CN104935429B - A kind of data processing method and its system using multi-enciphering - Google Patents

A kind of data processing method and its system using multi-enciphering Download PDF

Info

Publication number
CN104935429B
CN104935429B CN201410096796.5A CN201410096796A CN104935429B CN 104935429 B CN104935429 B CN 104935429B CN 201410096796 A CN201410096796 A CN 201410096796A CN 104935429 B CN104935429 B CN 104935429B
Authority
CN
China
Prior art keywords
data
encryption
user
key
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410096796.5A
Other languages
Chinese (zh)
Other versions
CN104935429A (en
Inventor
龙秀萍
陈国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Corp
Original Assignee
TCL Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Corp filed Critical TCL Corp
Priority to CN201410096796.5A priority Critical patent/CN104935429B/en
Publication of CN104935429A publication Critical patent/CN104935429A/en
Application granted granted Critical
Publication of CN104935429B publication Critical patent/CN104935429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of data processing method and its system using multi-enciphering provided by the present invention, the method includes the steps: the instruction of mobile terminal reception user ID data, it obtains and identifies the verbal instructions of user, and determine Encryption Algorithm and encryption key according to the verbal instructions;Mobile terminal receives the selection instruction of user, chooses whether to carry out multi-enciphering to data to be backed up;When being, then the first re-encryption first is carried out to the encryption key and obtain the first heavy ciphertext, then carry out the second re-encryption by data to be backed up described in key pair of the first weight ciphertext;When no, then encrypted by data to be backed up described in key pair of the encryption key;After completing the encryption to data to be backed up, encrypted data are uploaded to server.Due to may be selected whether carry out multi-enciphering to data to be backed up, the safety of data information is greatly improved, even if leaking data can not be cracked easily and cause the leakage of individual privacy information.

Description

A kind of data processing method and its system using multi-enciphering
Technical field
The present invention relates to information security field more particularly to a kind of data processing method using multi-enciphering and its System.
Background technique
With becoming increasingly popular for smart machine, address list, the short message, multimedia message, equipment of user how are backed up safely, effectively The user data informations such as individual cultivation, mounted application, become a problem to be solved.Currently, smart machine User data backup method there are many kinds of, wherein most methods are all that data are stored in cloud.But if account is stolen, letter Breath will be revealed.Other side can import the data of leakage in the machine equipped with the systems such as iphone, android, Firefox OS, So as to cause short message, the leakage of the information such as contact person.
Although there are many current data ciphering methods, such as RSA, DES, AES, RC4 etc., current techniques often only The data in the equipment are encrypted with a kind of encryption technology, once a certain data are cracked, then the storage device or cloud are deposited Other data in storage are also cracked.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of data processings using multi-enciphering Method and its system, to solve that single to data encryption mode in prior art data backup procedure and what is be easily cracked asks Topic.
Technical scheme is as follows:
A kind of data processing method using multi-enciphering, wherein the method includes the steps:
A, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and according to described Verbal instructions determine Encryption Algorithm and encryption key;
B, mobile terminal receives the selection instruction of user, chooses whether to carry out multi-enciphering to data to be backed up;When being When, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtains the first heavy ciphertext, it is then close with the first weight Text is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then with the encryption key The data to be backed up are encrypted by Encryption Algorithm for key;
C, after completing the encryption to data to be backed up, encrypted data are uploaded to server.
The data processing method using multi-enciphering, wherein after the step C further include:
D, mobile terminal first receives the instruction of user's synchrodata, obtains and identify the verifying verbal instructions of user, then Server determines whether to send the encrypted Data Concurrent of the mobile terminal to the movement according to the verifying verbal instructions Terminal;
E, mobile terminal determines decruption key and decipherment algorithm according to the verifying verbal instructions;When detecting the encryption Data afterwards are then first to obtain the first weight in plain text to decruption key progress first again decryption by multi-enciphering, then right The encrypted data are that key progress second is decrypted again with first weight in plain text;When no, then with the decruption key It is decrypted for encrypted data described in key pair;Wherein, first weight is in plain text complete phase with the first weight ciphertext With;
F, when completing the decryption to the data of the encryption, the data after decryption are imported into the corresponding data of mobile terminal Library, so that user checks the data after the decryption.
The data processing method using multi-enciphering, wherein the step A is specifically included:
A1, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user;
A2, mobile terminal generate user identity identification code according to the verbal instructions, will be on the user identity identification code Reach server;
A3, mobile terminal determine Encryption Algorithm and encryption key according to the verbal instructions content of user.
The data processing method using multi-enciphering, wherein the step D is specifically included:
D1, mobile terminal receive the instruction of user's synchrodata, obtain and identify the verifying verbal instructions of user;
D2, mobile terminal generate the authentication code of user according to the verifying verbal instructions, and by the authentication Code is uploaded to server;
D3, when the authentication code with according to the verbal instructions generate the user identity identification code of user it is consistent when, The encrypted data are then sent to the mobile terminal.
The data processing method using multi-enciphering, wherein the verbal instructions of the user first pass through HMM method and obtain One is generated for selecting encryption to calculate to binary coding corresponding with the verbal instructions content, and by the binary coding Then the selective factor B of method and encryption key for encryption data generate chaos initial value according to the selective factor B, finally Encryption Algorithm is selected according to chaotic maps.
The data processing method using multi-enciphering, wherein carry out being to obtain to move when multi-enciphering in the step B The equipment exclusive identification code of dynamic terminal and be the progress of encryption key described in key pair the using the equipment exclusive identification code of mobile terminal One re-encryption.
The data processing method using multi-enciphering, wherein encrypted data and basis described in the step C It stores after the user identity identification code association that the verbal instructions generate to server.
A kind of data processing system using multi-enciphering, wherein include:
Acquisition and generation module obtain and identify the verbal instructions of user for receiving the instruction of user ID data, and Encryption Algorithm and encryption key are determined according to the verbal instructions;
Selection and encrypting module choose whether to carry out data to be backed up multiple for receiving the selection instruction of user Encryption;When being, then first to the encryption key by Encryption Algorithm carry out the first re-encryption obtain the first heavy ciphertext, then with First weight ciphertext is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then with described Encryption key is that key encrypts the data to be backed up by Encryption Algorithm;
Uploading module, for after completing the encryption to data to be backed up, encrypted data to be uploaded to server.
The data processing system using multi-enciphering, wherein selection is to be backed up in the selection and encrypting module Data when being encrypted, be the equipment exclusive identification code of mobile terminal where obtaining the selection and encrypting module and with described Equipment exclusive identification code is that encryption key described in key pair carries out the first re-encryption.
The data processing system using multi-enciphering, wherein further include:
To when sending module the verifying voice mouth of user is obtained and identified for receiving the instruction of user's synchrodata It enables, then determines whether to send the encrypted Data Concurrent of the mobile terminal to the movement according to the verifying verbal instructions Terminal;
Deciphering module, for determining decruption key and decipherment algorithm according to the verifying verbal instructions;It is described when detecting Encrypted data are then first to obtain the first weight in plain text to decruption key progress first again decryption, so by multi-enciphering It is afterwards in plain text that key progress second is decrypted again with first weight to the encrypted data;When no, then with the decryption Key is that encrypted data described in key pair are decrypted;Wherein, first weight has been in plain text with the first weight ciphertext Exactly the same;
Display module, for the data after decryption being imported described aobvious when completing the decryption to the data of the encryption The corresponding database of mobile terminal where showing module, so that user checks the data after the decryption.
A kind of data processing method and its system using multi-enciphering provided by the present invention, the method includes steps Rapid: mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and according to the verbal instructions Determine Encryption Algorithm and encryption key;Mobile terminal receives the selection instruction of user, chooses whether to carry out data to be backed up Multi-enciphering;When being, then the first re-encryption first is carried out to the encryption key and obtain the first heavy ciphertext, it is then close with the first weight Text is that data to be backed up described in key pair carry out the second re-encryption;When no, then using the encryption key as described in key pair Data to be backed up are encrypted;After completing the encryption to data to be backed up, encrypted data are uploaded to server. Due to may be selected whether carry out multi-enciphering to data to be backed up, the safety of data information is greatly improved, even if number The leakage of individual privacy information can not be cracked easily and caused according to leakage.
Detailed description of the invention
Fig. 1 is the flow chart of the data processing method preferred embodiment of the present invention using multi-enciphering.
Fig. 2 is Encryption Algorithm of the present invention and the specific flow chart that encryption key generates.
Fig. 3 is the structural block diagram of the preferred embodiment of the data processing system of the present invention using multi-enciphering.
Specific embodiment
The present invention provides a kind of data processing method and its system using multi-enciphering, to make the purpose of the present invention, skill Art scheme and effect are clearer, clear, and the present invention is described in more detail as follows in conjunction with drawings and embodiments.It should manage Solution, the specific embodiments described herein are merely illustrative of the present invention, is not intended to limit the present invention.
Referring to Figure 1, Fig. 1 is the process of the preferred embodiment of the data processing method of the present invention using multi-enciphering Figure.As shown in Figure 1, the data processing method using multi-enciphering, comprising the following steps:
Step S101, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and root Encryption Algorithm and encryption key are determined according to the verbal instructions;
Step S102, mobile terminal receives the selection instruction of user, chooses whether to carry out data to be backed up multiple add It is close;When being, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtain the first heavy ciphertext, then with the One weight ciphertext is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then added with described Key is that key encrypts the data to be backed up by Encryption Algorithm;
Step S103, after completing the encryption to data to be backed up, encrypted data are uploaded to server.
In the embodiment of the present invention, main process is data encryption process.The mathematic sign of ciphering process is described as follows:
S={P, C, K, E, D};
Wherein, P is plaintext space, indicates all plaintext set being likely to occur;
C is the cryptogram space, indicates all ciphertext set being likely to occur;
K is key space, indicates the variable element in Encryption Algorithm;
E is Encryption Algorithm, is made of some formula, rule or program;
D is decipherment algorithm, it is the inverse of Encryption Algorithm E;
As given key k, there is following relationship between each symbol:, i.e., ciphertext is obtained after encrypting to plaintext P C;Simultaneously, i.e., plaintext P is obtained after decrypting to ciphertext C.Such as useIndicate that E's is inverse,It indicates that D's is inverse, then has:And.Therefore, Encryption Design mainly determines E, D, k.
Example is further carried out, user needs to carry out account registration and logon operation before carrying out Backup Data operation, tool Body includes: that the operational order of mobile terminal reception user is used for the username and password of Backup Data to server registration one; When that need to carry out data backup operation, the operational order that mobile terminal receives user inputs username and password game server. After user completes registration and logon operation, it can start to carry out other operations to data to be backed up.
Example is further carried out, as shown in Fig. 2, the step S101 is specifically included:
Step S201, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user;
Step S202, mobile terminal generates user identity identification code according to the verbal instructions, and by the user identity Identification code is uploaded to server;
Step S203, mobile terminal determines Encryption Algorithm and encryption key according to the verbal instructions content of user.
Obviously, it needs to be determined that Encryption Algorithm and encryption key before being encrypted to data to be backed up.The present invention compared with It is to determine Encryption Algorithm and encryption key by obtaining the verbal instructions of user in good embodiment.In step s 201, lead to The MIC equipment (such as microphone) crossed in mobile terminal obtains and identifies the verbal instructions of user.In the mistake for obtaining verbal instructions Cheng Zhongxu is pre-processed (such as noise reduction, preemphasis, framing, adding window and end-point detection) to voice signal first, is then extracted Corresponding vocal print feature sequence is (as extracted MFCC coefficient (Mel Frequency Cepstral Coefficents, i.e. Meier frequency Rate cepstrum coefficient) and LPC cepstrum coefficient (Linear Prediction Cepstrum Coefficient, i.e. linear prediction are fallen Spectral coefficient) etc., generate corresponding vector model).It is (such as high according to corresponding algorithm in step S202, then by vocal print feature sequence This mixed model algorithm (GMM)) generate pattern-recognition in recognition template, be used as identification user identity identification code.
Encryption Algorithm and encryption key, detailed process packet are determined by the user speech password content in step S203 Include: being the user speech password content first by HMM(Hidden Markov Model, i.e. hidden Markov model) side Method is converted into binary coding corresponding with the verbal instructions, and generates one for selecting encryption by the binary coding Then the selective factor B of algorithm and encryption key for encryption data generate chaos initial value according to the selective factor B, most Encryption Algorithm is determined according to chaotic maps afterwards.Wherein chaotic maps mechanism uses Logistic iterative formula, i.e.,;μ is control parameter in formula, and, n For natural number.It has been proved that working as in researchWhen, system is in chaos state, therefore the present invention is preferably real It applies in example and chooses
After completing the above process, the real number set generated by chaotic maps is processed into the pseudorandom sequence being made of integer Column, the foundation as random selection Encryption Algorithm.At this point, generating corresponding chaos initial value X(0 by selective factor B);Then sharp With iterative formula iteration 100 times, X(100 is obtained);X(100 is taken again) 4,5,6 composition integer Y after decimal point;Finally acquire Z=Y mod N obtains the integer Z less than N, and wherein N is the number of Encryption Algorithm, and Z is exactly obtained to select encryption to calculate The pseudo random number of method, such as the 0 corresponding corresponding Encryption Algorithm 2 of Encryption Algorithm 1,1, and so on;The wherein Encryption Algorithm 1, 2 ... N are to predefine well.
After mobile terminal determines Encryption Algorithm and encryption key according to the verbal instructions content of user in step S203, Namely in step s 102, terminal user may be selected to be by obtaining Encryption Algorithm in step S203 and encryption key is straight at this time It connects and data to be backed up is encrypted, first carried out alternatively by obtaining Encryption Algorithm and encryption key in step S203 Primary encryption obtains the first heavy ciphertext, then carries out second as data to be backed up described in key pair using the first weight ciphertext and adds again It is close.
When to the encryption keys, IMEI code (the International Mobile of mobile terminal can be selected Equipment Identity, mobile device international identity code, alternatively referred to as equipment unique identifier) it is used as key pair step The encryption keys obtained in S203.Mobile device international identity code, " the electronics string number " being made of 15 bit digitals, It is corresponded with every mobile phone, and the code is that the whole world is unique.Each mobile phone will be all endowed after finishing assembly One globally unique sets of numbers, this number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.Choosing IMEI code is taken to can ensure that the uniqueness of key as the key of the encryption key.This process also corresponds to the behaviour of binding mobile phone Make, is then the data backup for binding mobile phone mode when choosing multi-enciphering mode;It is then not when choosing non-multi-enciphering mode Bind the data backup of mobile phone mode.By step S102, mobile terminal user may choose whether to carry out data to be backed up Multi-enciphering improves the security levels of data.
In present pre-ferred embodiments, each byte in the data to be backed up is added one by one using chaotic maps method It is close.Data to be backed up are encrypted in spite of selection multi-enciphering mode in step s 102, what is encrypted is main right As being still data to be backed up, by the way that the data to be backed up are encrypted, encrypted data are obtained.Step The i.e. byte-by-byte generation byte of the step of being encrypted using chaotic maps method to the data to be backed up in S102 is corresponding Encryption key is encrypted, specifically:
1) initial value X is generated by the key of encryption data1(0);
2) X is acquired using Logistic chaotic maps iterative formula iteration 1000 times1(1000);
3) X is taken1(1000) 4 after decimal point, 5,6 composition integer Y1
4) Z is acquired1=Y1Mod 256 obtains the integer Z less than 2561;Z1Be exactly it is obtained to first character section into The key of row encryption;
5) to X1(1000) iteration 5 times again repeat 3,4 steps, the Z acquired2Exactly second byte is encrypted close Key;
6) again to X1(1005) iteration 5 times repeat 3,4 steps, the Z acquired3Exactly third byte is encrypted close Key;
7) the rest may be inferred, obtains the key encrypted to all bytes.
Although each byte is encrypted close in this way, to data to be backed up being same Encryption Algorithm Key is different, effectively prevents cracking encryption data by " frequency statistics method ".
After the encryption of Backup Data is treated in step S203 completion, encrypted data are uploaded to server, and with The user identity identification code that server is uploaded in step S202 establishes association.The function that it is realized is as " electronic tag ", show that the data of the encryption are specific to a certain user.
Example is further carried out, as shown in Figure 1, completing the upload operation to the encrypted data in step S103 Afterwards, further includes:
Step S104, mobile terminal first receives the instruction of user's synchrodata, obtains and identify the verifying voice mouth of user It enables, then server determines whether to send the encrypted Data Concurrent of the mobile terminal to institute according to the verifying verbal instructions State mobile terminal;
Step S105, mobile terminal determines decruption key and decipherment algorithm according to the verifying verbal instructions;When detecting The encrypted data are that it is bright then first to obtain the first weight to decruption key progress first again decryption by multi-enciphering Then text is that key progress second is decrypted again with first weight to the data of the encryption in plain text;When no, then with the solution Key is that encrypted data described in key pair are decrypted;Wherein, first weight is in plain text with the first weight ciphertext It is identical;
Step S106, when completing the decryption to the data of the encryption, the data after decryption are imported into mobile terminal phase The database answered, so that user checks the data after the decryption.
In present pre-ferred embodiments, when user need to synchronize the encrypted data from server, user is needed Input speech verification password.When the operational order that mobile terminal receives user utilizes the verifying voice mouth of MIC equipment reception user After order, (such as noise reduction, preemphasis, framing, adding window and end-point detection) is pre-processed to verifying verbal instructions first, is then mentioned It takes corresponding vocal print feature sequence (such as extraction MFCC coefficient and LPC cepstrum coefficient generate corresponding vector model), then by vocal print Characteristic sequence generates the voice to be measured for being used for pattern match according to corresponding algorithm (such as gauss hybrid models algorithm (GMM)), most The user identity identification code generated in the voice to be measured for being used for pattern match of generation and step S202 is carried out afterwards It compares, is decision making according to similarity criteria, such as measured using log likelihood (by the vocal print feature sequence of voice to be measured Template and the user identity identification code of server end storage compare), when the two phase knowledge and magnanimity reach preset threshold value, then It is determined as the user, allows it to extract the encrypted data and otherwise refuse the user and the encrypted data are mentioned It takes.
It is completing after the data extraction process process on server, it is first same to pretreated verifying phonetic order Speech recognition is carried out, the binary coding of corresponding text is obtained;Then mobile terminal obtains described add according to the binary coding Encryption algorithm type used in data after close and corresponding decryption code key;User is sentenced in the encrypted data again to multiple The result of encryption selected is that "Yes" or "No" obtain equipment exclusive identification code (IMEI code), utilize this if it is "Yes" IMEI value carries out the operating process as cryptographic operation to decryption code key, otherwise directly carries out in next step;It finally will be from service The encrypted data that device obtains carry out byte-by-byte decryption oprerations, and clear data will be finally obtained after decryption (also with regard to several institutes State data to be backed up) it imports in the database of mobile terminal to be synchronized, data are presented to the user.
By using Speaker Identification, automatic speech recognition and multi-enciphering mode to data to be backed up at Reason, provides safe and effective user data backup method for user, even if user is lost server end account, is stored in clothes The encryption information data at business device end are also not easy to be cracked.
Based on the above method, the present invention also provides a kind of data processing systems using multi-enciphering, as shown in figure 3, Include:
Acquisition and generation module 210 for receiving the instruction of user ID data obtain and identify the voice mouth of user It enables, and determines Encryption Algorithm and encryption key according to the verbal instructions;As detailed above.
Selection and encrypting module 220 choose whether to carry out data to be backed up more for receiving the selection instruction of user Re-encryption;When being, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtain the first heavy ciphertext, then The second re-encryption is carried out to the data to be backed up by Encryption Algorithm using the first weight ciphertext as key;When no, then with institute Stating encryption key is that data to be backed up described in key pair are encrypted;As detailed above.
Uploading module 230, for after completing the encryption to data to be backed up, encrypted data to be uploaded to service Device;As detailed above.
Further carry out example, the data processing system using multi-enciphering further include:
Registration module, for receive the operational order of user to server registration one for the user name of Backup Data and Password;As detailed above.
Login module, for when that need to carry out data backup operation, the operational order that mobile terminal receives user to input use Name in an account book and password login server;As detailed above.
Further, the system further include:
IMEI code obtains and encrypting module, for obtaining selection and 220 institute of encrypting module when needing to carry out multi-enciphering Mobile terminal equipment exclusive identification code and using the equipment exclusive identification code as encryption key described in key pair carry out first Re-encryption;As detailed above.
Relating module, for knowing the encrypted data with the user identity for generating user according to the verbal instructions It stores after other code association to server;As detailed above.
Example is further carried out, as shown in figure 3, the data processing system using multi-enciphering further include:
To when sending module 240 the verifying voice of user is obtained and identified for receiving the instruction of user's synchrodata Password, the user identity identification code ratio that then will be stored in the authentication code of the verifying verbal instructions generation and relating module It is right;When the authentication code is consistent with user identity identification code, the encrypted data are sent to mobile terminal;
Deciphering module 250, mobile terminal determine decruption key and decipherment algorithm according to the verifying verbal instructions;Work as detection It is that it is bright that the first weight first then is obtained to decruption key progress first again decryption by multi-enciphering to the encrypted data Then text is that key progress second is decrypted again with first weight to the encrypted data in plain text;When no, then with described Decruption key is that encrypted data described in key pair are decrypted;Wherein, the first weight plaintext and the described first heavy ciphertext It is identical;
Display module 260, for when completing to the decryption of the data of the encryption, the data after decryption are imported described in The corresponding database of mobile terminal where display module, so that user checks the data after the decryption.It wherein acquires and raw At module, selection and encrypting module, uploading module, registration module, login module, IMEI code obtains and encrypting module, association mould Block, deciphering module and display module be in the present embodiment be arranged in the terminal, and to when sending module be setting exist In server, while the position of part of module correspondingly can also be adjusted according to actual needs.
In conclusion a kind of data processing method and its system using multi-enciphering provided by the present invention, the side Method comprising steps of mobile terminal receive user ID data instruction, obtain and identify the verbal instructions of user, and according to described Verbal instructions determine Encryption Algorithm and encryption key;Mobile terminal receives the selection instruction of user, chooses whether to be backed up Data carry out multi-enciphering;When being, then first to the encryption key carry out the first re-encryption obtain the first heavy ciphertext, then with First weight ciphertext is that data to be backed up described in key pair carry out the second re-encryption;It is then close with the encryption key when no Key encrypts the data to be backed up;After completing the encryption to data to be backed up, encrypted data are uploaded To server.Due to may be selected whether carry out multi-enciphering to data to be backed up, the safety of data information is greatly improved Property, even if leaking data can not be cracked easily and cause the leakage of individual privacy information.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can With improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present invention Protect range.

Claims (8)

1. a kind of data processing method using multi-enciphering, which is characterized in that the method includes the steps:
A, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and according to the voice Password determines Encryption Algorithm and encryption key;
B, mobile terminal receives the selection instruction of user, chooses whether to carry out multi-enciphering to data to be backed up;When being, then The first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtains the first heavy ciphertext, is then close with the first weight ciphertext Key carries out the second re-encryption to the data to be backed up by Encryption Algorithm;When no, then using the encryption key as key The data to be backed up are encrypted by Encryption Algorithm;
C, after completing the encryption to data to be backed up, encrypted data are uploaded to server;
The step A is specifically included:
A1, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user, and therefrom extract vocal print Characteristic sequence;
A2, mobile terminal generate user identity identification code according to the vocal print feature sequence in the verbal instructions, by the user Identity code is uploaded to server;
A3, mobile terminal determine Encryption Algorithm and encryption key according to the verbal instructions content of user;
The verbal instructions of the user first pass through HMM method and obtain binary coding corresponding with the verbal instructions content, and One is generated for selecting the selective factor B of Encryption Algorithm and for the encryption key of encryption data, so by the binary coding Chaos initial value is generated according to the selective factor B afterwards, finally selects Encryption Algorithm according to chaotic maps;
In the step B, the data to be backed up are encrypted using chaotic maps method, and byte-by-byte generation byte Corresponding encryption key is simultaneously encrypted, so that the key of each byte encryption is different.
2. using the data processing method of multi-enciphering according to claim 1, which is characterized in that after the step C also Include:
D, mobile terminal first receives the instruction of user's synchrodata, obtains and identifies the verifying verbal instructions of user, then service Device determines whether to send the encrypted Data Concurrent of the mobile terminal to the mobile terminal according to the verifying verbal instructions;
E, mobile terminal determines decruption key and decipherment algorithm according to the verifying verbal instructions;It is described encrypted when detecting Data are then first the first weight to be obtained in plain text to decruption key progress first again decryption, then to described by multi-enciphering Encrypted data are that key progress second is decrypted again with first weight in plain text;It is then close with the decruption key when no The encrypted data are decrypted in key;Wherein, first weight is in plain text identical with the first weight ciphertext;
F, when completing the decryption to the data of the encryption, the data after decryption are imported into the corresponding database of mobile terminal, So that user checks the data after the decryption.
3. using the data processing method of multi-enciphering according to claim 2, which is characterized in that the step D is specifically wrapped It includes:
D1, mobile terminal receive the instruction of user's synchrodata, obtain and identify the verifying verbal instructions of user;
D2, mobile terminal generate the authentication code of user according to the verifying verbal instructions, and will be in the authentication code Reach server;
D3, when the authentication code with according to the verbal instructions generate the user identity identification code of user it is consistent when, then will The encrypted data are sent to the mobile terminal.
4. using the data processing method of multi-enciphering according to claim 1, which is characterized in that carried out in the step B It is to obtain the equipment exclusive identification code of mobile terminal and using the equipment exclusive identification code of mobile terminal as key pair when multi-enciphering The encryption key carries out the first re-encryption.
5. using the data processing method of multi-enciphering according to claim 1, which is characterized in that described in the step C Encrypted data store after being associated with the user identity identification code generated according to the verbal instructions to server.
6. a kind of data processing system using multi-enciphering characterized by comprising
Acquisition and generation module for receiving the instruction of user ID data obtain and identify the verbal instructions of user, Cong Zhongti Vocal print feature sequence is taken, and Encryption Algorithm and encryption key are determined according to the vocal print feature sequence in the verbal instructions;
Selection and encrypting module choose whether to carry out multi-enciphering to data to be backed up for receiving the selection instruction of user; When being, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtain the first heavy ciphertext, then with first Weight ciphertext is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then with the encryption Key is that key encrypts the data to be backed up by Encryption Algorithm;
Uploading module, for after completing the encryption to data to be backed up, encrypted data to be uploaded to server;
The acquisition and generation module are specifically used for, and the verbal instructions of the user are first passed through HMM method and are obtained and institute's predicate The corresponding binary coding of sound password content, and by the binary coding generate one for select the selection of Encryption Algorithm because Encryption key and for encryption data, then generates chaos initial value according to the selective factor B, is finally reflected according to chaos Penetrate selection Encryption Algorithm;
The selection and encrypting module are specifically used for, and are encrypted using chaotic maps method to the data to be backed up, and by Byte generates the corresponding encryption key of the byte and is encrypted, so that the key of each byte encryption is different.
7. using the data processing system of multi-enciphering according to claim 6, which is characterized in that the selection and encryption mould Selection is when encrypting data to be backed up in block, be the equipment of mobile terminal where obtaining the selection and encrypting module only One identification code simultaneously carries out the first re-encryption by encryption key described in key pair of the equipment exclusive identification code.
8. using the data processing system of multi-enciphering according to claim 7, which is characterized in that further include:
To when sending module the verifying verbal instructions of user are obtained and identified, so for receiving the instruction of user's synchrodata Determine whether to send the encrypted Data Concurrent of the mobile terminal to the mobile terminal according to the verifying verbal instructions afterwards;
Deciphering module, for determining decruption key and decipherment algorithm according to the verifying verbal instructions;When detecting the encryption Data afterwards are then first to obtain the first weight in plain text to decruption key progress first again decryption by multi-enciphering, then right The encrypted data are that key progress second is decrypted again with first weight in plain text;When no, then with the decruption key It is decrypted for encrypted data described in key pair;Wherein, first weight is in plain text complete phase with the first weight ciphertext With;
Display module, for when completing the decryption to the data of the encryption, the data after decryption to be imported the display mould The corresponding database of mobile terminal where block, so that user checks the data after the decryption.
CN201410096796.5A 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering Active CN104935429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410096796.5A CN104935429B (en) 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410096796.5A CN104935429B (en) 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering

Publications (2)

Publication Number Publication Date
CN104935429A CN104935429A (en) 2015-09-23
CN104935429B true CN104935429B (en) 2019-06-04

Family

ID=54122409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410096796.5A Active CN104935429B (en) 2014-03-17 2014-03-17 A kind of data processing method and its system using multi-enciphering

Country Status (1)

Country Link
CN (1) CN104935429B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471900A (en) * 2015-12-29 2016-04-06 畅捷通信息技术股份有限公司 Method and device for encrypting and decrypting data
CN105825133A (en) * 2016-03-09 2016-08-03 成都爆米花信息技术有限公司 Synchronous data storage method
CN105872964A (en) * 2016-03-24 2016-08-17 四川长虹电器股份有限公司 Intelligent terminal security management system
CN106487517A (en) * 2016-09-30 2017-03-08 北京瑞卓喜投科技发展有限公司 data encryption and decryption method and device
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus
CN109194461B (en) 2018-05-11 2022-02-22 吉林大学 Single-direction linked list sequence encryption and decryption method based on double-key stream cipher
CN111294642B (en) * 2018-12-10 2021-06-18 杭州海康威视数字技术股份有限公司 Video stream playing method and device
CN109741761B (en) * 2019-03-13 2020-09-25 百度在线网络技术(北京)有限公司 Sound processing method and device
CN110446115B (en) * 2019-07-22 2021-10-15 腾讯科技(深圳)有限公司 Live broadcast interaction method and device, electronic equipment and storage medium
CN110380856B (en) * 2019-08-15 2023-04-18 Oppo(重庆)智能科技有限公司 Terminal device and voice information processing method and device thereof, and storage medium
CN110601836B (en) * 2019-10-10 2022-04-12 中国建设银行股份有限公司 Key acquisition method, device, server and medium
CN111007736A (en) * 2019-12-20 2020-04-14 阮振荣 Intelligent home system
CN113761543B (en) * 2020-06-01 2024-04-02 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine-readable medium based on alliance chain
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device
CN112152802B (en) * 2020-09-09 2023-06-20 深圳市欢太科技有限公司 Data encryption method, electronic device and computer storage medium
CN113591138A (en) * 2021-09-30 2021-11-02 连连(杭州)信息技术有限公司 Service data processing method, device, equipment and medium
CN114268425B (en) * 2021-12-21 2023-06-02 建信金融科技有限责任公司 Information encryption transmission method, device, electronic equipment and storage medium
CN115225409B (en) * 2022-08-31 2022-12-06 成都泛联智存科技有限公司 Cloud data safety duplicate removal method based on multi-backup joint verification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1947102A (en) * 2004-04-14 2007-04-11 松下电器产业株式会社 Terminal device and copyright protection system
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN101803415A (en) * 2007-09-18 2010-08-11 高通股份有限公司 Method and apparatus for creating a remotely activated secure backup service for mobile handsets
CN102422590A (en) * 2009-05-12 2012-04-18 赛贝斯股份有限公司 Protection of encryption keys in a database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1947102A (en) * 2004-04-14 2007-04-11 松下电器产业株式会社 Terminal device and copyright protection system
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN101803415A (en) * 2007-09-18 2010-08-11 高通股份有限公司 Method and apparatus for creating a remotely activated secure backup service for mobile handsets
CN102422590A (en) * 2009-05-12 2012-04-18 赛贝斯股份有限公司 Protection of encryption keys in a database

Also Published As

Publication number Publication date
CN104935429A (en) 2015-09-23

Similar Documents

Publication Publication Date Title
CN104935429B (en) A kind of data processing method and its system using multi-enciphering
CN109040090B (en) A kind of data ciphering method and device
US8959357B2 (en) Biometric encryption and key generation
WO2019101240A3 (en) Authentication based on a recoverd public key
CN111984978B (en) High-expansibility password encryption storage method
JP6594349B2 (en) Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information
CN104158664A (en) Identity authentication method and system
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN110933109B (en) Dynamic small program authentication method and device
US20160253510A1 (en) Method for security authentication and apparatus therefor
CN107944234B (en) Machine refreshing control method for Android equipment
CN111242611A (en) Method and system for recovering digital wallet key
KR102274132B1 (en) User authentication server that performs verification of electronic signature data generated based on biometric authentication in association with a plurality of verification servers and operating method thereof
CN102571357A (en) Signature realization method and signature realization device
CN102156843A (en) Data encryption method and system as well as data decryption method
CN104424419A (en) Encrypting and decrypting method and system based on voiceprint recognition technology
KR20190112959A (en) Operating method for machine learning model using encrypted data and apparatus based on machine learning model
CN102855427B (en) A kind of equipment unlock method, device and subscriber equipment
WO2015196642A1 (en) Data encryption method, decryption method and device
CN104102858B (en) Application program cipher processing method, device and terminal
KR101480889B1 (en) Virtual keyboard generating device and method for user authentication
CN108512657B (en) Password generation method and device
CN105743859A (en) Method, device and system for authenticating light application
CN105809063B (en) A kind of data processing method and safety chip device
CN114637985A (en) Android application login counterfeiting identification method based on multi-environment parameters

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant