CN104966014A - Terminal encryption method and apparatus and terminal decryption method and apparatus - Google Patents

Terminal encryption method and apparatus and terminal decryption method and apparatus Download PDF

Info

Publication number
CN104966014A
CN104966014A CN201510422494.7A CN201510422494A CN104966014A CN 104966014 A CN104966014 A CN 104966014A CN 201510422494 A CN201510422494 A CN 201510422494A CN 104966014 A CN104966014 A CN 104966014A
Authority
CN
China
Prior art keywords
icon
decryption
interface
password position
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510422494.7A
Other languages
Chinese (zh)
Other versions
CN104966014B (en
Inventor
李柯材
宋江超
赵春兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaqin Technology Co Ltd
Original Assignee
Huaqin Telecom Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaqin Telecom Technology Co Ltd filed Critical Huaqin Telecom Technology Co Ltd
Priority to CN201510422494.7A priority Critical patent/CN104966014B/en
Publication of CN104966014A publication Critical patent/CN104966014A/en
Application granted granted Critical
Publication of CN104966014B publication Critical patent/CN104966014B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to the technical field of electronic information and discloses a terminal encryption method and apparatus and a terminal decryption method and apparatus. According to the terminal encryption method and apparatus and the terminal decryption method and apparatus, the terminal decryption method comprises the following steps that: an initial decryption interface is provided, wherein the initial decryption interface comprises a plurality of different icons; according to decryption operation of a user, shift processing is carried out on the icons in the initial decryption interface to obtain a verification decryption interface; icon information of a password position in the verification decryption interface is acquired; and when the icon information is the same as password information, decryption succeeds. Compared to the prior art, the terminal authorization security can be improved and privacy information of the user is protected.

Description

The decryption method of the encryption method of terminal and encryption device, terminal and decryption device
Technical field
The present invention relates to electronic information technical field, particularly the decryption method of a kind of encryption method of terminal and encryption device, terminal and decryption device.
Background technology
Universal along with mobile terminal, many privately owned, responsive data are preserved in the terminal by current user, and this just has higher requirement to the authentication security of mobile terminal.Common certification recognition methods has: numerical ciphers authentication method and gesture authentication method.The shortcoming of these two authentication methods is: password is easily guessed by the decrypting process captured by person of peeping.When mobile terminal (such as mobile phone) is lost or be stolen, easily handled the mobile terminal of oneself by other people, to such an extent as to cause the loss of significant data, the even loss of cash.Such as: if installed the hand-set from stolen of the client of remaining sum treasured or each bank, if password is stolen in advance by other people, the property safety of user will be made to be subject to serious threat.
Summary of the invention
The problem that the present invention solves is to provide a kind of encryption method of terminal and encryption device, the decryption method of terminal and decryption device, can improve the security of terminal authentication, the private information of protection user.
For solving the problems of the technologies described above, embodiments of the present invention provide a kind of decryption method of terminal, comprising:
There is provided initial decryption interface, described initial decryption interface comprises multiple different icon;
According to the decryption oprerations of user, shifting processing is carried out to the described icon in described initial decryption interface, is verified decryption interface;
Obtain the icon information of password position in described checking decryption interface;
When described icon information is identical with encrypted message, successful decryption.
Embodiments of the present invention additionally provide a kind of encryption method of terminal, comprising:
There is provided encrypted interface, described encrypted interface comprises multiple different icon;
According to the cryptographic operation of user, setting code information, described encrypted message comprises two or more icon information in described encrypted interface.
Embodiments of the present invention additionally provide a kind of decryption device of terminal, comprising:
Display module, for providing initial decryption interface, described initial decryption interface comprises multiple different icon;
Receiver module, for receiving the decryption oprerations of user;
Processing module, for the decryption oprerations received according to described receiver module, the icon in the initial decryption interface show described display module carries out shifting processing, is verified decryption interface;
Acquisition module, for obtaining the icon information of password position in checking decryption interface that described processing module obtains;
Deciphering module, for verifying that whether described icon information is identical with encrypted message, and is decrypted when described icon information is identical with encrypted message.
Embodiments of the present invention additionally provide a kind of encryption device of terminal, comprising:
Display module, for showing encrypted interface, described encrypted interface comprises multiple different icon;
Receiver module, for receiving the operation of user;
Encrypting module, for the user operation received according to described receiver module, arranges encrypted message, is encrypted described device, and described encrypted message comprises two or more icon information in described encrypted interface.
Embodiment of the present invention in terms of existing technologies, when encrypting, adopt the combination of plural icon information in encrypted interface as Crypted password, like this, user can not consider the order of the icon comprised in encrypted message when deciphering, formulate fast decryption strategy, improve the efficiency of deciphering; When deciphering, according to the decryption oprerations of user on initial decryption interface, shifting processing is carried out to the icon in initial decryption interface, to be verified decryption interface, and when only having the icon information in checking decryption interface on password position identical with encrypted message, just successful decryption.That is, on the one hand, user only has the icon moving comprised by encrypted message to the password position in checking decryption interface, just possibility successful decryption; On the other hand, as long as the constituent of icon is identical with the constituent of icon in encrypted message on the password position in checking decryption interface, just can successful decryption, like this, user can formulate decryption policy fast according to the icon distribution in initial decryption interface, improves efficiency and the convenience of deciphering.Meanwhile, embodiment of the present invention also possesses following advantage: first, and for the initial decryption interface comprising multiple different icons, manner of decryption is very obscure, is not easy to be conceived; Secondly, password position in checking decryption interface is unknown for the personnel beyond user, and, password position information change is various, be not easy to be conceived, if think successful decryption, first must determine password position, this is equivalent to, for one protective barrier has been set up again in deciphering, be conducive to the security improving terminal authentication; Finally, password position, relation between decryption oprerations and encrypted message are unknown for the personnel beyond the user be encrypted, and are not easy to expect; So even if decrypting process is caught in, person of peeping is also difficult to the encrypted message knowing manner of decryption and deciphering, like this, can improve the security of terminal authentication, the private information of protection user.
Alternatively, before carrying out shifting processing, also comprise: show described password position.Before user performs decryption oprerations, prompt cipher position, not only eliminates the time that user recalls password position, and avoid user to forget Password position and situation about cannot decipher occurs, Consumer's Experience is good.
Alternatively, the password position shown in adjacent twice deciphering is not identical.Like this, even if person of peeping has recorded decrypting process last time, perform identical decryption oprerations, also impossible successful decryption, improves the level of security of terminal authentication.
Alternatively, also comprise: when deciphering is unsuccessful or according to the instruction of user, again show described password position.Like this, when the time interval between the time of display password position and decryption oprerations can be avoided longer, the situation that user forgets this password position deciphered and cannot decipher occurs, and is conducive to improving Consumer's Experience.
Alternatively, the password position used in each deciphering is identical.Like this, when being decrypted, without the need to showing password position at every turn, therefore can save the time of terminal notifying password position, shortening decryption time, improve decryption efficiency, and can improve further because peeping the security caused.
Alternatively, in adjacent twice deciphering, initial decryption interface is different.Like this, even if person of peeping has recorded decrypting process last time, perform identical decryption oprerations, also impossible successful decryption, improves the level of security of terminal authentication.
Alternatively, described icon comprises digital icon, the color icon or shaped icon.Comprise the diversity of icon in initial decryption interface, the deciphering difficulty of person of peeping can be increased, improve terminal authentication security.
Accompanying drawing explanation
Fig. 1 is the encryption method process flow diagram of the terminal according to first embodiment of the invention;
Fig. 2 is according to the initial encryption interface schematic diagram in first embodiment of the invention;
Fig. 3 is according to the encrypted interface schematic diagram in first embodiment of the invention;
Fig. 4 is the decryption method process flow diagram of the terminal according to second embodiment of the invention;
Fig. 5 ~ 6 are according to the initial decryption interface schematic diagram in second embodiment of the invention;
Fig. 7 is according to the password position schematic diagram in second embodiment of the invention;
Fig. 8 a ~ 8d is according to the checking decryption interface schematic diagram in second embodiment of the invention;
Fig. 9 is the encryption method process flow diagram of the terminal according to third embodiment of the invention;
Figure 10 arranges interface schematic diagram according to the initial password position in third embodiment of the invention;
Figure 11 is according to the password position schematic diagram in third embodiment of the invention;
Figure 12 is according to the encrypted interface schematic diagram in third embodiment of the invention;
Figure 13 is the decryption method process flow diagram of the terminal according to four embodiment of the invention;
Figure 14 is according to the password position schematic diagram in four embodiment of the invention;
Figure 15 is the structured flowchart of the encryption device according to fifth embodiment of the invention terminal;
Figure 16 is the structured flowchart of the decryption device according to sixth embodiment of the invention terminal;
Figure 17 is the structured flowchart of the encryption device according to seventh embodiment of the invention terminal.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, the embodiments of the present invention are explained in detail.But, persons of ordinary skill in the art may appreciate that in each embodiment of the present invention, proposing many ins and outs to make reader understand the application better.But, even without these ins and outs with based on the many variations of following embodiment and amendment, each claim of the application technical scheme required for protection also can be realized.
First embodiment of the invention relates to a kind of encryption method of terminal, specifically as shown in Figure 1, comprises the following steps:
Step 101, provides initial encryption interface.
Initial encryption interface in present embodiment comprises multiple different icon, and all icon arrangement become icon arrays.And the icon in initial encryption interface can comprise following any one or combination in any: digital icon, the color icon or shaped icon.
In the present embodiment, digital icon and the color icon is comprised in initial encryption interface, specifically as shown in Figure 2, digital icon comprises the digital icon of 0 ~ 9, the color icon comprises purple icon 201, white icon 202, green icon 203, blue icons 204, yellow icon 205 and black icon 206, and digital icon and the color icon randomly, are irregularly distributed in initial decryption interface.
Step 102, according to the cryptographic operation of user, carries out locking processing to the icon in initial encryption interface, obtains encrypted interface.
In this step, user chooses the icon for encrypting by clicking operation, and terminal detects the clicking operation to icon, then lock selected icon, and change the display state of clicked icon, such as, clicked icon is become black, to cover the icon information that user chooses.If detect, clicked icon is 1 icon, 2 icons, 6 icons and 8 icons, then lock these icons, and these icons are all become black icon, as shown in Figure 3.
Step 103, detects icon information locked in encrypted interface.
Step 104, judges whether the number of the icon information detected reaches default number.If so, then step 105 is performed, otherwise, perform step 102.
Such as, in present embodiment, encrypted message comprises 4 icons, then the number preset is 4.If the number of the icon information detected does not reach 4, just return step 102, if reach 4, then perform step 105.
Step 105, judges to provide the number of times at initial encryption interface whether to reach twice.If so, then perform step 106, otherwise again provide encrypted interface,
Wherein, seemingly, wherein, the distribution of icon can be identical, also can not be identical for this encrypted interface provided and initial encryption interface phase.This step is to allow user confirm the encrypted message arranged.
Step 106, judges that whether the double icon information detected is consistent.If so, then step 107 is performed, otherwise, again provide encrypted interface.
Wherein, seemingly, wherein, the distribution of icon can be identical, also can not be identical for this encrypted interface provided and initial encryption interface phase.In this step, be whether the constituent of the icon information judging double acquisition is consistent, and do not judge that whether the clicked order of icon is also consistent.Such as, detect that as long as double clicked icon all comprises 1 icon, 2 icons, 6 icons and 8 icons, just judge that the double icon information detected is consistent, otherwise, encrypted message failure is set, returns encrypted interface.
Step 107, encrypts successfully.In this step, the icon that constituent is only comprised 1 icon, 2 icons, 6 icons and 8 icons by terminal combines and is set to encrypted message, is encrypted terminal.
When encrypting, adopt the combination of plural icon information in encrypted interface as encrypted message, like this, user can not consider putting in order of the icon comprised in encrypted message when deciphering, and formulates fast decryption strategy, improves the efficiency of deciphering.
Second embodiment of the present invention relates to a kind of decryption method of terminal, and idiographic flow as shown in Figure 4, comprises the following steps:
Step 401, provides initial decryption interface.Wherein, initial decryption interface comprises multiple different icon, and all icon arrangement become icon arrays.And the icon in initial decryption interface can comprise following any one or combination in any: digital icon, the color icon or shaped icon.
In the present embodiment, digital icon and the color icon is comprised in initial decryption interface, specifically as shown in Figure 5, digital icon comprises the digital icon of 0 ~ 9, the color icon comprises purple icon 201, white icon 202, green icon 203, blue icons 204, yellow icon 205 and black icon 206, and digital icon and the color icon randomly, are irregularly distributed in initial decryption interface, and the position that during adjacent twice deciphering, in initial decryption interface, icon distributes is not identical.
In this step, initial decryption interface can be provided in the following way: first, icon is filled in initial decryption interface at random.Secondly, the position of icon in the position of icon in current initial decryption interface and the front initial decryption interface provided when once deciphering is provided.If the position exceeding the icon of preset number in current initial decryption interface with front once decipher time the initial decryption interface that provides in the position of icon not identical, current initial decryption interface is then provided, otherwise, again icon is filled in initial decryption interface at random, until the position exceeding the icon of preset number in current initial decryption interface with front once decipher time the initial decryption interface that provides in the position of icon not identical.Wherein, when initial decryption interface is provided first, the picture mark position in interface is not compared.Like this, the security of terminal authentication can be improved.
Certainly, upper once decipher time, the initial decryption interface that the initial decryption interface provided provides when deciphering from this is also different, such as, the decryption interface provided during deciphering next time may be initial decryption interface as shown in Figure 6, clearly, in the initial decryption interface that the position exceeding the icon of half in the initial decryption interface shown in Fig. 6 provides when deciphering with this, the position of icon is not identical.
Step 402, according to the decryption oprerations of user, carries out shifting processing to the icon in initial decryption interface, is verified decryption interface.
In the present embodiment, the number of password position is identical with the number of icon information in encrypted message, and when only having the icon information in checking decryption interface on password position identical with encrypted message, could successful decryption.And in initial decryption interface, the icon that the icon on password position not necessarily comprises in encrypted message, so, need user all to be moved on on password position by all icons comprised in encrypted message, just may successful decryption.In the present embodiment, encrypted message comprises 4 digital icons: 1 icon, 2 icons, 6 icons and 8 icons; And the password position that each deciphering uses is identical, and specifically as shown in Figure 7, the position residing for icon 701 ~ 704 is password position.Like this, pre-define and remember password position, the time of prompt cipher position when terminal is deciphered at every turn can be saved, shortening decryption time, improving decryption efficiency, and can improve further because peeping the security caused.
User, according to the icon distribution in initial decryption interface, password position and encrypted message, analyzes and obtains decryption policy.As shown in Figure 5, in initial decryption interface, 1 icon and 6 icons have been on password position (icon 701, icon 704), as long as 2 icons and 8 icon movings are got final product successful decryption by user to icon 702 and icon 703.And terminal, when carrying out shifting processing, can exchange the position of two icons at every turn.Suppose that the terminal time that shifting processing is used is each time identical, the time interval between adjacent twice moving icon of user is identical, in order to the shortest time successful decryption, improve decryption efficiency, the decryption policy adopted is: by 2 icon movings on the position of icon 702 (green icon 203), by 8 icon movings on the position of icon 703 (5 icon), namely exchange the position of the position of green icon 203 and 2 icon, 8 icons and 5 icons respectively.
User is decrypted operation to icon, and terminal carries out shifting processing according to the decryption oprerations of user to the icon in initial decryption interface.In the present embodiment, user can operate the position of exchange two icons by pull or click etc.Specifically, 2 icons can be drawn to green icon 203 by user, when terminal detects that 2 icons arrive green icon 203 place, just the position of 2 icons and green icon 203 is exchanged, or, green icon 203 can be drawn to 2 icon places by user, when terminal detects that green icon 203 arrives 2 icon place, just exchanges the position of 2 icons and green icon 203.In like manner, terminal, according to the decryption oprerations of user, exchanges the position of 8 icons and 5 icons.
In the present embodiment, when terminal detect exceed preset duration apart from the time of last shifting processing time, current decryption interface is regarded as checking decryption interface, but is not limited thereto when practical application.Such as, if first carry out shifting processing to 2 icons and green icon 203, again shifting processing is carried out to 8 icons and 5 icons, and the time interval of 8 icons and 5 icons being carried out to shifting processing is less than preset duration to the time interval that 2 icons and green icon 203 carry out shifting processing, preset duration is exceeded to the time after 8 icons and 5 icons carry out shifting processing, then the decryption interface after carrying out shifting processing to 8 icons and 5 icons is regarded as checking decryption interface.So the checking decryption interface obtained as shown in Figure 8 a.
Step 403, obtains the icon information of password position in checking decryption interface.In this step, the icon information of the password position of acquisition comprises: 1 icon, 2 icons, 6 icons and 8 icons.
Step 404, judges that whether the icon information on password position is consistent with encrypted message.If so, then step 405 is performed, otherwise, decipher unsuccessfully, perform step 406.
In this step, the icon information of the password position of acquisition is contrasted with the icon information in encrypted message one by one, once the icon run on password position is not included in encrypted message, just perform step 406, otherwise, until it is complete that the icon information in whole icon information of the password position of acquisition and encrypted message is carried out contrast.Namely, when the icon constituent that the icon information on password position and encrypted message comprise is identical, icon information is identical with encrypted message.That is, icon information does not comprise positional information.Such as, when practical application, if obtain the checking decryption interface as Fig. 8 b, 8c, 8d, as long as the icon information on password position is 1 icon, 2 icons, 6 icons and 8 icons, no matter how position changes, and the icon information be all considered as on password position is identical with encrypted message.
Step 405, successful decryption.
Step 406, judges whether the failed number of times of deciphering reaches preset value.If so, then step 407 is performed, otherwise, again provide decryption interface, treat that user re-executes decryption oprerations.Specifically, be judge whether the failed number of times of deciphering on the same day performing decryption oprerations reaches preset value, to improve because terminal is stolen the security caused in this step.
Step 407, locking terminal.After locking terminal, user cannot perform decryption oprerations again.
Compared with prior art, when deciphering, on the one hand, user only has the icon moving comprised by encrypted message to the password position in checking decryption interface, just possibility successful decryption; On the other hand, as long as the constituent of icon is identical with the constituent of icon in encrypted message on the password position in checking decryption interface, just can successful decryption, like this, user can formulate decryption policy fast according to the icon distribution in initial decryption interface, improves efficiency and the convenience of deciphering.Meanwhile, embodiment of the present invention also possesses following advantage: first, and for the initial decryption interface comprising multiple different icons, manner of decryption is very obscure, is not easy to be conceived; Secondly, password position in checking decryption interface is unknown for the personnel beyond user, and, even if the personnel beyond user know to there is password position, because password position information change is various, be not easy to determine, this is equivalent to, for one protective barrier has been set up again in deciphering, be conducive to the security improving terminal authentication; Finally; in during adjacent twice deciphering, initially decryption interface is different; even if use identical password position during each deciphering; the decryption oprerations that during adjacent twice deciphering, user performs is not identical yet, so, even if the last decrypting process of user is captured by person of peeping; person of peeping can not be inferred by the decryption oprerations of user and encrypted message; the more impossible decryption oprerations successful decryption identical by execution, improves the security of terminal authentication, is conducive to protection user private information.
In first embodiment: during each encryption, password position is not set.Like this, password simple and fast is set.
In 3rd embodiment: during each encryption, password position is set.The diversity of embodiment of the present invention can be increased like this.
The difference of the 3rd embodiment and the first embodiment is: one arranges password position, and one does not arrange password position.
Third embodiment of the invention relates to a kind of encryption method of terminal.In the present embodiment, during encryption, password position is set, and by drag operation, icon moving is arranged encrypted message to password position, add the diversity of embodiment of the present invention.
Specifically, the encryption method of terminal, specifically as shown in Figure 9, comprises the following steps:
Step 901, provides initial password position to arrange interface.In this step, the initial password position provided arranges interface as shown in Figure 10, and comprise multiple blank icon 1001, all icon arrangement become icon arrays.
Step 902, detects selected password position information.Specifically, in this step, if terminal detects the clicking operation to icon, then obtain selected icon information, and change the display state of clicked icon, such as, clicked icon is become red icon 1101, concrete as shown in figure 11, to show that user have selected this icon 1101 using as password position.
903, judge whether the number of the icon information detected reaches default number.If so, then step 904 is performed, otherwise, perform step 902.Such as, in present embodiment, password position comprises 4 icons, then the number preset is 4.If the number of the password position detected does not reach 4, just return step 902, if reach 4, then perform step 904.Namely, time the number that only has terminal the number of the password position that user chooses to be detected to reach default the number of icon information (in the encrypted message), just step 904 can be entered.
Step 904, judges whether the number of times providing initial password position to arrange interface reaches twice.If so, then step 905 is performed, otherwise, provide password position that interface is set.This step is to allow user confirm the password position arranged.
Step 905, judges that whether the double password position information detected is consistent.If so, then step 906 is performed, otherwise, again provide password position that interface is set.In this step, be whether the constituent of positional information of the icon judging double acquisition is consistent.Such as, detect that as long as double clicked icon all comprises icon 1101, icon 1102, icon 1103 and icon 1104, just judge that the double icon information detected is consistent, otherwise, encrypted message failure is set, again provides password position that interface is set.
Step 906, the password position information according to detecting arranges password position.Specifically, if the password position information detected double all comprises icon 1101, icon 1102, icon 1103 and icon 1104, is just combined by the icon simultaneously comprising icon 1101, icon 1102, icon 1103 and icon 1104 and is set to password position.Wherein, the number of password position is identical with the number of icon information in encrypted message.
Step 907, provides initial encryption interface.Seemingly, only, the initial encryption interface provided in this step is for encrypting for the initial deciphering interface phase that in the initial encryption interface that this step provides and the second embodiment, step 401 provides.
Step 908, according to the cryptographic operation of user, carries out shifting processing to the icon in initial encryption interface, obtains encrypted interface.In this step, the icon moving that the encrypted message being used for encrypting comprises by user to password position, to obtain encrypted interface.Such as, 1 icon, 2 icons, 8 icons, 6 icons, for 1 icon, 2 icons, 8 icons, 6 icons are set to password, just can move on 4 password positions by user respectively.Wherein, when the icon moving that the encrypted message for encrypting comprises is to password position, the icon of password position becomes black icon, specifically as shown in figure 12.This step is similar to the step 402 in the second embodiment, does not repeat them here.
Step 909, obtains the icon information adding password position in interface.Similar to the step 403 in the second embodiment in this step, do not repeat them here.
Step 910, judges to provide the number of times of encryption initial interface whether to reach twice.If so, then step 911 is performed, otherwise, encrypted interface is provided.
Step 911, judges that whether the icon information on double password position is consistent.If so, then step 912 is performed, otherwise, again provide encrypted interface.
Step 912, encrypts successfully.Similar to the step 106 in the first embodiment in this step, do not repeat them here.
In the present embodiment, by drag operation, icon moving is arranged encrypted message to password position, add the diversity of embodiment of the present invention.
In second embodiment: do not show password position during each deciphering, password position is identical.Like this, user only need remember password position in advance, can save the time of terminal notifying password position, shortens decryption time, improves decryption efficiency.
In 4th embodiment: show password position (during adjacent twice deciphering, password position can be identical, also can be different) during each deciphering.
The difference of the 4th embodiment and the second embodiment is: one shows password position, and one does not show password position.
4th embodiment of the present invention relates to a kind of decryption method of terminal.In the present embodiment, the password position shown in adjacent twice deciphering is not identical, like this, even if person of peeping has recorded decrypting process last time, performs identical decryption oprerations, and also impossible successful decryption, further increases the level of security of terminal authentication.
Specifically, in the present embodiment, the decryption method of terminal, specifically as shown in figure 13, comprises the steps:
Step 1301, display password position.In the present embodiment, the password position used during adjacent twice deciphering is different, and is random, and before not showing password position, anyone comprises user and does not originally know per capita to improve the security of terminal authentication by the password position that this deciphering uses.
In this step, the display interface of password position can be provided in the following way: first, random selecting password position; Secondly, by the password position chosen and front once decipher time the password position that shows contrast; If the password position chosen is not identical with the front password position once shown, then show the password position chosen, otherwise, again choose password position, until the password position chosen with front once decipher time the password position that shows not identical.Password position comparison can not be carried out when showing password position first.
Certainly, upper once decipher time, the password position provided when the password position provided is deciphered from this is also different.Such as, the password position provided during this deciphering can be as shown in Figure 7, and the password position provided during deciphering next time may be password position 1401,1402,1403,1404 as shown in figure 14, clearly, the password position provided when the password position shown in Figure 14 is deciphered with this is not identical.
And in this step, the time remaining preset duration of display password position, like this, can be used for user to have ample time and remembers the password position that this deciphering uses.User can arrange the preset duration of display password position according to self-demand.
Step 1302, provides initial decryption interface.This step is similar to the step 401 in the second embodiment, and the initial decryption interface provided during adjacent twice deciphering is different, does not repeat them here.
Step 1303, according to the decryption oprerations of user, carries out shifting processing to the icon in initial decryption interface, is verified decryption interface.This step is similar to the step 402 in the second embodiment, does not repeat them here.
Step 1304, obtains the icon information of password position in checking decryption interface.This step is similar to the step 403 in the second embodiment, does not repeat them here.
Step 1305, judges that whether the icon information on password position is consistent with encrypted message.If so, then step 1306 is performed, otherwise, perform step 1307.
Step 1306, successful decryption.
Step 1307, judges whether the failed number of times of deciphering reaches preset value.If so, then step 1308 is performed, otherwise, again show password position.This step is similar to the step 406 in the second embodiment, does not repeat them here.
Step 1308, locking terminal.This step is similar to the step 407 in the second embodiment, does not repeat them here.
In a word, when the icon information on password position is identical with encrypted message, then successful decryption, otherwise, when deciphering failed number of times and not exceeding preset value, terminal shows password position automatically again, certainly, also again password position can be shown according to the instruction again showing password position of user's input, like this, user can be avoided to forget this password position deciphered and situation about cannot decipher occurs, be conducive to improving Consumer's Experience.
In the present embodiment, use different password positions when not only deciphering at every turn, and the initial decryption interface provided during adjacent twice deciphering is different, when this greatly reduces adjacent twice deciphering, user performs the probability of identical decryption oprerations, so, even if the last decrypting process of user is captured by person of peeping, person of peeping can not be inferred by the decryption oprerations of user and encrypted message, also can not by performing identical decryption oprerations successful decryption, simultaneously, even if person of peeping captures checking decryption interface during last deciphering, also can not when deciphering by obtaining identical checking decryption interface and successful decryption, like this, further increase the security of terminal authentication, be conducive to protection user private information.
It should be noted that, in the present embodiment, the step of display password position is before the step providing initial decryption interface, in actual applications, as long as the step of display password position is before terminal carries out the step of shifting processing to the icon in initial decryption interface, present embodiment does not limit the sequencing between the step of display password position and the step providing initial decryption interface.
The step of various method divides above, just in order to be described clearly, can merge into a step or splitting some step, being decomposed into multiple step, when realizing as long as comprise identical logical relation, all in the protection domain of this patent; To adding inessential amendment in algorithm or in flow process or introducing inessential design, but the core design not changing its algorithm and flow process is all in the protection domain of this patent.
Fifth embodiment of the invention relates to a kind of encryption device of terminal, specifically as shown in figure 15, comprising:
Display module, for showing encrypted interface, encrypted interface comprises multiple different icon.
Receiver module, for receiving the operation of user.
Encrypting module, for the user operation received according to receiver module, arranges encrypted message, is encrypted device, and encrypted message comprises two or more icon information in encrypted interface.
Be not difficult to find, present embodiment is the system embodiment corresponding with the first embodiment, and present embodiment can be worked in coordination with the first embodiment and be implemented.The relevant technical details mentioned in first embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the first embodiment.
Sixth embodiment of the invention relates to a kind of decryption device of terminal, specifically as shown in figure 16, comprising:
Display module, for providing initial decryption interface, initial decryption interface comprises multiple different icon.
Receiver module, for receiving the decryption oprerations of user.
Processing module, for the decryption oprerations received according to receiver module, carries out shifting processing to the icon in the initial decryption interface of display module display, is verified decryption interface.
Display module, also for checking decryption interface that Graphics Processing module obtains.
Acquisition module, for obtaining the icon information of password position in checking decryption interface that processing module obtains.
Deciphering module, for verifying that whether icon information is identical with encrypted message, and is decrypted when icon information is identical with encrypted message.
Be not difficult to find, present embodiment is the system embodiment corresponding with the second embodiment, and present embodiment can be worked in coordination with the second embodiment and be implemented.The relevant technical details mentioned in second embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the second embodiment.
It is worth mentioning that, each module involved in present embodiment is logic module, and in actual applications, a logical block can be a physical location, also can be a part for a physical location, can also realize with the combination of multiple physical location.In addition, in order to outstanding innovative part of the present invention, the unit not too close with solving technical matters relation proposed by the invention is not introduced in present embodiment, but this does not show the unit that there is not other in present embodiment.
In 5th embodiment: do not comprise and module is set, during each encryption, password position is not set.Like this, password simple and fast is set.
In 7th embodiment: also comprise and module is set, during for encrypting at every turn, password position is set.The diversity of embodiment of the present invention can be increased like this.
The difference of the 7th embodiment and the 5th embodiment is: one does not comprise and arranges module, and one comprises and arranges module for what arrange password position.
Seventh embodiment of the invention relates to a kind of encryption device of terminal, specifically as shown in figure 17.In the present embodiment, also comprise module is set; Arrange module for the operation setting password position according to user, the number of password position is identical with the number of icon information in encrypted message.
Because the 3rd embodiment is mutually corresponding with present embodiment, therefore present embodiment can be worked in coordination with the 3rd embodiment and be implemented.The relevant technical details mentioned in 3rd embodiment is still effective in the present embodiment, and the technique effect that can reach in the third embodiment can realize in the present embodiment too, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the 3rd embodiment.
In 6th embodiment: do not show password position during each deciphering, password position is identical, display module is only for providing initial decryption interface to verify decryption interface with display.Like this, user only need remember password position in advance, can save the time of terminal notifying password position, shortens decryption time, improves decryption efficiency.
In 8th embodiment: show password position (during adjacent twice deciphering, password position can be identical, also can be different) during each deciphering, display module is also for showing password position.
The difference of the 8th embodiment and the 6th embodiment is: a display module shows password position, and a display module does not show password position.
Eighth embodiment of the invention relates to a kind of decryption device.In the present embodiment, display module is also for showing password position.
Because the 4th embodiment is mutually corresponding with present embodiment, therefore present embodiment can be worked in coordination with the 4th embodiment and be implemented.The relevant technical details mentioned in 4th embodiment is still effective in the present embodiment, and the technique effect that can reach in the 4th embodiment can realize in the present embodiment too, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the 4th embodiment.
Persons of ordinary skill in the art may appreciate that the respective embodiments described above realize specific embodiments of the invention, and in actual applications, various change can be done to it in the form and details, and without departing from the spirit and scope of the present invention.

Claims (14)

1. a decryption method for terminal, is characterized in that, comprising:
There is provided initial decryption interface, described initial decryption interface comprises multiple different icon;
According to the decryption oprerations of user, shifting processing is carried out to the described icon in described initial decryption interface, is verified decryption interface;
Obtain the icon information of password position in described checking decryption interface;
When described icon information is identical with encrypted message, successful decryption.
2. the method for claim 1, is characterized in that, before carrying out shifting processing, also comprises:
Show described password position.
3. method as claimed in claim 2, it is characterized in that, the password position shown in adjacent twice deciphering is not identical.
4. method as claimed in claim 2, is characterized in that, also comprise: when deciphering is unsuccessful or according to the instruction of user, again show described password position.
5. the method for claim 1, is characterized in that, the password position used in each deciphering is identical.
6. the method for claim 1, is characterized in that, in adjacent twice deciphering, initial decryption interface is different.
7. the method for claim 1, is characterized in that, described icon comprises digital icon, the color icon or shaped icon.
8. an encryption method for terminal, is characterized in that, comprising:
There is provided encrypted interface, described encrypted interface comprises multiple different icon;
According to the cryptographic operation of user, setting code information, described encrypted message comprises two or more icon information in described encrypted interface.
9. method as claimed in claim 8, is characterized in that, also comprise:
Setting code position, the number of described password position is identical with the number of icon information in described encrypted message.
10. method as claimed in claim 8, it is characterized in that, described icon comprises digital icon, the color icon or shaped icon.
The decryption device of 11. 1 kinds of terminals, is characterized in that, comprising:
Display module, for providing initial decryption interface, described initial decryption interface comprises multiple different icon;
Receiver module, for receiving the decryption oprerations of user;
Processing module, for the decryption oprerations received according to described receiver module, the icon in the initial decryption interface show described display module carries out shifting processing, is verified decryption interface;
Acquisition module, for obtaining the icon information of password position in checking decryption interface that described processing module obtains;
Deciphering module, for verifying that whether described icon information is identical with encrypted message, and is decrypted when described icon information is identical with encrypted message.
12. devices as claimed in claim 11, is characterized in that, described display module, also for showing described password position.
The encryption device of 13. 1 kinds of terminals, is characterized in that, comprising:
Display module, for showing encrypted interface, described encrypted interface comprises multiple different icon;
Receiver module, for receiving the operation of user;
Encrypting module, for the user operation received according to described receiver module, arranges encrypted message, is encrypted described device, and described encrypted message comprises two or more icon information in described encrypted interface.
14. devices as claimed in claim 13, is characterized in that, also comprise and arrange module;
Describedly arrange module, for the operation setting password position according to user, the number of described password position is identical with the number of icon information in described encrypted message.
CN201510422494.7A 2015-07-17 2015-07-17 The encryption method and encryption device of terminal, the decryption method of terminal and decryption device Active CN104966014B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510422494.7A CN104966014B (en) 2015-07-17 2015-07-17 The encryption method and encryption device of terminal, the decryption method of terminal and decryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510422494.7A CN104966014B (en) 2015-07-17 2015-07-17 The encryption method and encryption device of terminal, the decryption method of terminal and decryption device

Publications (2)

Publication Number Publication Date
CN104966014A true CN104966014A (en) 2015-10-07
CN104966014B CN104966014B (en) 2018-09-04

Family

ID=54220052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510422494.7A Active CN104966014B (en) 2015-07-17 2015-07-17 The encryption method and encryption device of terminal, the decryption method of terminal and decryption device

Country Status (1)

Country Link
CN (1) CN104966014B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273721A (en) * 2017-06-14 2017-10-20 深圳天珑无线科技有限公司 To the processing method and processing device of application
CN107633167A (en) * 2017-09-04 2018-01-26 西安钛克韦尔信息科技有限公司 One kind applies decryption method, device and terminal
CN109298910A (en) * 2018-09-14 2019-02-01 Oppo广东移动通信有限公司 A kind of method, mobile terminal and the computer readable storage medium of window exhalation
WO2019056773A1 (en) * 2017-09-22 2019-03-28 西安中兴新软件有限责任公司 Application processing method, terminal and computer readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081488A (en) * 2009-11-30 2011-06-01 比亚迪股份有限公司 Safe lock input interface device and safe lock unlocking method
CN102455839A (en) * 2010-10-18 2012-05-16 中标软件有限公司 Method and system for unlocking touch screen equipment, and mobile terminal
CN103116465A (en) * 2013-02-06 2013-05-22 中标软件有限公司 Screen of electronic equipment or applied unlocking method and system
CN103310146A (en) * 2012-03-15 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Picture password protection method and terminal
CN103514394A (en) * 2012-12-10 2014-01-15 Tcl集团股份有限公司 Icon unlocking method of touch screen equipment and touch screen equipment
CN103885714A (en) * 2014-04-01 2014-06-25 深圳市东方拓宇科技有限公司 Touch screen locking method, touch screen and terminal comprising touch screen
CN104168360A (en) * 2014-08-20 2014-11-26 广东欧珀移动通信有限公司 Method and device for unlocking mobile terminal
CN104423873A (en) * 2013-09-11 2015-03-18 昆达电脑科技(昆山)有限公司 Unlocking method for mobile device and mobile device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081488A (en) * 2009-11-30 2011-06-01 比亚迪股份有限公司 Safe lock input interface device and safe lock unlocking method
CN102455839A (en) * 2010-10-18 2012-05-16 中标软件有限公司 Method and system for unlocking touch screen equipment, and mobile terminal
CN103310146A (en) * 2012-03-15 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Picture password protection method and terminal
CN103514394A (en) * 2012-12-10 2014-01-15 Tcl集团股份有限公司 Icon unlocking method of touch screen equipment and touch screen equipment
CN103116465A (en) * 2013-02-06 2013-05-22 中标软件有限公司 Screen of electronic equipment or applied unlocking method and system
CN104423873A (en) * 2013-09-11 2015-03-18 昆达电脑科技(昆山)有限公司 Unlocking method for mobile device and mobile device
CN103885714A (en) * 2014-04-01 2014-06-25 深圳市东方拓宇科技有限公司 Touch screen locking method, touch screen and terminal comprising touch screen
CN104168360A (en) * 2014-08-20 2014-11-26 广东欧珀移动通信有限公司 Method and device for unlocking mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273721A (en) * 2017-06-14 2017-10-20 深圳天珑无线科技有限公司 To the processing method and processing device of application
CN107633167A (en) * 2017-09-04 2018-01-26 西安钛克韦尔信息科技有限公司 One kind applies decryption method, device and terminal
WO2019056773A1 (en) * 2017-09-22 2019-03-28 西安中兴新软件有限责任公司 Application processing method, terminal and computer readable storage medium
CN109543370A (en) * 2017-09-22 2019-03-29 西安中兴新软件有限责任公司 A kind of application processing method, terminal and computer readable storage medium
CN109543370B (en) * 2017-09-22 2024-01-23 西安中兴新软件有限责任公司 Application processing method, terminal and computer readable storage medium
CN109298910A (en) * 2018-09-14 2019-02-01 Oppo广东移动通信有限公司 A kind of method, mobile terminal and the computer readable storage medium of window exhalation

Also Published As

Publication number Publication date
CN104966014B (en) 2018-09-04

Similar Documents

Publication Publication Date Title
Sabzevar et al. Universal multi-factor authentication using graphical passwords
US20150349966A1 (en) Client/server access authentication
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
CN102833066B (en) Three-party authentication method and device as well as intelligent card supporting two-way authentication
US20130097427A1 (en) Soft-Token Authentication System
CN104537300A (en) Safe password setting and verifying mode
CN104424409A (en) Application unlocking method and device
CN104966014A (en) Terminal encryption method and apparatus and terminal decryption method and apparatus
CN104751538A (en) Implementation method for opening access controller, and access control system
CN104091133A (en) Method for protecting security of terminal, terminal and system
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN101582896A (en) Third-party network authentication system and authentication method thereof
CN105046123A (en) System for using picture to realize password security and setting method for using picture to realize password security
KR101228090B1 (en) System and method for inputing password
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN103684758A (en) User password mixing encryption method and system
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
CN103164661A (en) Device and method used for managing data in terminal
CN105335672A (en) Security mode prompting method and apparatus
Divya et al. An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis
CN108021813A (en) Method for protecting the transaction performed from non-security terminal
CN107690789A (en) The method being authenticated using local factor pair authenticating device communication with least one certificate server
CN108009418A (en) For the method by non-security terminal authentication user
CN104660786A (en) Mobile terminal, setting method of unlocking password and unlocking method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Building 1, 399 Keyuan Road, China (Shanghai) pilot Free Trade Zone, 201203

Patentee after: Huaqin Technology Co.,Ltd.

Address before: Building 1, No. 399 Keyuan Road, Pudong New Area, Shanghai, 201203

Patentee before: Huaqin Technology Co.,Ltd.

Address after: Building 1, No. 399 Keyuan Road, Pudong New Area, Shanghai, 201203

Patentee after: Huaqin Technology Co.,Ltd.

Address before: 201203 Building 1, No.399 Keyuan Road, Pudong New Area pilot Free Trade Zone, Shanghai

Patentee before: HUAQIN TELECOM TECHNOLOGY Co.,Ltd.