CN104935429B - A kind of data processing method and its system using multi-enciphering - Google Patents
A kind of data processing method and its system using multi-enciphering Download PDFInfo
- Publication number
- CN104935429B CN104935429B CN201410096796.5A CN201410096796A CN104935429B CN 104935429 B CN104935429 B CN 104935429B CN 201410096796 A CN201410096796 A CN 201410096796A CN 104935429 B CN104935429 B CN 104935429B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- user
- key
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of data processing method and its system using multi-enciphering provided by the present invention, the method includes the steps: the instruction of mobile terminal reception user ID data, it obtains and identifies the verbal instructions of user, and determine Encryption Algorithm and encryption key according to the verbal instructions;Mobile terminal receives the selection instruction of user, chooses whether to carry out multi-enciphering to data to be backed up;When being, then the first re-encryption first is carried out to the encryption key and obtain the first heavy ciphertext, then carry out the second re-encryption by data to be backed up described in key pair of the first weight ciphertext;When no, then encrypted by data to be backed up described in key pair of the encryption key;After completing the encryption to data to be backed up, encrypted data are uploaded to server.Due to may be selected whether carry out multi-enciphering to data to be backed up, the safety of data information is greatly improved, even if leaking data can not be cracked easily and cause the leakage of individual privacy information.
Description
Technical field
The present invention relates to information security field more particularly to a kind of data processing method using multi-enciphering and its
System.
Background technique
With becoming increasingly popular for smart machine, address list, the short message, multimedia message, equipment of user how are backed up safely, effectively
The user data informations such as individual cultivation, mounted application, become a problem to be solved.Currently, smart machine
User data backup method there are many kinds of, wherein most methods are all that data are stored in cloud.But if account is stolen, letter
Breath will be revealed.Other side can import the data of leakage in the machine equipped with the systems such as iphone, android, Firefox OS,
So as to cause short message, the leakage of the information such as contact person.
Although there are many current data ciphering methods, such as RSA, DES, AES, RC4 etc., current techniques often only
The data in the equipment are encrypted with a kind of encryption technology, once a certain data are cracked, then the storage device or cloud are deposited
Other data in storage are also cracked.
Therefore, the existing technology needs to be improved and developed.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of data processings using multi-enciphering
Method and its system, to solve that single to data encryption mode in prior art data backup procedure and what is be easily cracked asks
Topic.
Technical scheme is as follows:
A kind of data processing method using multi-enciphering, wherein the method includes the steps:
A, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and according to described
Verbal instructions determine Encryption Algorithm and encryption key;
B, mobile terminal receives the selection instruction of user, chooses whether to carry out multi-enciphering to data to be backed up;When being
When, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtains the first heavy ciphertext, it is then close with the first weight
Text is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then with the encryption key
The data to be backed up are encrypted by Encryption Algorithm for key;
C, after completing the encryption to data to be backed up, encrypted data are uploaded to server.
The data processing method using multi-enciphering, wherein after the step C further include:
D, mobile terminal first receives the instruction of user's synchrodata, obtains and identify the verifying verbal instructions of user, then
Server determines whether to send the encrypted Data Concurrent of the mobile terminal to the movement according to the verifying verbal instructions
Terminal;
E, mobile terminal determines decruption key and decipherment algorithm according to the verifying verbal instructions;When detecting the encryption
Data afterwards are then first to obtain the first weight in plain text to decruption key progress first again decryption by multi-enciphering, then right
The encrypted data are that key progress second is decrypted again with first weight in plain text;When no, then with the decruption key
It is decrypted for encrypted data described in key pair;Wherein, first weight is in plain text complete phase with the first weight ciphertext
With;
F, when completing the decryption to the data of the encryption, the data after decryption are imported into the corresponding data of mobile terminal
Library, so that user checks the data after the decryption.
The data processing method using multi-enciphering, wherein the step A is specifically included:
A1, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user;
A2, mobile terminal generate user identity identification code according to the verbal instructions, will be on the user identity identification code
Reach server;
A3, mobile terminal determine Encryption Algorithm and encryption key according to the verbal instructions content of user.
The data processing method using multi-enciphering, wherein the step D is specifically included:
D1, mobile terminal receive the instruction of user's synchrodata, obtain and identify the verifying verbal instructions of user;
D2, mobile terminal generate the authentication code of user according to the verifying verbal instructions, and by the authentication
Code is uploaded to server;
D3, when the authentication code with according to the verbal instructions generate the user identity identification code of user it is consistent when,
The encrypted data are then sent to the mobile terminal.
The data processing method using multi-enciphering, wherein the verbal instructions of the user first pass through HMM method and obtain
One is generated for selecting encryption to calculate to binary coding corresponding with the verbal instructions content, and by the binary coding
Then the selective factor B of method and encryption key for encryption data generate chaos initial value according to the selective factor B, finally
Encryption Algorithm is selected according to chaotic maps.
The data processing method using multi-enciphering, wherein carry out being to obtain to move when multi-enciphering in the step B
The equipment exclusive identification code of dynamic terminal and be the progress of encryption key described in key pair the using the equipment exclusive identification code of mobile terminal
One re-encryption.
The data processing method using multi-enciphering, wherein encrypted data and basis described in the step C
It stores after the user identity identification code association that the verbal instructions generate to server.
A kind of data processing system using multi-enciphering, wherein include:
Acquisition and generation module obtain and identify the verbal instructions of user for receiving the instruction of user ID data, and
Encryption Algorithm and encryption key are determined according to the verbal instructions;
Selection and encrypting module choose whether to carry out data to be backed up multiple for receiving the selection instruction of user
Encryption;When being, then first to the encryption key by Encryption Algorithm carry out the first re-encryption obtain the first heavy ciphertext, then with
First weight ciphertext is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then with described
Encryption key is that key encrypts the data to be backed up by Encryption Algorithm;
Uploading module, for after completing the encryption to data to be backed up, encrypted data to be uploaded to server.
The data processing system using multi-enciphering, wherein selection is to be backed up in the selection and encrypting module
Data when being encrypted, be the equipment exclusive identification code of mobile terminal where obtaining the selection and encrypting module and with described
Equipment exclusive identification code is that encryption key described in key pair carries out the first re-encryption.
The data processing system using multi-enciphering, wherein further include:
To when sending module the verifying voice mouth of user is obtained and identified for receiving the instruction of user's synchrodata
It enables, then determines whether to send the encrypted Data Concurrent of the mobile terminal to the movement according to the verifying verbal instructions
Terminal;
Deciphering module, for determining decruption key and decipherment algorithm according to the verifying verbal instructions;It is described when detecting
Encrypted data are then first to obtain the first weight in plain text to decruption key progress first again decryption, so by multi-enciphering
It is afterwards in plain text that key progress second is decrypted again with first weight to the encrypted data;When no, then with the decryption
Key is that encrypted data described in key pair are decrypted;Wherein, first weight has been in plain text with the first weight ciphertext
Exactly the same;
Display module, for the data after decryption being imported described aobvious when completing the decryption to the data of the encryption
The corresponding database of mobile terminal where showing module, so that user checks the data after the decryption.
A kind of data processing method and its system using multi-enciphering provided by the present invention, the method includes steps
Rapid: mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and according to the verbal instructions
Determine Encryption Algorithm and encryption key;Mobile terminal receives the selection instruction of user, chooses whether to carry out data to be backed up
Multi-enciphering;When being, then the first re-encryption first is carried out to the encryption key and obtain the first heavy ciphertext, it is then close with the first weight
Text is that data to be backed up described in key pair carry out the second re-encryption;When no, then using the encryption key as described in key pair
Data to be backed up are encrypted;After completing the encryption to data to be backed up, encrypted data are uploaded to server.
Due to may be selected whether carry out multi-enciphering to data to be backed up, the safety of data information is greatly improved, even if number
The leakage of individual privacy information can not be cracked easily and caused according to leakage.
Detailed description of the invention
Fig. 1 is the flow chart of the data processing method preferred embodiment of the present invention using multi-enciphering.
Fig. 2 is Encryption Algorithm of the present invention and the specific flow chart that encryption key generates.
Fig. 3 is the structural block diagram of the preferred embodiment of the data processing system of the present invention using multi-enciphering.
Specific embodiment
The present invention provides a kind of data processing method and its system using multi-enciphering, to make the purpose of the present invention, skill
Art scheme and effect are clearer, clear, and the present invention is described in more detail as follows in conjunction with drawings and embodiments.It should manage
Solution, the specific embodiments described herein are merely illustrative of the present invention, is not intended to limit the present invention.
Referring to Figure 1, Fig. 1 is the process of the preferred embodiment of the data processing method of the present invention using multi-enciphering
Figure.As shown in Figure 1, the data processing method using multi-enciphering, comprising the following steps:
Step S101, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and root
Encryption Algorithm and encryption key are determined according to the verbal instructions;
Step S102, mobile terminal receives the selection instruction of user, chooses whether to carry out data to be backed up multiple add
It is close;When being, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtain the first heavy ciphertext, then with the
One weight ciphertext is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then added with described
Key is that key encrypts the data to be backed up by Encryption Algorithm;
Step S103, after completing the encryption to data to be backed up, encrypted data are uploaded to server.
In the embodiment of the present invention, main process is data encryption process.The mathematic sign of ciphering process is described as follows:
S={P, C, K, E, D};
Wherein, P is plaintext space, indicates all plaintext set being likely to occur;
C is the cryptogram space, indicates all ciphertext set being likely to occur;
K is key space, indicates the variable element in Encryption Algorithm;
E is Encryption Algorithm, is made of some formula, rule or program;
D is decipherment algorithm, it is the inverse of Encryption Algorithm E;
As given key k, there is following relationship between each symbol:, i.e., ciphertext is obtained after encrypting to plaintext P
C;Simultaneously, i.e., plaintext P is obtained after decrypting to ciphertext C.Such as useIndicate that E's is inverse,It indicates that D's is inverse, then has:And.Therefore, Encryption Design mainly determines E, D, k.
Example is further carried out, user needs to carry out account registration and logon operation before carrying out Backup Data operation, tool
Body includes: that the operational order of mobile terminal reception user is used for the username and password of Backup Data to server registration one;
When that need to carry out data backup operation, the operational order that mobile terminal receives user inputs username and password game server.
After user completes registration and logon operation, it can start to carry out other operations to data to be backed up.
Example is further carried out, as shown in Fig. 2, the step S101 is specifically included:
Step S201, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user;
Step S202, mobile terminal generates user identity identification code according to the verbal instructions, and by the user identity
Identification code is uploaded to server;
Step S203, mobile terminal determines Encryption Algorithm and encryption key according to the verbal instructions content of user.
Obviously, it needs to be determined that Encryption Algorithm and encryption key before being encrypted to data to be backed up.The present invention compared with
It is to determine Encryption Algorithm and encryption key by obtaining the verbal instructions of user in good embodiment.In step s 201, lead to
The MIC equipment (such as microphone) crossed in mobile terminal obtains and identifies the verbal instructions of user.In the mistake for obtaining verbal instructions
Cheng Zhongxu is pre-processed (such as noise reduction, preemphasis, framing, adding window and end-point detection) to voice signal first, is then extracted
Corresponding vocal print feature sequence is (as extracted MFCC coefficient (Mel Frequency Cepstral Coefficents, i.e. Meier frequency
Rate cepstrum coefficient) and LPC cepstrum coefficient (Linear Prediction Cepstrum Coefficient, i.e. linear prediction are fallen
Spectral coefficient) etc., generate corresponding vector model).It is (such as high according to corresponding algorithm in step S202, then by vocal print feature sequence
This mixed model algorithm (GMM)) generate pattern-recognition in recognition template, be used as identification user identity identification code.
Encryption Algorithm and encryption key, detailed process packet are determined by the user speech password content in step S203
Include: being the user speech password content first by HMM(Hidden Markov Model, i.e. hidden Markov model) side
Method is converted into binary coding corresponding with the verbal instructions, and generates one for selecting encryption by the binary coding
Then the selective factor B of algorithm and encryption key for encryption data generate chaos initial value according to the selective factor B, most
Encryption Algorithm is determined according to chaotic maps afterwards.Wherein chaotic maps mechanism uses Logistic iterative formula, i.e.,;μ is control parameter in formula, and, n
For natural number.It has been proved that working as in researchWhen, system is in chaos state, therefore the present invention is preferably real
It applies in example and chooses。
After completing the above process, the real number set generated by chaotic maps is processed into the pseudorandom sequence being made of integer
Column, the foundation as random selection Encryption Algorithm.At this point, generating corresponding chaos initial value X(0 by selective factor B);Then sharp
With iterative formula iteration 100 times, X(100 is obtained);X(100 is taken again) 4,5,6 composition integer Y after decimal point;Finally acquire
Z=Y mod N obtains the integer Z less than N, and wherein N is the number of Encryption Algorithm, and Z is exactly obtained to select encryption to calculate
The pseudo random number of method, such as the 0 corresponding corresponding Encryption Algorithm 2 of Encryption Algorithm 1,1, and so on;The wherein Encryption Algorithm 1,
2 ... N are to predefine well.
After mobile terminal determines Encryption Algorithm and encryption key according to the verbal instructions content of user in step S203,
Namely in step s 102, terminal user may be selected to be by obtaining Encryption Algorithm in step S203 and encryption key is straight at this time
It connects and data to be backed up is encrypted, first carried out alternatively by obtaining Encryption Algorithm and encryption key in step S203
Primary encryption obtains the first heavy ciphertext, then carries out second as data to be backed up described in key pair using the first weight ciphertext and adds again
It is close.
When to the encryption keys, IMEI code (the International Mobile of mobile terminal can be selected
Equipment Identity, mobile device international identity code, alternatively referred to as equipment unique identifier) it is used as key pair step
The encryption keys obtained in S203.Mobile device international identity code, " the electronics string number " being made of 15 bit digitals,
It is corresponded with every mobile phone, and the code is that the whole world is unique.Each mobile phone will be all endowed after finishing assembly
One globally unique sets of numbers, this number will all be recorded from producing to being delivered for use by the manufacturer of manufacture production.Choosing
IMEI code is taken to can ensure that the uniqueness of key as the key of the encryption key.This process also corresponds to the behaviour of binding mobile phone
Make, is then the data backup for binding mobile phone mode when choosing multi-enciphering mode;It is then not when choosing non-multi-enciphering mode
Bind the data backup of mobile phone mode.By step S102, mobile terminal user may choose whether to carry out data to be backed up
Multi-enciphering improves the security levels of data.
In present pre-ferred embodiments, each byte in the data to be backed up is added one by one using chaotic maps method
It is close.Data to be backed up are encrypted in spite of selection multi-enciphering mode in step s 102, what is encrypted is main right
As being still data to be backed up, by the way that the data to be backed up are encrypted, encrypted data are obtained.Step
The i.e. byte-by-byte generation byte of the step of being encrypted using chaotic maps method to the data to be backed up in S102 is corresponding
Encryption key is encrypted, specifically:
1) initial value X is generated by the key of encryption data1(0);
2) X is acquired using Logistic chaotic maps iterative formula iteration 1000 times1(1000);
3) X is taken1(1000) 4 after decimal point, 5,6 composition integer Y1;
4) Z is acquired1=Y1Mod 256 obtains the integer Z less than 2561;Z1Be exactly it is obtained to first character section into
The key of row encryption;
5) to X1(1000) iteration 5 times again repeat 3,4 steps, the Z acquired2Exactly second byte is encrypted close
Key;
6) again to X1(1005) iteration 5 times repeat 3,4 steps, the Z acquired3Exactly third byte is encrypted close
Key;
7) the rest may be inferred, obtains the key encrypted to all bytes.
Although each byte is encrypted close in this way, to data to be backed up being same Encryption Algorithm
Key is different, effectively prevents cracking encryption data by " frequency statistics method ".
After the encryption of Backup Data is treated in step S203 completion, encrypted data are uploaded to server, and with
The user identity identification code that server is uploaded in step S202 establishes association.The function that it is realized is as " electronic tag
", show that the data of the encryption are specific to a certain user.
Example is further carried out, as shown in Figure 1, completing the upload operation to the encrypted data in step S103
Afterwards, further includes:
Step S104, mobile terminal first receives the instruction of user's synchrodata, obtains and identify the verifying voice mouth of user
It enables, then server determines whether to send the encrypted Data Concurrent of the mobile terminal to institute according to the verifying verbal instructions
State mobile terminal;
Step S105, mobile terminal determines decruption key and decipherment algorithm according to the verifying verbal instructions;When detecting
The encrypted data are that it is bright then first to obtain the first weight to decruption key progress first again decryption by multi-enciphering
Then text is that key progress second is decrypted again with first weight to the data of the encryption in plain text;When no, then with the solution
Key is that encrypted data described in key pair are decrypted;Wherein, first weight is in plain text with the first weight ciphertext
It is identical;
Step S106, when completing the decryption to the data of the encryption, the data after decryption are imported into mobile terminal phase
The database answered, so that user checks the data after the decryption.
In present pre-ferred embodiments, when user need to synchronize the encrypted data from server, user is needed
Input speech verification password.When the operational order that mobile terminal receives user utilizes the verifying voice mouth of MIC equipment reception user
After order, (such as noise reduction, preemphasis, framing, adding window and end-point detection) is pre-processed to verifying verbal instructions first, is then mentioned
It takes corresponding vocal print feature sequence (such as extraction MFCC coefficient and LPC cepstrum coefficient generate corresponding vector model), then by vocal print
Characteristic sequence generates the voice to be measured for being used for pattern match according to corresponding algorithm (such as gauss hybrid models algorithm (GMM)), most
The user identity identification code generated in the voice to be measured for being used for pattern match of generation and step S202 is carried out afterwards
It compares, is decision making according to similarity criteria, such as measured using log likelihood (by the vocal print feature sequence of voice to be measured
Template and the user identity identification code of server end storage compare), when the two phase knowledge and magnanimity reach preset threshold value, then
It is determined as the user, allows it to extract the encrypted data and otherwise refuse the user and the encrypted data are mentioned
It takes.
It is completing after the data extraction process process on server, it is first same to pretreated verifying phonetic order
Speech recognition is carried out, the binary coding of corresponding text is obtained;Then mobile terminal obtains described add according to the binary coding
Encryption algorithm type used in data after close and corresponding decryption code key;User is sentenced in the encrypted data again to multiple
The result of encryption selected is that "Yes" or "No" obtain equipment exclusive identification code (IMEI code), utilize this if it is "Yes"
IMEI value carries out the operating process as cryptographic operation to decryption code key, otherwise directly carries out in next step;It finally will be from service
The encrypted data that device obtains carry out byte-by-byte decryption oprerations, and clear data will be finally obtained after decryption (also with regard to several institutes
State data to be backed up) it imports in the database of mobile terminal to be synchronized, data are presented to the user.
By using Speaker Identification, automatic speech recognition and multi-enciphering mode to data to be backed up at
Reason, provides safe and effective user data backup method for user, even if user is lost server end account, is stored in clothes
The encryption information data at business device end are also not easy to be cracked.
Based on the above method, the present invention also provides a kind of data processing systems using multi-enciphering, as shown in figure 3,
Include:
Acquisition and generation module 210 for receiving the instruction of user ID data obtain and identify the voice mouth of user
It enables, and determines Encryption Algorithm and encryption key according to the verbal instructions;As detailed above.
Selection and encrypting module 220 choose whether to carry out data to be backed up more for receiving the selection instruction of user
Re-encryption;When being, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtain the first heavy ciphertext, then
The second re-encryption is carried out to the data to be backed up by Encryption Algorithm using the first weight ciphertext as key;When no, then with institute
Stating encryption key is that data to be backed up described in key pair are encrypted;As detailed above.
Uploading module 230, for after completing the encryption to data to be backed up, encrypted data to be uploaded to service
Device;As detailed above.
Further carry out example, the data processing system using multi-enciphering further include:
Registration module, for receive the operational order of user to server registration one for the user name of Backup Data and
Password;As detailed above.
Login module, for when that need to carry out data backup operation, the operational order that mobile terminal receives user to input use
Name in an account book and password login server;As detailed above.
Further, the system further include:
IMEI code obtains and encrypting module, for obtaining selection and 220 institute of encrypting module when needing to carry out multi-enciphering
Mobile terminal equipment exclusive identification code and using the equipment exclusive identification code as encryption key described in key pair carry out first
Re-encryption;As detailed above.
Relating module, for knowing the encrypted data with the user identity for generating user according to the verbal instructions
It stores after other code association to server;As detailed above.
Example is further carried out, as shown in figure 3, the data processing system using multi-enciphering further include:
To when sending module 240 the verifying voice of user is obtained and identified for receiving the instruction of user's synchrodata
Password, the user identity identification code ratio that then will be stored in the authentication code of the verifying verbal instructions generation and relating module
It is right;When the authentication code is consistent with user identity identification code, the encrypted data are sent to mobile terminal;
Deciphering module 250, mobile terminal determine decruption key and decipherment algorithm according to the verifying verbal instructions;Work as detection
It is that it is bright that the first weight first then is obtained to decruption key progress first again decryption by multi-enciphering to the encrypted data
Then text is that key progress second is decrypted again with first weight to the encrypted data in plain text;When no, then with described
Decruption key is that encrypted data described in key pair are decrypted;Wherein, the first weight plaintext and the described first heavy ciphertext
It is identical;
Display module 260, for when completing to the decryption of the data of the encryption, the data after decryption are imported described in
The corresponding database of mobile terminal where display module, so that user checks the data after the decryption.It wherein acquires and raw
At module, selection and encrypting module, uploading module, registration module, login module, IMEI code obtains and encrypting module, association mould
Block, deciphering module and display module be in the present embodiment be arranged in the terminal, and to when sending module be setting exist
In server, while the position of part of module correspondingly can also be adjusted according to actual needs.
In conclusion a kind of data processing method and its system using multi-enciphering provided by the present invention, the side
Method comprising steps of mobile terminal receive user ID data instruction, obtain and identify the verbal instructions of user, and according to described
Verbal instructions determine Encryption Algorithm and encryption key;Mobile terminal receives the selection instruction of user, chooses whether to be backed up
Data carry out multi-enciphering;When being, then first to the encryption key carry out the first re-encryption obtain the first heavy ciphertext, then with
First weight ciphertext is that data to be backed up described in key pair carry out the second re-encryption;It is then close with the encryption key when no
Key encrypts the data to be backed up;After completing the encryption to data to be backed up, encrypted data are uploaded
To server.Due to may be selected whether carry out multi-enciphering to data to be backed up, the safety of data information is greatly improved
Property, even if leaking data can not be cracked easily and cause the leakage of individual privacy information.
It should be understood that the application of the present invention is not limited to the above for those of ordinary skills can
With improvement or transformation based on the above description, all these modifications and variations all should belong to the guarantor of appended claims of the present invention
Protect range.
Claims (8)
1. a kind of data processing method using multi-enciphering, which is characterized in that the method includes the steps:
A, mobile terminal receives the instruction of user ID data, obtains and identify the verbal instructions of user, and according to the voice
Password determines Encryption Algorithm and encryption key;
B, mobile terminal receives the selection instruction of user, chooses whether to carry out multi-enciphering to data to be backed up;When being, then
The first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtains the first heavy ciphertext, is then close with the first weight ciphertext
Key carries out the second re-encryption to the data to be backed up by Encryption Algorithm;When no, then using the encryption key as key
The data to be backed up are encrypted by Encryption Algorithm;
C, after completing the encryption to data to be backed up, encrypted data are uploaded to server;
The step A is specifically included:
A1, mobile terminal receive the instruction of user ID data, obtain and identify the verbal instructions of user, and therefrom extract vocal print
Characteristic sequence;
A2, mobile terminal generate user identity identification code according to the vocal print feature sequence in the verbal instructions, by the user
Identity code is uploaded to server;
A3, mobile terminal determine Encryption Algorithm and encryption key according to the verbal instructions content of user;
The verbal instructions of the user first pass through HMM method and obtain binary coding corresponding with the verbal instructions content, and
One is generated for selecting the selective factor B of Encryption Algorithm and for the encryption key of encryption data, so by the binary coding
Chaos initial value is generated according to the selective factor B afterwards, finally selects Encryption Algorithm according to chaotic maps;
In the step B, the data to be backed up are encrypted using chaotic maps method, and byte-by-byte generation byte
Corresponding encryption key is simultaneously encrypted, so that the key of each byte encryption is different.
2. using the data processing method of multi-enciphering according to claim 1, which is characterized in that after the step C also
Include:
D, mobile terminal first receives the instruction of user's synchrodata, obtains and identifies the verifying verbal instructions of user, then service
Device determines whether to send the encrypted Data Concurrent of the mobile terminal to the mobile terminal according to the verifying verbal instructions;
E, mobile terminal determines decruption key and decipherment algorithm according to the verifying verbal instructions;It is described encrypted when detecting
Data are then first the first weight to be obtained in plain text to decruption key progress first again decryption, then to described by multi-enciphering
Encrypted data are that key progress second is decrypted again with first weight in plain text;It is then close with the decruption key when no
The encrypted data are decrypted in key;Wherein, first weight is in plain text identical with the first weight ciphertext;
F, when completing the decryption to the data of the encryption, the data after decryption are imported into the corresponding database of mobile terminal,
So that user checks the data after the decryption.
3. using the data processing method of multi-enciphering according to claim 2, which is characterized in that the step D is specifically wrapped
It includes:
D1, mobile terminal receive the instruction of user's synchrodata, obtain and identify the verifying verbal instructions of user;
D2, mobile terminal generate the authentication code of user according to the verifying verbal instructions, and will be in the authentication code
Reach server;
D3, when the authentication code with according to the verbal instructions generate the user identity identification code of user it is consistent when, then will
The encrypted data are sent to the mobile terminal.
4. using the data processing method of multi-enciphering according to claim 1, which is characterized in that carried out in the step B
It is to obtain the equipment exclusive identification code of mobile terminal and using the equipment exclusive identification code of mobile terminal as key pair when multi-enciphering
The encryption key carries out the first re-encryption.
5. using the data processing method of multi-enciphering according to claim 1, which is characterized in that described in the step C
Encrypted data store after being associated with the user identity identification code generated according to the verbal instructions to server.
6. a kind of data processing system using multi-enciphering characterized by comprising
Acquisition and generation module for receiving the instruction of user ID data obtain and identify the verbal instructions of user, Cong Zhongti
Vocal print feature sequence is taken, and Encryption Algorithm and encryption key are determined according to the vocal print feature sequence in the verbal instructions;
Selection and encrypting module choose whether to carry out multi-enciphering to data to be backed up for receiving the selection instruction of user;
When being, then the first re-encryption first is carried out by Encryption Algorithm to the encryption key and obtain the first heavy ciphertext, then with first
Weight ciphertext is that key passes through Encryption Algorithm to data second re-encryption of progress to be backed up;When no, then with the encryption
Key is that key encrypts the data to be backed up by Encryption Algorithm;
Uploading module, for after completing the encryption to data to be backed up, encrypted data to be uploaded to server;
The acquisition and generation module are specifically used for, and the verbal instructions of the user are first passed through HMM method and are obtained and institute's predicate
The corresponding binary coding of sound password content, and by the binary coding generate one for select the selection of Encryption Algorithm because
Encryption key and for encryption data, then generates chaos initial value according to the selective factor B, is finally reflected according to chaos
Penetrate selection Encryption Algorithm;
The selection and encrypting module are specifically used for, and are encrypted using chaotic maps method to the data to be backed up, and by
Byte generates the corresponding encryption key of the byte and is encrypted, so that the key of each byte encryption is different.
7. using the data processing system of multi-enciphering according to claim 6, which is characterized in that the selection and encryption mould
Selection is when encrypting data to be backed up in block, be the equipment of mobile terminal where obtaining the selection and encrypting module only
One identification code simultaneously carries out the first re-encryption by encryption key described in key pair of the equipment exclusive identification code.
8. using the data processing system of multi-enciphering according to claim 7, which is characterized in that further include:
To when sending module the verifying verbal instructions of user are obtained and identified, so for receiving the instruction of user's synchrodata
Determine whether to send the encrypted Data Concurrent of the mobile terminal to the mobile terminal according to the verifying verbal instructions afterwards;
Deciphering module, for determining decruption key and decipherment algorithm according to the verifying verbal instructions;When detecting the encryption
Data afterwards are then first to obtain the first weight in plain text to decruption key progress first again decryption by multi-enciphering, then right
The encrypted data are that key progress second is decrypted again with first weight in plain text;When no, then with the decruption key
It is decrypted for encrypted data described in key pair;Wherein, first weight is in plain text complete phase with the first weight ciphertext
With;
Display module, for when completing the decryption to the data of the encryption, the data after decryption to be imported the display mould
The corresponding database of mobile terminal where block, so that user checks the data after the decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410096796.5A CN104935429B (en) | 2014-03-17 | 2014-03-17 | A kind of data processing method and its system using multi-enciphering |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410096796.5A CN104935429B (en) | 2014-03-17 | 2014-03-17 | A kind of data processing method and its system using multi-enciphering |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104935429A CN104935429A (en) | 2015-09-23 |
CN104935429B true CN104935429B (en) | 2019-06-04 |
Family
ID=54122409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410096796.5A Active CN104935429B (en) | 2014-03-17 | 2014-03-17 | A kind of data processing method and its system using multi-enciphering |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104935429B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471900A (en) * | 2015-12-29 | 2016-04-06 | 畅捷通信息技术股份有限公司 | Method and device for encrypting and decrypting data |
CN105825133A (en) * | 2016-03-09 | 2016-08-03 | 成都爆米花信息技术有限公司 | Synchronous data storage method |
CN105872964A (en) * | 2016-03-24 | 2016-08-17 | 四川长虹电器股份有限公司 | Intelligent terminal security management system |
CN106487517A (en) * | 2016-09-30 | 2017-03-08 | 北京瑞卓喜投科技发展有限公司 | data encryption and decryption method and device |
CN106528334A (en) * | 2016-10-25 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data backup method and apparatus |
CN109194461B (en) * | 2018-05-11 | 2022-02-22 | 吉林大学 | Single-direction linked list sequence encryption and decryption method based on double-key stream cipher |
CN111294642B (en) * | 2018-12-10 | 2021-06-18 | 杭州海康威视数字技术股份有限公司 | Video stream playing method and device |
CN109741761B (en) * | 2019-03-13 | 2020-09-25 | 百度在线网络技术(北京)有限公司 | Sound processing method and device |
CN110446115B (en) * | 2019-07-22 | 2021-10-15 | 腾讯科技(深圳)有限公司 | Live broadcast interaction method and device, electronic equipment and storage medium |
CN110380856B (en) * | 2019-08-15 | 2023-04-18 | Oppo(重庆)智能科技有限公司 | Terminal device and voice information processing method and device thereof, and storage medium |
CN110601836B (en) * | 2019-10-10 | 2022-04-12 | 中国建设银行股份有限公司 | Key acquisition method, device, server and medium |
CN111007736A (en) * | 2019-12-20 | 2020-04-14 | 阮振荣 | Intelligent home system |
CN113761543B (en) * | 2020-06-01 | 2024-04-02 | 菜鸟智能物流控股有限公司 | Data processing method, device, equipment and machine-readable medium based on alliance chain |
CN111859423A (en) * | 2020-07-17 | 2020-10-30 | 山东广鹏信息科技有限公司 | Information security encryption method and device |
CN112152802B (en) * | 2020-09-09 | 2023-06-20 | 深圳市欢太科技有限公司 | Data encryption method, electronic device and computer storage medium |
CN113591138A (en) * | 2021-09-30 | 2021-11-02 | 连连(杭州)信息技术有限公司 | Service data processing method, device, equipment and medium |
CN114268425B (en) * | 2021-12-21 | 2023-06-02 | 建信金融科技有限责任公司 | Information encryption transmission method, device, electronic equipment and storage medium |
CN115225409B (en) * | 2022-08-31 | 2022-12-06 | 成都泛联智存科技有限公司 | Cloud data safety duplicate removal method based on multi-backup joint verification |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1947102A (en) * | 2004-04-14 | 2007-04-11 | 松下电器产业株式会社 | Terminal device and copyright protection system |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN101803415A (en) * | 2007-09-18 | 2010-08-11 | 高通股份有限公司 | Method and apparatus for creating a remotely activated secure backup service for mobile handsets |
CN102422590A (en) * | 2009-05-12 | 2012-04-18 | 赛贝斯股份有限公司 | Protection of encryption keys in a database |
-
2014
- 2014-03-17 CN CN201410096796.5A patent/CN104935429B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1947102A (en) * | 2004-04-14 | 2007-04-11 | 松下电器产业株式会社 | Terminal device and copyright protection system |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN101803415A (en) * | 2007-09-18 | 2010-08-11 | 高通股份有限公司 | Method and apparatus for creating a remotely activated secure backup service for mobile handsets |
CN102422590A (en) * | 2009-05-12 | 2012-04-18 | 赛贝斯股份有限公司 | Protection of encryption keys in a database |
Also Published As
Publication number | Publication date |
---|---|
CN104935429A (en) | 2015-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104935429B (en) | A kind of data processing method and its system using multi-enciphering | |
CN109040090B (en) | A kind of data ciphering method and device | |
US8959357B2 (en) | Biometric encryption and key generation | |
WO2019101240A3 (en) | Authentication based on a recoverd public key | |
CN111984978B (en) | High-expansibility password encryption storage method | |
JP6594349B2 (en) | Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information | |
CN104158664A (en) | Identity authentication method and system | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
CN110933109B (en) | Dynamic small program authentication method and device | |
US20160253510A1 (en) | Method for security authentication and apparatus therefor | |
CN107944234B (en) | Machine refreshing control method for Android equipment | |
CN111242611A (en) | Method and system for recovering digital wallet key | |
KR102274132B1 (en) | User authentication server that performs verification of electronic signature data generated based on biometric authentication in association with a plurality of verification servers and operating method thereof | |
CN102156843A (en) | Data encryption method and system as well as data decryption method | |
CN104424419A (en) | Encrypting and decrypting method and system based on voiceprint recognition technology | |
CN108199847A (en) | Security processing method, computer equipment and storage medium | |
KR20190112959A (en) | Operating method for machine learning model using encrypted data and apparatus based on machine learning model | |
CN102855427B (en) | A kind of equipment unlock method, device and subscriber equipment | |
CN105825142A (en) | Method and device for encrypting and decrypting documents in mobile terminal | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN104102858B (en) | Application program cipher processing method, device and terminal | |
KR101480889B1 (en) | Virtual keyboard generating device and method for user authentication | |
US11075760B1 (en) | Utilizing voice biometrics to generate a secure digital identity for a user without access to technology | |
CN105743859A (en) | Method, device and system for authenticating light application | |
CN105227312A (en) | Intelligent code key password authentification extracting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |