried out to data to be backed up; When being, then first by cryptographic algorithm, the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for key carries out the second re-encryption by cryptographic algorithm to described data to be backed up; When no, then with described encryption key for data to be backed up described in double secret key are encrypted; As detailed above.
Upper transmission module 230, for after completing the encryption to data to be backed up, by the data upload after encryption to server; As detailed above.
Embodiment further, the data handling system of described employing multi-enciphering also comprises:
Registering modules, for receiving the operational order of user to server registration username and password for Backup Data; As detailed above.
Login module, for when carrying out data backup operation, mobile terminal receives the operational order input username and password logon server of user; As detailed above.
Further, this system also comprises:
IMEI code obtain and encrypting module, for when needs carry out multi-enciphering, obtain selection and encrypting module 220 place mobile terminal equipment exclusive identification code and with described equipment exclusive identification code for encryption key described in double secret key carries out the first re-encryption; As detailed above.
Relating module, is stored to server after the data after described encryption being associated with the user identity identification code generating user according to described verbal instructions; As detailed above.
Embodiment further, as shown in Figure 3, the data handling system of described employing multi-enciphering also comprises:
To when sending module 240, for receiving the instruction of user's synchrodata, obtain and identify the checking verbal instructions of user, the user identity identification code comparison that then will store in the authentication code that generates of described checking verbal instructions and relating module; When described authentication code is consistent with user identity identification code, the data after described encryption are sent to mobile terminal;
Deciphering module 250, mobile terminal is according to described checking verbal instructions determination decruption key and decipherment algorithm; When detecting that the data after described encryption are through multi-enciphering, then first to described decruption key carry out first heavily deciphering obtain first heavy expressly, then the data after described encryption are heavily deciphered for key carries out second with described first heavy plaintext; When no, then with described decruption key for described in double secret key encryption after decrypt data; Wherein, described first heavy plaintext is identical with the described first heavy ciphertext;
Display module 260, for when completing the deciphering to the data of described encryption, by the corresponding database of mobile terminal at display module place described in the data importing after deciphering, checks the data after described deciphering for user.Wherein collection and generation module, selection and encrypting module, upper transmission module, Registering modules, login module, the acquisition of IMEI code and encrypting module, relating module, deciphering module and display module are arrange in the terminal in the present embodiment, and be arrange in the server to when sending module, also can correspondingly adjust the position of part of module according to actual needs simultaneously.
In sum, a kind of data processing method and system thereof adopting multi-enciphering provided by the present invention, described method comprises step: mobile terminal receives the instruction of user ID data, obtains and identifies the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key; Mobile terminal receives the selection instruction of user, selects whether carry out multi-enciphering to data to be backed up; When being, then first the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for data to be backed up described in double secret key carry out the second re-encryption; When no, then with described encryption key for data to be backed up described in double secret key are encrypted; After completing the encryption to data to be backed up, by the data upload after encryption to server.Due to the data treating backup can be selected whether to carry out multi-enciphering, drastically increase the fail safe of data message, even if leaking data can not be cracked easily and cause the leakage of individual privacy information.
Should be understood that, application of the present invention is not limited to above-mentioned citing, for those of ordinary skills, can be improved according to the above description or convert, and all these improve and convert the protection range that all should belong to claims of the present invention.

Claims (10)

1. adopt a data processing method for multi-enciphering, it is characterized in that, described method comprises step:
A, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key;
B, mobile terminal receive the selection instruction of user, select whether carry out multi-enciphering to data to be backed up; When being, then first by cryptographic algorithm, the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for key carries out the second re-encryption by cryptographic algorithm to described data to be backed up; When no, then with described encryption key for key is encrypted described data to be backed up by cryptographic algorithm;
C, after completing the encryption to data to be backed up, by encryption after data upload to server.
2. adopt the data processing method of multi-enciphering according to claim 1, it is characterized in that, also comprise after described step C:
D, mobile terminal first receive the instruction of user's synchrodata, obtain and identify the checking verbal instructions of user, and then according to described checking verbal instructions, server determines whether that the Data Concurrent after by described mobile terminal encryption delivers to described mobile terminal;
E, mobile terminal are according to described checking verbal instructions determination decruption key and decipherment algorithm; When detecting that the data after described encryption are through multi-enciphering, then first to described decruption key carry out first heavily deciphering obtain first heavy expressly, then the data after described encryption are heavily deciphered for key carries out second with described first heavy plaintext; When no, then with described decruption key for described in double secret key encryption after decrypt data; Wherein, described first heavy plaintext is identical with the described first heavy ciphertext;
F, when completing the deciphering to the data of described encryption, by deciphering after the corresponding database of data importing mobile terminal, check the data after described deciphering for user.
3. adopt the data processing method of multi-enciphering according to claim 1, it is characterized in that, described steps A specifically comprises:
A1, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user;
A2, mobile terminal generate user identity identification code according to described verbal instructions, are uploaded onto the server by described user identity identification code;
A3, mobile terminal are according to the verbal instructions content determination cryptographic algorithm of user and encryption key.
4. adopt the data processing method of multi-enciphering according to claim 2, it is characterized in that, described step D specifically comprises:
D1, mobile terminal receive the instruction of user synchrodata, obtain and identify the checking verbal instructions of user;
D2, mobile terminal generate the authentication code of user according to described checking verbal instructions, and described authentication code are uploaded onto the server;
D3, when described authentication code is consistent with the user identity identification code generating user according to described verbal instructions, then the data after described encryption are sent to described mobile terminal.
5. adopt the data processing method of multi-enciphering according to claim 3, it is characterized in that, the verbal instructions of described user first obtains the binary coding corresponding with described verbal instructions content through HMM method, and generate a selective factor B for Choice encryption algorithm and the encryption key for enciphered data by described binary coding, then chaos initial value is generated, finally according to chaotic maps Choice encryption algorithm according to described selective factor B.
6. adopt the data processing method of multi-enciphering according to claim 1, it is characterized in that, when carrying out multi-enciphering in described step B be obtain mobile terminal equipment exclusive identification code and with the equipment exclusive identification code of mobile terminal for encryption key described in double secret key carries out the first re-encryption.
7. adopt the data processing method of multi-enciphering according to claim 1, it is characterized in that, after the data after encryption described in described step C associate with the user identity identification code generated according to described verbal instructions, be stored to server.
8. adopt a data handling system for multi-enciphering, it is characterized in that, comprising:
Gather and generation module, for receiving the instruction of user ID data, obtaining and identifying the verbal instructions of user, and according to described verbal instructions determination cryptographic algorithm and encryption key;
Selecting and encrypting module, for receiving the selection instruction of user, selecting whether multi-enciphering is carried out to data to be backed up; When being, then first by cryptographic algorithm, the first re-encryption being carried out to described encryption key and obtains the first heavy ciphertext, then with the first heavy ciphertext for key carries out the second re-encryption by cryptographic algorithm to described data to be backed up; When no, then with described encryption key for key is encrypted described data to be backed up by cryptographic algorithm;
Upper transmission module, for after completing the encryption to data to be backed up, by the data upload after encryption to server.
9. adopt the data handling system of multi-enciphering according to claim 8, it is characterized in that, when selecting to be encrypted data to be backed up in described selection and encrypting module, be obtain described selection and encrypting module place mobile terminal equipment exclusive identification code and with described equipment exclusive identification code for encryption key described in double secret key carries out the first re-encryption.
10. adopt the data handling system of multi-enciphering according to claim 8, it is characterized in that, also comprise:
To when sending module, for receiving the instruction of user's synchrodata, obtaining and identifying the checking verbal instructions of user, then determining whether that the Data Concurrent after by described mobile terminal encryption delivers to described mobile terminal according to described checking verbal instructions;
Deciphering module, for according to described checking verbal instructions determination decruption key and decipherment algorithm; When detecting that the data after described encryption are through multi-enciphering, then first to described decruption key carry out first heavily deciphering obtain first heavy expressly, then the data after described encryption are heavily deciphered for key carries out second with described first heavy plaintext; When no, then with described decruption key for described in double secret key encryption after decrypt data; Wherein, described first heavy plaintext is identical with the described first heavy ciphertext;
Display module, for when completing the deciphering to the data of described encryption, by the corresponding database of mobile terminal at display module place described in the data importing after deciphering, checks the data after described deciphering for user.
CN201410096796.5A 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering Active CN104935429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410096796.5A CN104935429B (en) 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410096796.5A CN104935429B (en) 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering

Publications (2)

Publication Number Publication Date
CN104935429A true CN104935429A (en) 2015-09-23
CN104935429B CN104935429B (en) 2019-06-04

Family

ID=54122409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410096796.5A Active CN104935429B (en) 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering

Country Status (1)

Country Link
CN (1) CN104935429B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471900A (en) * 2015-12-29 2016-04-06 畅捷通信息技术股份有限公司 Method and device for encrypting and decrypting data
CN105825133A (en) * 2016-03-09 2016-08-03 成都爆米花信息技术有限公司 Synchronous data storage method
CN105872964A (en) * 2016-03-24 2016-08-17 四川长虹电器股份有限公司 Intelligent terminal security management system
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus
CN109741761A (en) * 2019-03-13 2019-05-10 百度在线网络技术(北京)有限公司 Sound processing method and device
CN110380856A (en) * 2019-08-15 2019-10-25 Oppo(重庆)智能科技有限公司 Terminal device and its voice information processing method, device and storage medium
CN110446115A (en) * 2019-07-22 2019-11-12 腾讯科技(深圳)有限公司 Living broadcast interactive method, apparatus, electronic equipment and storage medium
WO2019214027A1 (en) * 2018-05-11 2019-11-14 吉林大学珠海学院 Sequential encryption and decryption method based on two-key stream cipher using singly linked list
CN110601836A (en) * 2019-10-10 2019-12-20 中国建设银行股份有限公司 Key acquisition method, device, server and medium
CN111007736A (en) * 2019-12-20 2020-04-14 阮振荣 Intelligent home system
CN111294642A (en) * 2018-12-10 2020-06-16 杭州海康威视数字技术股份有限公司 Video stream playing method and device
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device
CN112152802A (en) * 2020-09-09 2020-12-29 深圳市欢太科技有限公司 Data encryption method, electronic device and computer storage medium
CN113591138A (en) * 2021-09-30 2021-11-02 连连(杭州)信息技术有限公司 Service data processing method, device, equipment and medium
CN113761543A (en) * 2020-06-01 2021-12-07 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine readable medium based on alliance chain
CN114268425A (en) * 2021-12-21 2022-04-01 建信金融科技有限责任公司 Information encryption transmission method and device, electronic equipment and storage medium
CN115225409A (en) * 2022-08-31 2022-10-21 成都泛联智存科技有限公司 Cloud data safety deduplication method based on multi-backup joint verification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1947102A (en) * 2004-04-14 2007-04-11 松下电器产业株式会社 Terminal device and copyright protection system
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN101803415A (en) * 2007-09-18 2010-08-11 高通股份有限公司 Method and apparatus for creating a remotely activated secure backup service for mobile handsets
CN102422590A (en) * 2009-05-12 2012-04-18 赛贝斯股份有限公司 Protection of encryption keys in a database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1947102A (en) * 2004-04-14 2007-04-11 松下电器产业株式会社 Terminal device and copyright protection system
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN101803415A (en) * 2007-09-18 2010-08-11 高通股份有限公司 Method and apparatus for creating a remotely activated secure backup service for mobile handsets
CN102422590A (en) * 2009-05-12 2012-04-18 赛贝斯股份有限公司 Protection of encryption keys in a database

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471900A (en) * 2015-12-29 2016-04-06 畅捷通信息技术股份有限公司 Method and device for encrypting and decrypting data
CN105825133A (en) * 2016-03-09 2016-08-03 成都爆米花信息技术有限公司 Synchronous data storage method
CN105872964A (en) * 2016-03-24 2016-08-17 四川长虹电器股份有限公司 Intelligent terminal security management system
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus
WO2019214027A1 (en) * 2018-05-11 2019-11-14 吉林大学珠海学院 Sequential encryption and decryption method based on two-key stream cipher using singly linked list
US11082210B2 (en) 2018-05-11 2021-08-03 Zhuhai College Of Jilin University Method for sequentially encrypting and decrypting singly linked lists based on double key stream ciphers
CN111294642A (en) * 2018-12-10 2020-06-16 杭州海康威视数字技术股份有限公司 Video stream playing method and device
CN109741761A (en) * 2019-03-13 2019-05-10 百度在线网络技术(北京)有限公司 Sound processing method and device
CN110446115A (en) * 2019-07-22 2019-11-12 腾讯科技(深圳)有限公司 Living broadcast interactive method, apparatus, electronic equipment and storage medium
CN110446115B (en) * 2019-07-22 2021-10-15 腾讯科技(深圳)有限公司 Live broadcast interaction method and device, electronic equipment and storage medium
CN110380856A (en) * 2019-08-15 2019-10-25 Oppo(重庆)智能科技有限公司 Terminal device and its voice information processing method, device and storage medium
CN110601836A (en) * 2019-10-10 2019-12-20 中国建设银行股份有限公司 Key acquisition method, device, server and medium
CN110601836B (en) * 2019-10-10 2022-04-12 中国建设银行股份有限公司 Key acquisition method, device, server and medium
CN111007736A (en) * 2019-12-20 2020-04-14 阮振荣 Intelligent home system
CN113761543A (en) * 2020-06-01 2021-12-07 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine readable medium based on alliance chain
CN113761543B (en) * 2020-06-01 2024-04-02 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine-readable medium based on alliance chain
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device
CN112152802B (en) * 2020-09-09 2023-06-20 深圳市欢太科技有限公司 Data encryption method, electronic device and computer storage medium
CN112152802A (en) * 2020-09-09 2020-12-29 深圳市欢太科技有限公司 Data encryption method, electronic device and computer storage medium
CN113591138A (en) * 2021-09-30 2021-11-02 连连(杭州)信息技术有限公司 Service data processing method, device, equipment and medium
CN114268425A (en) * 2021-12-21 2022-04-01 建信金融科技有限责任公司 Information encryption transmission method and device, electronic equipment and storage medium
CN114268425B (en) * 2021-12-21 2023-06-02 建信金融科技有限责任公司 Information encryption transmission method, device, electronic equipment and storage medium
CN115225409A (en) * 2022-08-31 2022-10-21 成都泛联智存科技有限公司 Cloud data safety deduplication method based on multi-backup joint verification

Also Published As

Publication number Publication date
CN104935429B (en) 2019-06-04

Similar Documents

Publication Publication Date Title
CN104935429B (en) A kind of data processing method and its system using multi-enciphering
CN109040090B (en) A kind of data ciphering method and device
CN108667608B (en) Method, device and system for protecting data key
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN107733656A (en) A kind of cipher authentication method and device
CN102156843B (en) Data encryption method and system as well as data decryption method
CN106548353B (en) Commodity anti-counterfeiting code generation and verification method
US9882719B2 (en) Methods and systems for multi-factor authentication
CN111242611B (en) Method and system for recovering digital wallet key
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN103152157A (en) Secure encrypted method and relevant device
US20170076285A1 (en) Payment Method and Apparatus and Payment Factor Processing Method and Apparatus
CN111404682A (en) Android environment key segmentation processing method and device
CN110771190A (en) Controlling access to data
CN102571355A (en) Method and device for importing secret key without landing
CN104363087A (en) Encryption and decryption method and device
KR101358375B1 (en) Prevention security system and method for smishing
KR20190112959A (en) Operating method for machine learning model using encrypted data and apparatus based on machine learning model
WO2015196642A1 (en) Data encryption method, decryption method and device
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
US8769301B2 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN108234126B (en) System and method for remote account opening
CN105809494A (en) method and system for invoice generation and invoice verification
CN108512657B (en) Password generation method and device
CN105743859A (en) Method, device and system for authenticating light application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant