CN105357011A - Encryption and decryption methods and systems, and terminal - Google Patents

Encryption and decryption methods and systems, and terminal Download PDF

Info

Publication number
CN105357011A
CN105357011A CN201510689746.2A CN201510689746A CN105357011A CN 105357011 A CN105357011 A CN 105357011A CN 201510689746 A CN201510689746 A CN 201510689746A CN 105357011 A CN105357011 A CN 105357011A
Authority
CN
China
Prior art keywords
encryption
decryption
acts
characteristic parameter
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510689746.2A
Other languages
Chinese (zh)
Inventor
张武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510689746.2A priority Critical patent/CN105357011A/en
Publication of CN105357011A publication Critical patent/CN105357011A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides encryption and decryption methods and systems, and a terminal. The encryption method comprises the following steps of collecting characteristic parameters of an encryption action; and carrying out encryption operation on the characteristic parameters of the encryption action by utilizing a preset encryption algorithm in order to obtain an encryption password. The decryption method comprises the following steps of collecting characteristic parameters of a decryption action; carrying out decryption operation on the characteristic parameters of the decryption action by utilizing a preset decryption algorithm in order to obtain a decryption result; and judging whether the decryption result is consistent to the pre-stored encryption password, if yes, successfully decrypting, otherwise failing to decrypt. According to the encryption and decryption methods and systems, and the terminal, the own favorite action can be taken as a password of a mobile phone randomly, the password forms are rich and varied, the encryption way has strong personality and is more attractive and higher in security. Meanwhile, recording and decryption of the password are processed through combination with a fuzzy algorithm, so that the security of the password is better, the accuracy rate is higher and the efficiency is higher.

Description

A kind of encryption, decryption method, system and terminal
Technical field
The invention belongs to communication technical field, relate to a kind of encryption, decryption method, system and terminal.
Background technology
Existing relatively more conventional mobile phone cipher mode has the cipher mode such as figure pattern and pattern pattern.Figure pattern is the cipher mode based on pure digi-tal, and cryptogram form is dull, simply.Pattern pattern is a kind of mode of nine grids being connected, and cipher mode is relatively less.Above-mentioned cipher mode has not had any attraction for the young man pursuing fresh stimulation.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide a kind of encryption, decryption method, system and terminal, dull for the manner of decryption form solving existing mobile phone, simply, do not have attractive problem.
For achieving the above object and other relevant objects, the invention provides a kind of encryption method, described encryption method comprises: the characteristic parameter gathering encryption acts; Utilize the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtain Crypted password.
Preferably, the characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration.
Preferably, described cryptographic algorithm is fuzzy algorithmic approach.
The present invention also provides a kind of decryption method, described decryption method bag: the characteristic parameter gathering decryption acts; Utilize the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtain decrypted result; Judge that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then successful decryption; Otherwise decipher unsuccessfully.
Preferably, the characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration.
Preferably, described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.
The present invention also provides a kind of encryption system, and described encryption system comprises: encryption acts module, gathers the characteristic parameter of encryption acts; Cryptographic calculation module, is connected with described encryption acts module, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password.
Preferably, the characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration; Described cryptographic algorithm is fuzzy algorithmic approach.
The present invention also provides a kind of decryption system, and described decryption system comprises: decryption acts module, gathers the characteristic parameter of decryption acts; Decrypt operation module, is connected with described decryption acts module, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result; Deciphering determination module, is connected with described decrypt operation module, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
Preferably, the characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration; Described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.
The present invention also provides a kind of terminal, and described terminal comprises: memory module; Processing module, is connected with described memory module, comprises: encryption acts unit, gathers the characteristic parameter of encryption acts; Cryptographic calculation unit, is connected with described encryption acts unit, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password, be stored in described memory module; Decryption acts unit, gathers the characteristic parameter of decryption acts; Decrypt operation unit, is connected with described decryption acts unit, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result; Deciphering identifying unit, is connected respectively with memory module with described decrypt operation unit, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
As mentioned above, encryption of the present invention, decryption method, system and terminal, have following beneficial effect:
The present invention can randomly using the action oneself liked as the password of mobile phone, and cryptogram form is rich and varied, and cipher mode has extremely strong individual character, more attractive, and fail safe is simultaneously higher.Meanwhile, in conjunction with typing and the deciphering of fuzzy algorithmic approach process password, the fail safe of password can be made so better, and accuracy rate is higher, and efficiency is also higher.
Accompanying drawing explanation
Fig. 1 is shown as a kind of realization flow schematic diagram of the encryption method described in the embodiment of the present invention.
Fig. 2 is shown as a kind of implementation structure schematic diagram of the encryption system described in the embodiment of the present invention.
Fig. 3 is shown as a kind of realization flow schematic diagram of the decryption method described in the embodiment of the present invention.
Fig. 4 is shown as a kind of implementation structure schematic diagram of the decryption system described in the embodiment of the present invention.
Fig. 5 is shown as a kind of implementation structure schematic diagram of the terminal described in the embodiment of the present invention.
Element numbers explanation
200 encryption systems
210 encryption acts modules
220 cryptographic calculation modules
400 decryption systems
410 decryption acts modules
420 decrypt operation modules
430 deciphering determination modules
500 terminals
510 memory modules
520 processing modules
521 encryption acts unit
522 cryptographic calculation unit
523 decryption acts unit
524 decrypt operation unit
525 deciphering identifying units
S101 ~ S102 step
S301 ~ S303 step
Embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art the content disclosed by this specification can understand other advantages of the present invention and effect easily.The present invention can also be implemented or be applied by embodiments different in addition, and the every details in this specification also can based on different viewpoints and application, carries out various modification or change not deviating under spirit of the present invention.It should be noted that, when not conflicting, the feature in following examples and embodiment can combine mutually.
It should be noted that, the diagram provided in following examples only illustrates basic conception of the present invention in a schematic way, then only the assembly relevant with the present invention is shown in graphic but not component count, shape and size when implementing according to reality is drawn, it is actual when implementing, and the kenel of each assembly, quantity and ratio can be a kind of change arbitrarily, and its assembly layout kenel also may be more complicated.
Refer to Fig. 1, the invention provides a kind of encryption method, described encryption method comprises:
S101, gathers the characteristic parameter of encryption acts.The characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration.Such as, utilize gravity sensor to respond to a series of parameter values such as detecting the acceleration magnitude of encryption acts and direction, thus determine the particular content of encryption acts.
S102, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password.Wherein, described cryptographic algorithm is chosen as fuzzy algorithmic approach.Described fuzzy algorithmic approach is by the analysis to real-world object, deal with data also builds fuzzy type Mathematical Modeling, by membership, data element set is become fuzzy set flexibly, determine membership function, carry out fuzzy statistics many empirically with the mental process of people, it carries out often by mental measurement, its research be the ambiguity of things itself.This step utilizes fuzzy algorithmic approach determination membership function, by using a series of parameter values such as obtained acceleration magnitude and directions as the input of membership function, draw and be subordinate to angle value accordingly, be i.e. described Crypted password.
In ciphering process, different membership functions can be chosen, generate the password of varying strength.Divide thinner membership function for fuzzy field, the Cipher Strength of generation is higher, and correspondingly, required action accuracy is also higher; On the contrary, divide thicker membership function for fuzzy field, the Cipher Strength of generation is lower, and the Cipher Strength of generation is lower, and required action accuracy is corresponding also lower.
Particularly, in actual applications, ciphering process can comprise the steps:
1) start password to arrange, select Cipher Strength.
2) characteristic parameter of encryption acts is gathered, as: utilize gravity sensor to check acceleration magnitude and the direction of encryption acts;
3) by described characteristic parameter input membership function, obtain and be subordinate to angle value accordingly;
4) again repeat encryption acts, utilize step 2) to 3) obtain superencipher action be subordinate to angle value;
5) judge described superencipher action be subordinate to angle value with first time encryption acts whether be subordinate to angle value identical;
6) if twice encryption acts to be subordinate to angle value identical, then password arranges successfully, is subordinate to angle value described in preservation;
7) if twice encryption acts to be subordinate to angle value not identical, then again make password action and password be set.
Action as encryption element, utilizes cryptographic algorithm to carry out computing to encryption element, draws Crypted password by encryption method of the present invention.This password cannot be identified by outside, has higher confidentiality.Encryption element is also not easily found by stranger or identifies, improves the reliability of encryption.In addition, cryptographic algorithm is fuzzy algorithmic approach, is not easily cracked, and further improves confidentiality.
The protection range of encryption method of the present invention is not limited to the step execution sequence that the present embodiment is enumerated, and the step increase and decrease of the prior art that every principle according to the present invention is done, step are replaced the scheme realized and be all included in protection scope of the present invention.
The present invention also provides a kind of encryption system; described encryption system can realize encryption method of the present invention; but the implement device of encryption method of the present invention includes but not limited to the cryptographic structure that the present embodiment is enumerated; the malformation of the prior art that every principle according to the present invention is done and replacement, be all included in protection scope of the present invention.
Shown in Figure 2, described encryption system 200 comprises: encryption acts module 210, cryptographic calculation module 220.
Described encryption acts module 210 gathers the characteristic parameter of encryption acts.The characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration.Such as, utilize gravity sensor to respond to a series of parameter values such as detecting the acceleration magnitude of encryption acts and direction, thus determine the particular content of encryption acts.
Described cryptographic calculation module 220 is connected with described encryption acts module 210, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password.Described cryptographic algorithm is chosen as fuzzy algorithmic approach.Described fuzzy algorithmic approach is by the analysis to real-world object, deal with data also builds fuzzy type Mathematical Modeling, by membership, data element set is become fuzzy set flexibly, determine membership function, carry out fuzzy statistics many empirically with the mental process of people, it carries out often by mental measurement, its research be the ambiguity of things itself.This step utilizes fuzzy algorithmic approach determination membership function, by using a series of parameter values such as obtained acceleration magnitude and directions as the input of membership function, draw and be subordinate to angle value accordingly, be i.e. described Crypted password.
In ciphering process, different membership functions can be chosen, generate the password of varying strength.Divide thinner membership function for fuzzy field, the Cipher Strength of generation is higher, and correspondingly, required action accuracy is also higher; On the contrary, divide thicker membership function for fuzzy field, the Cipher Strength of generation is lower, and the Cipher Strength of generation is lower, and required action accuracy is corresponding also lower.
Particularly, in actual applications, the course of work of encryption system comprises the steps:
1) start password to arrange, select Cipher Strength.
2) characteristic parameter of encryption acts module acquires encryption acts, as: utilize gravity sensor to check acceleration magnitude and the direction of encryption acts;
3) cryptographic calculation module is by described characteristic parameter input membership function, obtains and is subordinate to angle value accordingly;
4) again repeat encryption acts, utilize step 2) to 3) obtain superencipher action be subordinate to angle value;
5) encrypt determination module judge described superencipher action be subordinate to angle value and for the first time encryption acts whether be subordinate to angle value identical;
6) if twice encryption acts to be subordinate to angle value identical, then password arranges successfully, encryption determination module preserve described in be subordinate to angle value;
7) if twice encryption acts to be subordinate to angle value not identical, then again make password action and password be set.
Action as encryption element, utilizes cryptographic algorithm to carry out computing to encryption element, draws Crypted password by encryption system of the present invention.This password cannot be identified by outside, has higher confidentiality.Encryption element is also not easily found by stranger or identifies, improves the reliability of encryption.In addition, cryptographic algorithm is fuzzy algorithmic approach, is not easily cracked, and further improves confidentiality.
The present invention also provides a kind of decryption method, described decryption method and the encryption method described in the embodiment of the present invention be mate corresponding.
Shown in Figure 3, described decryption method bag:
S301, gathers the characteristic parameter of decryption acts.The characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration.Such as, utilize gravity sensor to respond to a series of parameter values such as detecting the acceleration magnitude of decryption acts and direction, thus determine the particular content of decryption acts.
S302, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result.Described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.Described fuzzy algorithmic approach is by the analysis to real-world object, deal with data also builds fuzzy type Mathematical Modeling, by membership, data element set is become fuzzy set flexibly, determine membership function, carry out fuzzy statistics many empirically with the mental process of people, it carries out often by mental measurement, its research be the ambiguity of things itself.This step utilizes fuzzy algorithmic approach determination membership function, by using a series of parameter values such as the acceleration magnitude of obtained decryption acts and directions as the input of membership function, draw and be subordinate to angle value accordingly, be i.e. described clear crytpographic key.
In ciphering process, different membership functions can be chosen, generate the password of varying strength.Divide thinner membership function for fuzzy field, the Cipher Strength of generation is higher, and correspondingly, required action accuracy is also higher; On the contrary, divide thicker membership function for fuzzy field, the Cipher Strength of generation is lower, and the Cipher Strength of generation is lower, and required action accuracy is corresponding also lower.Decrypting process mates corresponding with ciphering process.
S303, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
Particularly, in actual applications, decrypting process can comprise the steps:
1) deciphering is started;
2) characteristic parameter of decryption acts is gathered, as: utilize gravity sensor to check acceleration magnitude and the direction of decryption acts;
3) by the characteristic parameter of described decryption acts input membership function, obtain corresponding deciphering and be subordinate to angle value;
4) deciphering is subordinate to angle value to be subordinate to angle value with the encryption prestored and to want to compare, if meet decryption condition, then successful decryption; If do not conform to symbol decryption condition, then decipher failure.
The protection range of decryption method of the present invention is not limited to the step execution sequence that the present embodiment is enumerated, and the step increase and decrease of the prior art that every principle according to the present invention is done, step are replaced the scheme realized and be all included in protection scope of the present invention.
The present invention also provides a kind of decryption system; described decryption system can realize decryption method of the present invention; but the implement device of decryption method of the present invention includes but not limited to the cryptographic structure that the present embodiment is enumerated; the malformation of the prior art that every principle according to the present invention is done and replacement, be all included in protection scope of the present invention.
Shown in Figure 4, described decryption system 400 comprises: decryption acts module 410, decrypt operation module 420, deciphering determination module 430.
Described decryption acts module 410 gathers the characteristic parameter of decryption acts.The characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration.Such as, utilize gravity sensor to respond to a series of parameter values such as detecting the acceleration magnitude of decryption acts and direction, thus determine the particular content of decryption acts.
Described decrypt operation module 420 is connected with described decryption acts module 410, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result.Described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.Described fuzzy algorithmic approach is by the analysis to real-world object, deal with data also builds fuzzy type Mathematical Modeling, by membership, data element set is become fuzzy set flexibly, determine membership function, carry out fuzzy statistics many empirically with the mental process of people, it carries out often by mental measurement, its research be the ambiguity of things itself.This step utilizes fuzzy algorithmic approach determination membership function, by using a series of parameter values such as the acceleration magnitude of obtained decryption acts and directions as the input of membership function, draw and be subordinate to angle value accordingly, be i.e. described clear crytpographic key.
In ciphering process, different membership functions can be chosen, generate the password of varying strength.Divide thinner membership function for fuzzy field, the Cipher Strength of generation is higher, and correspondingly, required action accuracy is also higher; On the contrary, divide thicker membership function for fuzzy field, the Cipher Strength of generation is lower, and the Cipher Strength of generation is lower, and required action accuracy is corresponding also lower.Decrypting process mates corresponding with ciphering process.
Described deciphering determination module 430 is connected with described decrypt operation module 420, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
Particularly, in actual applications, decrypting process can comprise the steps:
1) deciphering is started;
2) characteristic parameter of decryption acts is gathered, as: utilize gravity sensor to check acceleration magnitude and the direction of decryption acts;
3) by the characteristic parameter of described decryption acts input membership function, obtain corresponding deciphering and be subordinate to angle value;
4) deciphering is subordinate to angle value to be subordinate to angle value with the encryption prestored and to want to compare, if meet decryption condition, then successful decryption; If do not conform to symbol decryption condition, then decipher failure.
The present invention also provides a kind of terminal; described terminal can realize encryption of the present invention, decryption method and system; but the implement device of terminal of the present invention includes but not limited to the structure of encryption that the present embodiment enumerates, decryption system; the malformation of the prior art that every principle according to the present invention is done and replacement, be all included in protection scope of the present invention.
Shown in Figure 5, described terminal 500 comprises: the memory module 510 be connected and processing module 520.Described processing module 520 comprises: encryption acts unit 521, cryptographic calculation unit 522, decryption acts unit 523, decrypt operation unit 524, deciphering identifying unit 525.
Described encryption acts unit 521 gathers the characteristic parameter of encryption acts.The characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration.Such as, utilize gravity sensor to respond to a series of parameter values such as detecting the acceleration magnitude of encryption acts and direction, thus determine the particular content of encryption acts.
Described cryptographic calculation unit 522 is connected with described encryption acts unit 521, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password, be stored in described storing module 510.Described cryptographic algorithm is chosen as fuzzy algorithmic approach.Described fuzzy algorithmic approach is by the analysis to real-world object, deal with data also builds fuzzy type Mathematical Modeling, by membership, data element set is become fuzzy set flexibly, determine membership function, carry out fuzzy statistics many empirically with the mental process of people, it carries out often by mental measurement, its research be the ambiguity of things itself.This step utilizes fuzzy algorithmic approach determination membership function, by using a series of parameter values such as obtained acceleration magnitude and directions as the input of membership function, draw and be subordinate to angle value accordingly, be i.e. described Crypted password.In ciphering process, different membership functions can be chosen, generate the password of varying strength.Divide thinner membership function for fuzzy field, the Cipher Strength of generation is higher, and correspondingly, required action accuracy is also higher; On the contrary, divide thicker membership function for fuzzy field, the Cipher Strength of generation is lower, and the Cipher Strength of generation is lower, and required action accuracy is corresponding also lower.
Described decryption acts unit 523 gathers the characteristic parameter of decryption acts.The characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration.Such as, utilize gravity sensor to respond to a series of parameter values such as detecting the acceleration magnitude of decryption acts and direction, thus determine the particular content of decryption acts.
Described decrypt operation unit 524 is connected with described decryption acts unit 523, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result.Described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.Described fuzzy algorithmic approach is by the analysis to real-world object, deal with data also builds fuzzy type Mathematical Modeling, by membership, data element set is become fuzzy set flexibly, determine membership function, carry out fuzzy statistics many empirically with the mental process of people, it carries out often by mental measurement, its research be the ambiguity of things itself.This step utilizes fuzzy algorithmic approach determination membership function, by using a series of parameter values such as the acceleration magnitude of obtained decryption acts and directions as the input of membership function, draw and be subordinate to angle value accordingly, be i.e. described clear crytpographic key.In ciphering process, different membership functions can be chosen, generate the password of varying strength.Divide thinner membership function for fuzzy field, the Cipher Strength of generation is higher, and correspondingly, required action accuracy is also higher; On the contrary, divide thicker membership function for fuzzy field, the Cipher Strength of generation is lower, and the Cipher Strength of generation is lower, and required action accuracy is corresponding also lower.Decrypting process mates corresponding with ciphering process.
Described deciphering identifying unit 525 is connected with memory module 510 respectively with described decrypt operation unit 524, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
For mobile phone, exemplary illustration is carried out to the encryption process of described terminal.Usual mobile phone is all with cipher protection function, and the present invention can apply a kind of new password generating mode on traditional mobile phone, namely adopts the action of mobile phone owner to encrypt and decrypt.By being built in the gravity sensor in mobile phone, detect a series of parameter value such as corresponding acceleration magnitude and direction when user makes encryption acts; Recycling fuzzy algorithmic approach, determine membership function, by using the input parameter of a series of parameter value of obtained acceleration magnitude and direction as membership function, draw and be subordinate to angle value accordingly, then the membership values of gained is stored in mobile phone as the enciphered data corresponding to this action, to carry out contrast checking when user's deciphering.Finally, when user needs to enter mobile phone by input password, just need to make corresponding action, then mobile phone detects the size and Orientation of corresponding acceleration by gravity sensor, calls membership function and carries out computing, what obtain this decryption acts is subordinate to angle value, then compare with the password value being stored in interior of mobile phone, if meet, successful decryption, otherwise, decipher unsuccessfully, re-enter decryption acts.
Present invention incorporates gravity sensor and fuzzy algorithmic approach two kinds of password generation techniques, by converting the action of user to cell phone password, therefore user can arrange various informative action password, and individual character is extremely strong.In addition, the present invention utilizes fuzzy algorithmic approach, by optional membership function, arranges different Cipher Strengths, substantially increases flexibility, simultaneously compromise between security and accuracy.
The present invention has given full play to the subjective initiative of user, and arrange colourful action password, have a strong temperament, have employed fuzzy algorithmic approach simultaneously, improves the recognition accuracy to action, and then improves the accuracy of deciphering.
Encryption and decryption can be carried out by the limb action of cellie to mobile phone if just think, be how dazzle cruel.Such people just can prefer by making oneself, more cruel action encrypts and decrypts mobile phone, not only new and original but also be full of extremely strong personal color, simultaneously such cipher mode is also safer, is the encryption acts cannot knowing you because strange.
The present invention can randomly using the action oneself liked as the password of mobile phone, and cryptogram form is rich and varied, and cipher mode has extremely strong individual character, more attractive, and fail safe is simultaneously higher.Meanwhile, in conjunction with typing and the deciphering of fuzzy algorithmic approach process password, the fail safe of password can be made so better, and accuracy rate is higher, and efficiency is also higher.
In sum, the present invention effectively overcomes various shortcoming of the prior art and tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any person skilled in the art scholar all without prejudice under spirit of the present invention and category, can modify above-described embodiment or changes.Therefore, such as have in art usually know the knowledgeable do not depart from complete under disclosed spirit and technological thought all equivalence modify or change, must be contained by claim of the present invention.

Claims (11)

1. an encryption method, is characterized in that, described encryption method comprises:
Gather the characteristic parameter of encryption acts;
Utilize the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtain Crypted password.
2. encryption method according to claim 1, is characterized in that: the characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration.
3. encryption method according to claim 1, is characterized in that: described cryptographic algorithm is fuzzy algorithmic approach.
4. a decryption method, is characterized in that, described decryption method bag:
Gather the characteristic parameter of decryption acts;
Utilize the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtain decrypted result;
Judge that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then successful decryption; Otherwise decipher unsuccessfully.
5. encryption method according to claim 4, is characterized in that: the characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration.
6. encryption method according to claim 4, is characterized in that: described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.
7. an encryption system, is characterized in that, described encryption system comprises:
Encryption acts module, gathers the characteristic parameter of encryption acts;
Cryptographic calculation module, is connected with described encryption acts module, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password.
8. encryption system according to claim 7, is characterized in that: the characteristic parameter of described encryption acts comprises the acceleration of motion of encryption acts, the direction of motion or/and run duration; Described cryptographic algorithm is fuzzy algorithmic approach.
9. a decryption system, is characterized in that, described decryption system comprises:
Decryption acts module, gathers the characteristic parameter of decryption acts;
Decrypt operation module, is connected with described decryption acts module, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result;
Deciphering determination module, is connected with described decrypt operation module, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
10. decryption system according to claim 9, is characterized in that: the characteristic parameter of described decryption acts comprises the acceleration of motion of decryption acts, the direction of motion or/and run duration; Described decipherment algorithm is identical with corresponding cryptographic algorithm, is fuzzy algorithmic approach.
11. 1 kinds of terminals, is characterized in that, described terminal comprises:
Memory module;
Processing module, is connected with described memory module, comprises:
Encryption acts unit, gathers the characteristic parameter of encryption acts;
Cryptographic calculation unit, is connected with described encryption acts unit, utilizes the characteristic parameter of cryptographic algorithm to described encryption acts preset to be encrypted computing, obtains Crypted password, be stored in described memory module;
Decryption acts unit, gathers the characteristic parameter of decryption acts;
Decrypt operation unit, is connected with described decryption acts unit, utilizes the characteristic parameter of decipherment algorithm to described decryption acts preset to be decrypted computing, obtains decrypted result;
Deciphering identifying unit, is connected respectively with memory module with described decrypt operation unit, judges that whether described decrypted result is consistent with the Crypted password prestored, if unanimously, then and successful decryption; Otherwise decipher unsuccessfully.
CN201510689746.2A 2015-10-22 2015-10-22 Encryption and decryption methods and systems, and terminal Pending CN105357011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510689746.2A CN105357011A (en) 2015-10-22 2015-10-22 Encryption and decryption methods and systems, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510689746.2A CN105357011A (en) 2015-10-22 2015-10-22 Encryption and decryption methods and systems, and terminal

Publications (1)

Publication Number Publication Date
CN105357011A true CN105357011A (en) 2016-02-24

Family

ID=55332890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510689746.2A Pending CN105357011A (en) 2015-10-22 2015-10-22 Encryption and decryption methods and systems, and terminal

Country Status (1)

Country Link
CN (1) CN105357011A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452787A (en) * 2016-10-13 2017-02-22 广东欧珀移动通信有限公司 Data verification method and device
CN114978727A (en) * 2022-05-27 2022-08-30 中国银行股份有限公司 Business processing method, device, medium and program product based on password transformation
US11899778B2 (en) 2017-09-30 2024-02-13 Huawei Technologies Co., Ltd. Password verification method, password setting method, and mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070115344A1 (en) * 2005-11-08 2007-05-24 Lg Electronics Inc. Data encryption/decryption method and mobile terminal for use in the same
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102724034A (en) * 2012-05-17 2012-10-10 人民搜索网络股份公司 Encryption/decryption system and method based on space motion
CN103647653A (en) * 2013-12-24 2014-03-19 深圳国微技术有限公司 Certification and key agreement method between devices
CN104283876A (en) * 2014-09-29 2015-01-14 小米科技有限责任公司 Operation authorization method and device
CN104462938A (en) * 2014-12-09 2015-03-25 上海斐讯数据通信技术有限公司 Intelligent equipment and unlock method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070115344A1 (en) * 2005-11-08 2007-05-24 Lg Electronics Inc. Data encryption/decryption method and mobile terminal for use in the same
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102724034A (en) * 2012-05-17 2012-10-10 人民搜索网络股份公司 Encryption/decryption system and method based on space motion
CN103647653A (en) * 2013-12-24 2014-03-19 深圳国微技术有限公司 Certification and key agreement method between devices
CN104283876A (en) * 2014-09-29 2015-01-14 小米科技有限责任公司 Operation authorization method and device
CN104462938A (en) * 2014-12-09 2015-03-25 上海斐讯数据通信技术有限公司 Intelligent equipment and unlock method thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106452787A (en) * 2016-10-13 2017-02-22 广东欧珀移动通信有限公司 Data verification method and device
CN106452787B (en) * 2016-10-13 2019-05-24 Oppo广东移动通信有限公司 Data verification method and device
US11899778B2 (en) 2017-09-30 2024-02-13 Huawei Technologies Co., Ltd. Password verification method, password setting method, and mobile terminal
CN114978727A (en) * 2022-05-27 2022-08-30 中国银行股份有限公司 Business processing method, device, medium and program product based on password transformation

Similar Documents

Publication Publication Date Title
CN104331653A (en) Fingerprint decryption method and fingerprint decryption device
CN106101150B (en) The method and system of Encryption Algorithm
CN105429761A (en) Key generation method and device
CN105376051A (en) Encryption method and apparatus, and terminal
CN104134022A (en) Information hiding and protecting method based on image
CN108111524A (en) Terminal data protection method and system based on private key dynamic generation mechanism
CN102419805A (en) Terminal equipment and method for encrypting user information
CN103731258A (en) Method and device for generating secret key
CN104579680B (en) A kind of method of secure distribution seed
CN109168162A (en) Bluetooth communication encryption method, device and intelligent security guard equipment
CN101859351A (en) System and method for ensuring safe read of data stored in storage
CN101789862A (en) Encryption and decryption device and method based on gravity acceleration
CN201518127U (en) Encrypted mobile memory based on password authentication
CN107517217A (en) A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN105064805A (en) Intelligent door lock control system
CN105007256A (en) Security module for secure function execution on untrusted platform
CN106648583B (en) Information processing method and terminal
CN105357011A (en) Encryption and decryption methods and systems, and terminal
CN104915583A (en) Interface decryption processing method and mobile terminal
CN105306200B (en) The encryption method and device of network account password
CN105426727A (en) Fingerprint decryption method and mobile terminal
CN113722741A (en) Data encryption method and device and data decryption method and device
CN112272090B (en) Key generation method and device
CN105825135A (en) Encryption chip, encryption system, encryption method and decryption method
CN106452754B (en) Multi-user online dynamic encryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160224

RJ01 Rejection of invention patent application after publication