CN105608368A - Decryption method, cryptosystem and mobile terminal - Google Patents
Decryption method, cryptosystem and mobile terminal Download PDFInfo
- Publication number
- CN105608368A CN105608368A CN201410628858.2A CN201410628858A CN105608368A CN 105608368 A CN105608368 A CN 105608368A CN 201410628858 A CN201410628858 A CN 201410628858A CN 105608368 A CN105608368 A CN 105608368A
- Authority
- CN
- China
- Prior art keywords
- password
- input
- terminal
- cipher
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephone Function (AREA)
Abstract
The present invention relates to a decryption method, a cryptosystem and a mobile terminal. The decryption method comprises: inputting a cipher; determining whether the input cipher is a set cipher and whether the set cipher is in an activated state; if yes, decrypting a terminal, invalidating a currently used cipher, and activating another set cipher; and enabling the terminal to be decrypted next time only when a cipher in the activated state is input. With adoption of the technical scheme, worries about revealing the cipher can be removed even if cipher unlocking is seen by others during decryption. Furthermore, even if unlocking traces are left on the screen of an intelligent terminal, others cannot unlock the intelligent terminal. The technical scheme is particularly applicable to a pattern encryption/decryption manner.
Description
Technical field
The present invention relates to decryption technology field, particularly a kind of decryption method, a kind of cryptographic system and one utilize this closeCode system is realized the anti-mobile terminal cracking.
Background technology
Along with the fast development of intelligent terminal, it become in people life widely use, indispensable electronic product.Especially smart mobile phone.
But, in the service that the life that is just people at intelligent terminal brings convenience, provides is also more and more abundanter, societyIn some lawless persons also start sight to keep a close watch on user's intelligent terminal. For example: for smart mobile phone, due toIn mobile phone, must store user's associated person information, and even also may store use in some high-end smart mobile phonesThe privacy information at family, important business information etc. Therefore,, once mobile phone is stolen, what user lost will be far above oneThe value of mobile phone.
Just cryptographic system has been born under such situation. In the terminal that is provided with cryptographic system, in the time entering user interface,Cryptographic system all can require user to input default password, and so, thief is impossible learn this as disabled userDefault terminal password, and this terminal password not, terminal cannot enter intelligent function duty, thereby cannotGet a glimpse of the information of validated user.
But such terminal password system still exists defect:
On the one hand, conventional cryptographic system only arranges a password substantially, the password that judges input whether with the password prestoringUnanimously; As unanimously, release; As inconsistent, Decryption failures. Thief has certain probability close by constantly carrying outCode test is successfully deciphering finally, causes the security deficiency of cryptographic system. In addition, user, in the time of deciphering, is easy to by othersPeep, thereby encrypted message is lost.
On the other hand, concerning pattern encrypting and decrypting mode, after having deciphered, on screen, can leave over the vestige of finger release. makeBecome password loss, the problems such as information leakage.
Summary of the invention
Technical problem to be solved by this invention is to be difficult to tackle user's request feelings in order to overcome cryptographic system of the prior artCondition and security deficiency, propose a kind of decryption method, a kind of cryptographic system and one and utilize this cryptographic system to realize anti-breakingThe mobile terminal of separating, is retained in the password track on screen can improve because of intelligent terminal input password simultaneously time, and password is brokenThe problem of separating.
For achieving the above object, the invention provides a kind of decryption method, comprising:
Input a password;
Whether the password that judges input is the password arranging, and whether the password arranging is in state of activation; If so, eventuallyEnd deciphering, the password of current use temporarily lost efficacy, and the password of other settings is activated; Need to input one in swashing next timeThe password of the state of living could be realized terminal deciphering.
Preferably, the number of the password of described setting is at least two.
Preferably, also comprise:
When the number of times of input password error exceedes N continuously, can verify that entering password resets by problem;
Password is decrypted terminal after resetting.
Preferably, the problem relating to when the checking of described problem is user-dependent not personal information elusively.
For achieving the above object, the present invention also provides a kind of cryptographic system, comprising:
Input block, for inputting a password;
Whether decryption unit is the password arranging, and whether the password arranging is in state of activation for the password that judges input;If so, terminal deciphering, the password of current use temporarily lost efficacy, and the password of other settings is activated; Need defeated next timeEnter a password in state of activation and could realize terminal deciphering.
The number of the password that preferably, described cryptographic system arranges is at least two.
Preferably, also comprise:
Password reset cell, while exceeding N, can be verified and be entered password weight by problem for the number of times of input password error continuouslyPut.
Preferably, the problem that described password reset cell relates in the time that problem is verified is user-dependent individual letter elusivelyBreath.
The present invention also aims to provide a kind of utilizes above-mentioned cryptographic system to realize the anti-mobile terminal cracking.
Technique scheme has following beneficial effect: adopt the technical program when deciphering, even seen by others' when unlocking pinSee, also do not worry password leakage. In addition, even if leave over release vestige on intelligent terminal screen, other people can not separateLock intelligent terminal; The technical program is especially particularly applicable to pattern encrypting and decrypting mode.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing skillIn art description, the accompanying drawing of required use is briefly described, and apparently, the accompanying drawing in the following describes is only the present inventionSome embodiment, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also rootObtain other accompanying drawing according to these accompanying drawings.
Fig. 1 schematically shows the application schematic diagram in cell phone system according to the decryption method of embodiment of the present invention;
Fig. 2 schematically shows the decryption method schematic diagram according to embodiment of the present invention;
Fig. 3 schematically shows according to the decryption method flow chart after the optimization of embodiment of the present invention;
Fig. 4 schematically shows according to the structured flowchart of the cryptographic system of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly and completelyDescribe, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiment. Based on thisEmbodiment in invention, those of ordinary skill in the art are not making the every other reality obtaining under creative work prerequisiteExecute example, all belong to the scope of protection of the invention.
One skilled in the art will appreciate that embodiments of the present invention can be implemented as a kind of system, device, equipment, sideMethod or computer program. Therefore, the disclosure can specific implementation be following form, that is: hardware, complete completelyFull software (comprising firmware, resident software, microcode etc.), or the form of hardware and software combination.
According to summary of the invention part of the present invention, having proposed a kind of decryption method, a kind of cryptographic system and a kind of utilization shouldCryptographic system realizes the anti-mobile terminal cracking.
In this article, it will be appreciated that, related term " state of activation " represents that user is in the time of terminal deciphering,The password of input is one of password arranging in advance, and can realize the state that intelligent terminal is successfully deciphered. Wherein, closeThe concrete composition of code can have multiple, is not limited to numerical ciphers, alphabetical password, can also be that numeral adds monogramThe password becoming. In addition, any number of elements in accompanying drawing is all unrestricted for example, and any name is all only usedIn differentiation, and do not there is any limitation.
Below with reference to some representative embodiments of the present invention, explain in detail principle of the present invention and spirit.
Summary of the invention
Existing intelligent terminal encrypting and decrypting mode is all used same password, and in the time that deciphering is carried out, the password of judgement input isNo consistent with the password prestoring, as unanimously, intelligent terminal successful decryption. If inconsistent, intelligent terminal Decryption failures.Like this, under same encrypting and decrypting mode, only has a password storage. When input password, be easy to be peeped by others, fromAnd encrypted message is lost. For pattern encrypting and decrypting mode, after having deciphered, on screen, can leave over the trace of finger releaseMark. cause password loss, the problems such as information leakage.
Based on above-mentioned analysis, the operation principle of the technical program is: under same encrypting and decrypting, more than two password prestores.When using after a password, current password temporarily lost efficacy, and other passwords activate, and the password being activated all can be deciphered use.So repeatedly.
After having introduced general principle of the present invention, lower mask body is introduced various non-limiting enforcement side of the present inventionFormula.
Application scenarios overview
First with reference to figure 1, Fig. 1 schematically shows according to the decryption method of embodiment of the present invention in cell phone systemApplication schematic diagram. As shown in Figure 1, in the system of mobile phone, at least two passwords are set in advance. For example: passwordA, B, C. In the time of deciphering, input one password, the password of input is A, can find out that the password of input is for establishing hereOne of password of putting, successfully deciphers mobile phone. Now, password A temporarily lost efficacy, and password B and password C are activated.Also just say, while deciphering next time, then input password A and just cannot decipher, can only input password B or password C timeCan make cellphone deciphering. So repeatedly.
Application schematic diagram based on shown in Fig. 1, in an exemplary application scene, under same encrypting and decrypting, pre-Deposit more than two password. When using after a password, current password temporarily lost efficacy, and other passwords are in state of activation, soRepeatedly. When now a lot of means of payment login, mostly with pattern login, be easy to leave over slip vestige on screen. Adopt thisAfter technical scheme, even if leave over release vestige on screen, other people can not release. Even seen by others' when unlocking pin,Do not worry password leakage yet.
Illustrative methods
Below in conjunction with the application scenarios of Fig. 1, with reference to figure 2~3 describe according to exemplary embodiment of the invention forThe method of deciphering. It should be noted that above-mentioned application scenarios is only for the ease of understanding spirit of the present invention and principleIllustrate, embodiments of the present invention are unrestricted in this regard. On the contrary, embodiments of the present invention can be appliedIn any scene being suitable for.
Fig. 2 schematically shows the decryption method schematic diagram according to embodiment of the present invention. As shown in Figure 2, at thisIn embodiment, for example, specifically can comprise the following steps:
Step 201): input one password;
Step 202): whether the password that judges input is the password arranging, and whether the password arranging is in state of activation; AsBe really, terminal deciphering, the password of current use temporarily lost efficacy, and the password of other settings is activated; Need input next timeA password in state of activation could be realized terminal deciphering.
In method shown in Fig. 2, for realize overcome cryptographic system of the prior art be difficult to tackle user's request situation andSecurity deficiency, user's more than 2 password that prestores, when after a correct password of input, current password temporarily lost efficacy, itsThe remaining password of surplus is activating pin. Next time, again when release, password now transferred inefficacy password to, and the password before losing efficacy becomesActivating pin. So repeatedly. Can improve because of smart mobile phone input password time, be retained in the password rail on screen like this, simultaneouslyMark, the problem that password is cracked.
In another embodiment, the number of the password of described setting is at least two. Suggestion user can be set to 2~3The password that prestores, to be user-friendly to.
For the technical program, the password of setting is many, and the password that needs user to remember is also just many, brings equally fiber cropsTired. On the basis of the method for Fig. 2 signal, also comprise: when the number of times of inputting continuously password error exceedes N, can be by askingTopic checking enters password and resets; Password is decrypted terminal after resetting. Specifically, the problem relating to when problem is verified isUser-dependent not personal information elusively, then carries out password replacement. So 2~3 passwords are set in suggestion, avoid rightUser causes puzzlement.
Fig. 3 schematically shows according to the decryption method flow chart after the optimization of embodiment of the present invention, as Fig. 3 instituteShow. User is first at communication terminal default 2 and above password, and when communication terminal locking, user's operator password is inputted mouldAfter piece, password judge module judges whether the password of current input is activating pin, and if so, current password temporarily lost efficacy,Other password is always in state of activation, current communication terminal successful decryption. If the password of input is not activating pin,Not release of screen. When inputting repeatedly after bad password, the multiple problems that can preset by individual are verified. If checking justReally, the password of can resetting. If incorrect, communication terminal keeps lock-out state.
From the above, by the embodiment of the present invention, the password that deciphering is used just cannot use while deciphering next time, byPassword under state of activation is decrypted. That is to say that at least two passwords of correspondence when deciphering are not same in prior artUnder an encrypting and decrypting mode, only use a password. Compared with prior art, even quilt when the technical program unlocking pinOthers sees, does not also worry password leakage. In addition, even if leave over release vestige on intelligent terminal screen, other people are not yetCan release intelligent terminal; The technical program is especially particularly applicable to pattern encrypting and decrypting mode.
Example devices
After having introduced the method for exemplary embodiment of the invention, next, exemplary to the present invention with reference to figure 4Embodiment, be described for the system of password.
Fig. 4 schematically shows according to the structured flowchart of the cryptographic system of the embodiment of the present invention. As shown in Figure 4, in this realityExecute in example, cryptographic system comprises:
Input block 401, for inputting a password;
Whether decryption unit 402 be the password arranging for the password that judges input, and whether the password arranging is in activatingState; If so, terminal deciphering, the password of current use temporarily lost efficacy, and the password of other settings is activated; Next timeA password in state of activation need to be inputted and terminal deciphering could be realized.
The number of the password that preferably, described cryptographic system arranges is at least two.
For the technical program, the password of setting is many, and the password that needs user to remember is also just many, brings equally fiber cropsTired. On the basis of the system of illustrating at Fig. 4, also comprise: password reset cell, for the number of times that input password is slipped up continuouslyWhile exceeding N, verify that by problem entering password resets, password is decrypted terminal after resetting. Specifically, problem is testedThe problem relating to when card is user-dependent not personal information elusively, then carries out password replacement. So suggestion sets 2~3Individual password, avoids user to cause puzzlement.
Although it should be noted that some devices or the sub-device of having mentioned cryptographic system in above-detailed, thisPlant division only not enforceable. In fact, according to the embodiment of the present invention, above-described two or moreFeature and the function of device can be specialized in a system. Otherwise, the feature of an above-described system and meritCan Further Division for to be specialized by multiple devices.
In addition, although described in the accompanying drawings the operation of the inventive method with particular order,, this not require orPerson implies and must carry out these operations according to this particular order, or the operation shown in must carrying out all could realizeThe result of expecting. Additionally or alternatively, can omit some step, multiple steps be merged into a step and carry out,And/or a step is decomposed into multiple steps execution.
Above-described detailed description of the invention, has carried out further in detail object of the present invention, technical scheme and beneficial effectIllustrate, institute it should be understood that and the foregoing is only the specific embodiment of the present invention, is not intended to limit the present inventionProtection domain, within the spirit and principles in the present invention all, any amendment of making, be equal to replacement, improvement etc., all should wrapWithin being contained in protection scope of the present invention.
Claims (9)
1. a decryption method, is characterized in that, comprising:
Input a password;
Whether the password that judges input is the password arranging, and whether the password arranging is in state of activation; If so, eventuallyEnd deciphering, the password of current use temporarily lost efficacy, and the password of other settings is activated; Need to input one in swashing next timeThe password of the state of living could be realized terminal deciphering.
2. the method for claim 1, is characterized in that, the number of the password of described setting is at least two.
3. method as claimed in claim 1 or 2, is characterized in that, also comprises:
When the number of times of input password error exceedes N continuously, can verify that entering password resets by problem;
Password is decrypted terminal after resetting.
4. method as claimed in claim 3, is characterized in that, the problem relating to when the checking of described problem is correlated with for userNot personal information elusively.
5. a cryptographic system, is characterized in that, comprising:
Input block, for inputting a password;
Whether decryption unit is the password arranging, and whether the password arranging is in state of activation for the password that judges input;If so, terminal deciphering, the password of current use temporarily lost efficacy, and the password of other settings is activated; Need defeated next timeEnter a password in state of activation and could realize terminal deciphering.
6. system as claimed in claim 5, is characterized in that, the number of the password that described cryptographic system arranges is at leastTwo.
7. the system as described in claim 5 or 6, is characterized in that, also comprises:
Password reset cell, while exceeding N, can be verified and be entered password weight by problem for the number of times of input password error continuouslyPut.
8. system as claimed in claim 7, is characterized in that, described password reset cell relates in the time that problem is verifiedProblem is user-dependent not personal information elusively.
9. one kind is provided with the mobile terminal of the cryptographic system as described in any one in claim 5~8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410628858.2A CN105608368A (en) | 2014-11-10 | 2014-11-10 | Decryption method, cryptosystem and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410628858.2A CN105608368A (en) | 2014-11-10 | 2014-11-10 | Decryption method, cryptosystem and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105608368A true CN105608368A (en) | 2016-05-25 |
Family
ID=55988297
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410628858.2A Pending CN105608368A (en) | 2014-11-10 | 2014-11-10 | Decryption method, cryptosystem and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105608368A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090158423A1 (en) * | 2007-12-14 | 2009-06-18 | Symbol Technologies, Inc. | Locking mobile device cradle |
CN101539970A (en) * | 2008-03-21 | 2009-09-23 | 鸿富锦精密工业(深圳)有限公司 | Password protector |
CN103634107A (en) * | 2012-08-24 | 2014-03-12 | 财团法人工业技术研究院 | Authentication method, password setting method and authentication system for electronic device |
CN104102864A (en) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | Terminal screen locking password resetting method, resetting system and terminal |
-
2014
- 2014-11-10 CN CN201410628858.2A patent/CN105608368A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090158423A1 (en) * | 2007-12-14 | 2009-06-18 | Symbol Technologies, Inc. | Locking mobile device cradle |
CN101539970A (en) * | 2008-03-21 | 2009-09-23 | 鸿富锦精密工业(深圳)有限公司 | Password protector |
CN103634107A (en) * | 2012-08-24 | 2014-03-12 | 财团法人工业技术研究院 | Authentication method, password setting method and authentication system for electronic device |
CN104102864A (en) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | Terminal screen locking password resetting method, resetting system and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210070252A1 (en) | Method and device for authenticating a user to a transportation vehicle | |
US9479329B2 (en) | Motor vehicle control unit having a cryptographic device | |
CN102970139B (en) | Data security validation method and device | |
US8789150B2 (en) | System and method for user authentication | |
CN103092484A (en) | Method and device and terminal for unlocking screen | |
WO2017035268A1 (en) | Data obfuscation method and service using unique seeds | |
CN103973437B (en) | The method, apparatus and system of RSA key mandate are obtained when a kind of terminal locking | |
CN110310392B (en) | Vehicle unlocking method and device, computer equipment and storage medium | |
CN103984904A (en) | Method and device for preventing screen locking code of mobile terminal from being cracked | |
CN108449315A (en) | Ask calibration equipment, method and the computer readable storage medium of legitimacy | |
CN104751538A (en) | Implementation method for opening access controller, and access control system | |
CN106101064A (en) | Account login method and device | |
CN106033625A (en) | Lockset, mobile terminal, lockset control method, and lockset control system | |
JP2013515301A (en) | Method, system and smart card for realizing general-purpose card system | |
CN107864124A (en) | A kind of end message method for security protection, terminal and bluetooth lock | |
CN105956452A (en) | Method and system for unlocking device | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN104144411A (en) | Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal | |
CN103577769A (en) | File content safety management method and management system | |
CN104820805A (en) | Method and device for burglary prevention of user identity identification card information | |
CN105635089A (en) | Authentication method, unlocking method and unlocking system for dynamic password lock | |
TWI389539B (en) | Protection setting method and protection releasing method for portable device | |
CN104134024B (en) | Method for protecting mobile terminal privacy and system | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160525 |
|
WD01 | Invention patent application deemed withdrawn after publication |