CN106027229A - Encryption and decryption method and system based on intelligent terminal compass - Google Patents

Encryption and decryption method and system based on intelligent terminal compass Download PDF

Info

Publication number
CN106027229A
CN106027229A CN201610606364.3A CN201610606364A CN106027229A CN 106027229 A CN106027229 A CN 106027229A CN 201610606364 A CN201610606364 A CN 201610606364A CN 106027229 A CN106027229 A CN 106027229A
Authority
CN
China
Prior art keywords
encryption
compass
deciphering
submodule
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610606364.3A
Other languages
Chinese (zh)
Other versions
CN106027229B (en
Inventor
丁鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen SBL Technology Co.,Ltd.
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201610606364.3A priority Critical patent/CN106027229B/en
Publication of CN106027229A publication Critical patent/CN106027229A/en
Application granted granted Critical
Publication of CN106027229B publication Critical patent/CN106027229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption method and system based on an intelligent terminal compass, relating to the technical field of encryption of intelligent terminals. The encryption and decryption system comprises an encryption module and a decryption module, wherein the encryption module comprises an encryption initialization sub-module, an encryption pre-operation sub-module, an encryption monitoring sub-module, an encryption information generating sub-module and an encryption process judging sub-module; and the decryption module comprises a decryption initialization sub-module, a decryption pre-operation sub-module, a decryption monitoring sub-module, a decryption information generating sub-module, a decryption information check sub-module and a decryption process judging sub-module. According to the encryption and decryption method and system disclosed by the invention, the directional angle of the compass is used as basic data for encryption and decryption; according to the related basic data, compass data is dynamically generated in combination with the random stay time; the compass data and a pre-set software secret key are encrypted in a hybridized manner; real encryption information is generated, such that encryption is realized; therefore, violence cracking can be effectively avoided; the safety is relatively high; and furthermore, operation is convenient and rapid.

Description

A kind of encryption and decryption method and system based on intelligent terminal's compass
Technical field
The present invention relates to intelligent terminal's encryption technology field, be specifically a kind of whole based on intelligence The encryption and decryption method and system of end compass.
Background technology
Along with development of Mobile Internet technology and the development of mobile device technology, Mobile portable formula intelligence is eventually The volume of holding of end is increasing year by year.At present, the volume of holding of China intelligent terminal is sure to occupy the first in the world, This illustrates that intelligent terminal has become requisite life instrument in people's daily life undoubtedly. Meanwhile, along with the fast development of the technology such as mobile payment so that intelligent terminal etc. are mobile to be set Standby safety problem is more and more prominent, and encrypting and decrypting method is then the core of security fields.
Present stage, the encrypting and decrypting mode of intelligent terminal has a lot, such as: Password Input, and figure Case identification etc., i.e. during encrypting and decrypting, the password that directly inputted by user or be depicted as Pattern carries out encryption and decryption in plain text.But, these encrypting and decrypting modes existing be all directly with Clear-text passwords is correlated with, and cryptography infrastructure data volume based on character and pattern is limited, and complexity is inadequate Height, easily by Brute Force;Further, since by intelligent terminal's screen size and interaction capabilities Limit so that user exists inconvenient operation, the problem such as loaded down with trivial details in key input process, special Not being the input for some long key, the time needing input is longer, brings the biggest to user Inconvenience.
Summary of the invention
The invention aims to overcome the deficiency of above-mentioned background technology, it is provided that a kind of based on intelligence The encryption and decryption method and system of energy terminal compass, not only encryption data amount is big, complexity is high, energy It is prevented effectively from Brute Force;And without long-time input during encryption and decryption, convenient to operation.
For reaching object above, the present invention adopts the technical scheme that: provide a kind of based on intelligence The encipher-decipher method of terminal compass, this encipher-decipher method includes encryption flow and deciphering flow process.Its In, encryption flow includes: A1, initialize on intelligent terminal after user enters encrypted interface Compass information, proceed to A2;A2, will initialize successfully after compass information be shown to intelligence On terminal interface;And one time of staying corresponding with this encryption data of stochastic generation, proceed to A3;A3, intelligent terminal's compass is monitored, rotate compass to expecting when listening to user Position after stopping operating, it is judged that whether the time that stops operating reaches the described time of staying, if so, Read and record current compass data, proceed to A4;Otherwise, return A3, continue to monitor; A4, current compass data is carried out Hybrid Encryption with the software key preset, generate MD5 Character string, this character string is added confidential information and the described time of staying as one and preserves down in the lump Come.
On the basis of technique scheme, described deciphering flow process includes: B1, enter as user Initialize the compass information on intelligent terminal after entering decryption interface, proceed to B2;B2, general are initially Compass information after chemical conversion merit is shown on intelligent terminal interface;And obtain and this decryption oprerations The corresponding time of staying, proceed to B3;B3, intelligent terminal's compass is monitored, work as monitoring After rotating compass extremely expectation position to user and stop operating, it is judged that whether the time that stops operating reaches To the corresponding time of staying, if so, read and record current compass data, proceeding to B4; Otherwise, return B3, continue to monitor;B4, by current compass data with preset software secret Key carries out hybrid combining, generates a decryption information, proceeds to B5;B5, judge current solution It is consistent whether confidential information adds confidential information with the correspondence preserved, and if so, deciphering flow process terminates;Otherwise, Return B2, restart deciphering.
On the basis of technique scheme, in step A1 of described encryption flow, if intelligent Compass information in terminal initializes unsuccessful, then show input through keyboard interface or figure input circle Face, carries out character encryption or figure encryption operation for user;Step B1 of described deciphering flow process In, if compass information on intelligent terminal initializes unsuccessful, then show input through keyboard interface or Figure inputting interface, carries out character deciphering or figure decryption oprerations for user.
On the basis of technique scheme, between step A3 of described encryption flow, A4, Also include compass data verification operation: judge whether current compass data reaches encryption data Requirement, if so, proceeds to A4;Otherwise, return A2, regenerate the random time of staying and Compass data;Between step B3 of described deciphering flow process, B4, the most also include compass data Verification operation: judge whether current compass data reaches to solve the requirement of ciphertext data, if so, turns Enter B4;Otherwise, return B2, reacquire the corresponding time of staying and compass data.
On the basis of technique scheme, also include after step A4 of described encryption flow Below operation: judge whether also to need generation to add confidential information, if so, returns step A2, continues Generate another and add confidential information;If it is not, encryption flow terminates;The step of described deciphering flow process Following operation is also included: judge whether also to need to proceed decryption oprerations, if so, after B5 Return step B2, proceed decryption oprerations;If it is not, deciphering flow process terminates.
The present invention also provides for a kind of encrypting and deciphering system based on intelligent terminal's compass, this encryption and decryption system System includes encrypting module and deciphering module.Wherein, encrypting module include encrypted initialization submodule, Encryption pre-operation submodule, encryption are monitored submodule and add confidential information generation submodule;Described add Close initialization submodule is used for: initialize sieve on intelligent terminal after user enters encrypted interface Dish information, and send encryption pre-operation signal to encryption pre-operation submodule after successful initialization; Described encryption pre-operation submodule is used for: after receiving encryption pre-operation signal, will initialize successfully After compass information be shown on intelligent terminal interface;And stochastic generation one with this encrypt number According to the corresponding time of staying, monitor submodule to encryption and send encryption monitoring signal;Described encryption prison Listen submodule for: receive encryption monitoring signal after, intelligent terminal's compass is monitored, when Listen to user and rotate compass to expecting position and after stopping operating, it is judged that the time of stopping operating is No reach the described time of staying, if so, read and record current compass data, to encryption Information generates submodule transmission and adds confidential information generation signal;Otherwise, send encryption monitoring signal, Continue to monitor;Described add confidential information generate submodule for: receive and add confidential information and generate after signal, Current compass data is carried out Hybrid Encryption with the software key preset, generates the word of MD5 Symbol string, adds confidential information using this character string as one and preserves in the lump with the described time of staying.
On the basis of technique scheme, described deciphering module include decipher initialization submodule, Deciphering pre-operation submodule, deciphering monitor submodule, decryption information generates submodule and conciliates secret letter Breath syndrome module;Described deciphering initialization submodule is used for: after user enters decryption interface Initialize the compass information on intelligent terminal, and after successful initialization to deciphering pre-operation submodule Block sends deciphering pre-operation signal;Described deciphering pre-operation submodule is used for: receive the pre-behaviour of deciphering After making signal, the compass information after initializing successfully is shown on intelligent terminal interface;And obtain Take the time of staying corresponding with this decryption oprerations, monitor submodule to deciphering and send deciphering monitoring Signal;Described deciphering is monitored submodule and is used for: after receiving deciphering monitoring signal, to intelligent terminal Compass is monitored, and rotates compass to expecting position and after stopping operating when listening to user, sentences Whether the disconnected time that stops operating reaches the corresponding time of staying, if so, reads and record current Compass data, to decryption information generate submodule send decryption information generate signal;Otherwise, Send deciphering monitoring signal, continue to monitor;Described decryption information generates submodule and is used for: receive After decryption information generates signal, current compass data is mixed with the software key preset Combination, generates a decryption information, and sends deciphering inspection letter to decryption information syndrome module Number;Described decryption information syndrome module is used for: after receiving deciphering inspection signal, it is judged that current Decryption information whether to add confidential information with the correspondence preserved consistent, if so, terminate to decipher;Otherwise, Send deciphering pre-operation signal to deciphering pre-operation submodule, restart deciphering.
On the basis of technique scheme, described encrypted initialization submodule is at the beginning of compass information When beginningization is unsuccessful, display input through keyboard interface or figure inputting interface, carry out character for user Encryption or figure encryption operation;Described deciphering initialization submodule initializes not become in compass information During merit, display input through keyboard interface or figure inputting interface, carry out character deciphering or figure for user Shape decryption oprerations.
On the basis of technique scheme, described encrypting module also includes that encrypting compass data tests Card submodule, for judging whether the current compass data of encryption monitoring submodule record reaches to add The requirement of ciphertext data, if so, to add confidential information generate submodule send add confidential information generate signal; Otherwise, send encryption pre-operation signal to encryption pre-operation submodule, regenerate random stopping Stay time and compass data;Described deciphering module also includes deciphering compass data checking submodule, For judging whether the current compass data of deciphering monitoring submodule record reaches to solve ciphertext data Requirement, if so, generates submodule to decryption information and sends decryption information generation signal;Otherwise, Send deciphering pre-operation signal to deciphering pre-operation submodule, reacquire the corresponding time of staying And compass data.
On the basis of technique scheme, described encrypting module also includes that encryption flow judges son Module, other adds confidential information, if so, to encryption pre-operation for judging whether also to need to generate Submodule sends encryption pre-operation signal, continues to generate another and adds confidential information;If it is not, terminate Encryption flow;Described deciphering module also includes that deciphering flow process judges submodule, is used for judging whether Also need to proceed decryption oprerations, if so, send deciphering pre-operation to deciphering pre-operation submodule Signal, proceeds decryption oprerations;If it is not, terminate deciphering flow process.
The beneficial effects of the present invention is:
1, the present invention uses a kind of encryption and decryption technology based on intelligent terminal's compass to solve tradition Easily crack present in encryption and decryption mode, the problem of difficult input.The present invention utilizes the direction of compass Angle is as the basic data of encryption and decryption, according to the basic data that these are relevant, in conjunction with at random The time of staying, dynamically generate compass data;Again compass data is entered with the software key preset Row Hybrid Encryption, generates the real confidential information that adds and realizes encryption.This carried out by multiple data In conjunction with the confidential information that adds generated, for more traditional character encryption or figure encryption, it encrypts base Plinth data volume is quite big, and complexity is the highest, by Brute Force when can effectively prevent from deciphering, instead Cracking is strong.It addition, user is in the encryption and decryption technology (solution of adding based on compass using the present invention Secret skill art) when inputting password, it is only necessary to the direction adjusting intelligent terminal (i.e. uses compass Generate encryption data) can be carried out the input of encryption and decryption, input the easiest, Consumer's Experience Preferably.
2, in the present invention, in order to effectiveness and the deciphering sieve of the compass data of encryption are effectively ensured The effectiveness of dish data, all includes compass data checking behaviour in encryption flow and deciphering flow process Make, the accuracy in encryption process and reliability can be improved further, reduce the generation of mistake.
3, the present invention is when carrying out encryption and decryption, if occurring, the compass of intelligent terminal initializes not become The situation (likely this intelligent terminal does not support compass function) of merit, then can use tradition accordingly instead Input through keyboard interface or figure inputting interface, carry out character encryption and decryption for user or figure add solution Close operation, can meet the needs of various service condition, practicality and the suitability good.
4, the use scene using the present invention to carry out encryption and decryption includes being not limited to: intelligent terminal solves Lock, software unlocks, and the use scene of Password Input required for all, applied widely.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of encryption flow based on intelligent terminal's compass in the embodiment of the present invention;
Fig. 2 is the schematic diagram of deciphering flow process based on intelligent terminal's compass in the embodiment of the present invention;
Fig. 3 is the structure of encrypting and deciphering system based on intelligent terminal's compass in the embodiment of the present invention Block diagram.
Detailed description of the invention
Below in conjunction with the accompanying drawings and specific embodiment the present invention is described in further detail.
Seeing shown in Fig. 1 and Fig. 2, the embodiment of the present invention provides a kind of based on intelligent terminal's compass Encipher-decipher method, the method include encryption flow and deciphering two steps of flow process;
Wherein, encryption flow specifically includes following steps (as shown in Figure 1):
Step A1, after user is by clicking through encrypted interface, initialize on intelligent terminal Compass information, if initializing successfully, proceed to step A2;If initializing unsuccessful, then show Show traditional input through keyboard interface or figure inputting interface, carry out character encryption or figure for user Cryptographic operation.
Step A2, will initialize successfully after compass information be shown on intelligent terminal interface, Prompting user begins to use compass to generate encryption data;And stochastic generation one with this encrypt The time of staying that data are corresponding, proceed to step A3.
It is understood that the described time of staying refers to that user uses compass to generate encryption data Time, need residence time.When encryption, only after waiting the described time of staying, Read compass data and generate encryption data;When deciphering, the most only waiting described stop After time, just read compass data and be decrypted operation.It is to say, this stochastic generation The time of staying can improve the complexity of encryption data further, can be prevented effectively from violence during deciphering Crack, improve safety.In the present embodiment, the value of the time of staying of stochastic generation is 10 seconds Within, preferably 2 seconds, user's practical operation can be also allowed for while meeting time requirement.
Step A3, intelligent terminal's compass is monitored, rotate compass extremely when listening to user After expecting position and stopping operating, it is judged that whether the time that stops operating reaches the described time of staying, If so, read and record current compass data, proceeding to step A4;Otherwise, step is returned Rapid A3, continues to monitor.
During practical operation, in order to the effectiveness of compass data is effectively ensured, after step A3 Also include compass data verification operation: judge whether current compass data reaches encryption data Requirement, if so, proceeds to step A4;Otherwise, it is back to step A2, regenerates random The time of staying and compass data.Wherein, it is judged that whether current compass data reaches encryption data Requirement time, its basis for estimation is: whether current compass data is at the beginning of intelligent terminal's compass Beginningization data (i.e. active user take intelligent terminal just to direction), if so, show user also It is not provided with the password of non-initial, then judges that current compass data is not up to encryption data Requirement;If it is not, show the password of user setup non-initial, then judge current compass number According to the requirement having reached encryption data.
Step A4, by current compass data with preset software key carry out Hybrid Encryption, Generate the character string of MD5, this character string is added confidential information and the described time of staying as one Preserve in the lump, proceed to step A5.
Step A5, judge whether also to need generation to add confidential information, if so, return step A2, continue Continuous prompting user generates another and adds confidential information;If it is not, encryption flow terminates.
Deciphering flow process specifically includes following steps (as shown in Figure 2):
Step B1, after user enters decryption interface, initialize the compass letter on intelligent terminal Breath, if initializing successfully, proceeds to step B2;If initializing unsuccessful, then show traditional Input through keyboard interface or figure inputting interface, carry out character deciphering or figure deciphering behaviour for user Make.
Step B2, will initialize successfully after compass information be shown on intelligent terminal interface, Prompting user begins to use compass to be decrypted operation;And obtain corresponding with this decryption oprerations The time of staying, proceed to step B3.
Step B3, intelligent terminal's compass is monitored, rotate compass extremely when listening to user After expecting position and stopping operating, it is judged that whether the time that stops operating reaches corresponding described stop Time, if so, read and record current compass data, proceeding to step B4;Otherwise, Return step B3, continue to monitor.
It can also be appreciated that the effectiveness of compass data during in order to deciphering be effectively ensured, Compass data verification operation is the most also included: judge that current compass data is after step B3 The no requirement reaching to solve ciphertext data, if so, proceeds to step B4;Otherwise, it is back to step B2, Reacquire the corresponding time of staying and compass data.Judge whether current compass data reaches Solving the requirement of ciphertext data, its basis for estimation is consistent with the requirement of encryption data, does not repeats.
Step B4, by current compass data with preset software key carry out hybrid combining, Generate a decryption information, proceed to step B5.
Step B5, to judge that whether current decryption information adds confidential information with the correspondence preserved consistent, If so, prompting user's successful decryption, proceeds to step B6;Otherwise, prompting user deciphers failure, Return step B2, restart deciphering.
Step B6, judge whether also to need to proceed decryption oprerations and (i.e. also have other to solve secret letters Breath needs to generate), if so, return step B2, prompting user proceeds decryption oprerations;If No, deciphering flow process terminates.
Shown in Figure 3, present invention also offers a kind of encryption and decryption based on intelligent terminal's compass System, including encrypting module and deciphering module.Specifically, described encrypting module includes encryption Initialization submodule, encryption pre-operation submodule, encryption are monitored submodule, are added confidential information generation Submodule and encryption flow judge submodule.Due in the present embodiment, the above-mentioned son of encrypting module The function of module is to operate one to one with encryption flow, therefore, does not repeats (concrete Can be found in the corresponding contents of Summary).It addition, described deciphering module includes at the beginning of deciphering Submodule, decryption information generation are monitored in beginning beggar's module, deciphering pre-operation submodule, deciphering Module, decryption information syndrome module and deciphering flow process judge submodule.Similarly, since this reality Executing in example, the function of the above-mentioned submodule of deciphering module is with deciphering flow operations one to one, Therefore, (specifically can be found in the corresponding contents of Summary) is not repeated.
Further, during practical operation, in order to the effectiveness of the compass data of encryption is effectively ensured With the effectiveness of deciphering compass data, therefore, also have additional encryption sieve in the inside of encrypting module Dish data verification submodule;Also deciphering compass data checking is had additional in the inside of deciphering module Module.Wherein, described encryption compass data checking submodule is used for: judge that submodule is monitored in encryption Whether the current compass data of block record reaches the requirement of encryption data, if so, to adding confidential information Generate submodule transmission and add confidential information generation signal;Otherwise, send to encryption pre-operation submodule Encryption pre-operation signal, regenerates the random time of staying and compass data.Described deciphering sieve Dish data verification submodule is used for: judge that deciphering is monitored the current compass data of submodule record and is The no requirement reaching to solve ciphertext data, if so, generates submodule to decryption information and sends decryption information Generate signal;Otherwise, send deciphering pre-operation signal to deciphering pre-operation submodule, again obtain Take the random time of staying and compass data.
It should be understood that the encryption and decryption system based on intelligent terminal's compass that above-described embodiment provides System, when carrying out encryption and decryption, is only illustrated with the division of above-mentioned each functional module, actual In application, as required above-mentioned functions distribution can be completed by different functional modules, will be The internal structure of system is divided into different functional modules, to complete described above whole or portion Divide function.
The present invention is not limited to above-mentioned embodiment, for those skilled in the art For, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, Within these improvements and modifications are also considered as protection scope of the present invention.This specification is not made in detail The content described belongs to prior art known to professional and technical personnel in the field.

Claims (10)

1. an encipher-decipher method based on intelligent terminal's compass, this encipher-decipher method includes adding Close flow process and deciphering flow process, it is characterised in that described encryption flow includes:
A1, after user enters encrypted interface, initialize the compass information on intelligent terminal, turn Enter A2;
A2, will initialize successfully after compass information be shown on intelligent terminal interface;And with Machine generates a time of staying corresponding with this encryption data, proceeds to A3;
A3, intelligent terminal's compass is monitored, rotate compass to expecting when listening to user Position after stopping operating, it is judged that whether the time that stops operating reaches the described time of staying, if so, Read and record current compass data, proceed to A4;Otherwise, return A3, continue to monitor;
A4, by current compass data with preset software key carry out Hybrid Encryption, generate The character string of MD5, adds confidential information with the described time of staying in the lump using this character string as one Preserve.
2. encipher-decipher method based on intelligent terminal's compass as claimed in claim 1, it is special Levying and be, described deciphering flow process includes:
B1, after user enters decryption interface, initialize the compass information on intelligent terminal, turn Enter B2;
B2, will initialize successfully after compass information be shown on intelligent terminal interface;And obtain Take the time of staying corresponding with this decryption oprerations, proceed to B3;
B3, intelligent terminal's compass is monitored, rotate compass to expecting when listening to user Position after stopping operating, it is judged that whether the time that stops operating reaches the corresponding time of staying, if It is to read and record current compass data, proceed to B4;Otherwise, return B3, continue Monitor;
B4, by current compass data with preset software key carry out hybrid combining, generate One decryption information, proceeds to B5;
B5, to judge that whether current decryption information adds confidential information with the correspondence preserved consistent, if It is that deciphering flow process terminates;Otherwise, return B2, restart deciphering.
3. encipher-decipher method based on intelligent terminal's compass as claimed in claim 2, it is special Levy and be: in step A1 of described encryption flow, if the compass information on intelligent terminal is initial Change unsuccessful, then show input through keyboard interface or figure inputting interface, carry out character for user and add Close or figure encryption operates;In step B1 of described deciphering flow process, if sieve on intelligent terminal Dish information initializing is unsuccessful, then show input through keyboard interface or figure inputting interface, for user Carry out character deciphering or figure decryption oprerations.
4. encipher-decipher method based on intelligent terminal's compass as claimed in claim 2, it is special Levy and be: between step A3 of described encryption flow, A4, also include compass data checking behaviour Make: judge whether current compass data reaches the requirement of encryption data, if so, proceed to A4; Otherwise, return A2, regenerate the random time of staying and compass data;
Between step B3 of described deciphering flow process, B4, the most also include compass data checking behaviour Make: judge whether current compass data reaches to solve the requirement of ciphertext data, if so, proceed to B4; Otherwise, return B2, reacquire the corresponding time of staying and compass data.
5. encipher-decipher method based on intelligent terminal's compass as claimed in claim 2, it is special Levy and be: also include following operation after step A4 of described encryption flow: judge whether also Need to generate and add confidential information, if so, return step A2, continue to generate another and add confidential information; If it is not, encryption flow terminates;
Following operation is also included: judge whether also to need to continue after step B5 of described deciphering flow process Continue and be decrypted operation, if so, return step B2, proceed decryption oprerations;If it is not, Deciphering flow process terminates.
6. an encrypting and deciphering system based on intelligent terminal's compass, this encrypting and deciphering system includes adding Close module and deciphering module, it is characterised in that;Described encrypting module includes encrypted initialization submodule Block, encryption pre-operation submodule, encryption are monitored submodule and add confidential information generation submodule;
Described encrypted initialization submodule is used for: initialize intelligence after user enters encrypted interface Compass information in terminal, and send encryption to encryption pre-operation submodule after successful initialization Pre-operation signal;
Described encryption pre-operation submodule is used for: after receiving encryption pre-operation signal, will initialize Compass information after success is shown on intelligent terminal interface;And stochastic generation one adds with this The time of staying that ciphertext data is corresponding, monitor submodule to encryption and send encryption monitoring signal;
Described encryption is monitored submodule and is used for: after receiving encryption monitoring signal, to intelligent terminal sieve Dish is monitored, and rotates compass to expecting position and after stopping operating when listening to user, it is judged that Whether the time that stops operating reaches the described time of staying, if so, reads and records current sieve Dish data, add confidential information generation signal to adding confidential information generation submodule transmission;Otherwise, send Encryption monitoring signal, continues to monitor;
Described add confidential information generate submodule for: receive and add confidential information and generate after signal, ought Front compass data carries out Hybrid Encryption with the software key preset, and generates the character string of MD5, As one, this character string is added confidential information preserve in the lump with the described time of staying.
7. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 6, it is special Levy and be: described deciphering module include decipher initialization submodule, deciphering pre-operation submodule, Submodule is monitored in deciphering, decryption information generates submodule and decryption information syndrome module;
Described deciphering initialization submodule is used for: initialize intelligence after user enters decryption interface Compass information in terminal, and send deciphering to deciphering pre-operation submodule after successful initialization Pre-operation signal;
Described deciphering pre-operation submodule is used for: after receiving deciphering pre-operation signal, will initialize Compass information after success is shown on intelligent terminal interface;And obtain and this decryption oprerations pair The time of staying answered, monitor submodule to deciphering and send deciphering monitoring signal;
Described deciphering is monitored submodule and is used for: after receiving deciphering monitoring signal, to intelligent terminal sieve Dish is monitored, and rotates compass to expecting position and after stopping operating when listening to user, it is judged that Whether the time that stops operating reaches the corresponding time of staying, if so, reads and records current Compass data, generates submodule to decryption information and sends decryption information generation signal;Otherwise, send out Send deciphering monitoring signal, continue to monitor;
Described decryption information generates submodule and is used for: after receiving decryption information generation signal, ought Front compass data carries out hybrid combining with the software key preset, and generates a decryption information, And send deciphering inspection signal to decryption information syndrome module;
Described decryption information syndrome module is used for: after receiving deciphering inspection signal, it is judged that current Decryption information whether to add confidential information with the correspondence preserved consistent, if so, terminate to decipher;Otherwise, Send deciphering pre-operation signal to deciphering pre-operation submodule, restart deciphering.
8. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 7, it is special Levy and be: described encrypted initialization submodule, when compass information initializes unsuccessful, shows key Dish inputting interface or figure inputting interface, carry out character encryption or figure encryption operation for user; Described deciphering initialization submodule, when compass information initializes unsuccessful, shows input through keyboard circle Face or figure inputting interface, carry out character deciphering or figure decryption oprerations for user.
9. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 7, it is special Levy and be: described encrypting module also includes encrypting compass data checking submodule, adds for judgement Whether the current compass data of close monitoring submodule record reaches the requirement of encryption data, if so, Confidential information generation signal is added to adding confidential information generation submodule transmission;Otherwise, to encryption pre-operation Submodule sends encryption pre-operation signal, regenerates the random time of staying and compass data;
Described deciphering module also includes deciphering compass data checking submodule, is used for judging deciphering prison Whether the current compass data listening submodule record reaches to solve the requirement of ciphertext data, if so, to solution Confidential information generates submodule and sends decryption information generation signal;Otherwise, to deciphering pre-operation submodule Block sends deciphering pre-operation signal, reacquires the corresponding time of staying and compass data.
10. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 7, it is special Levy and be: described encrypting module also includes that encryption flow judges submodule, be used for judging whether also Need to generate and other add confidential information, if so, send encryption pre-operation to encryption pre-operation submodule Signal, continues to generate another and adds confidential information;If it is not, end encryption flow;
Described deciphering module also includes that deciphering flow process judges submodule, is used for judging whether also to need to continue Continue and be decrypted operation, if so, send deciphering pre-operation signal to deciphering pre-operation submodule, Proceed decryption oprerations;If it is not, terminate deciphering flow process.
CN201610606364.3A 2016-07-28 2016-07-28 A kind of encryption and decryption method and system based on intelligent terminal compass Active CN106027229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610606364.3A CN106027229B (en) 2016-07-28 2016-07-28 A kind of encryption and decryption method and system based on intelligent terminal compass

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610606364.3A CN106027229B (en) 2016-07-28 2016-07-28 A kind of encryption and decryption method and system based on intelligent terminal compass

Publications (2)

Publication Number Publication Date
CN106027229A true CN106027229A (en) 2016-10-12
CN106027229B CN106027229B (en) 2019-04-23

Family

ID=57114796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610606364.3A Active CN106027229B (en) 2016-07-28 2016-07-28 A kind of encryption and decryption method and system based on intelligent terminal compass

Country Status (1)

Country Link
CN (1) CN106027229B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107889102A (en) * 2016-09-30 2018-04-06 中兴通讯股份有限公司 The method and apparatus of information encryption and decryption in a kind of short message
CN108762553A (en) * 2018-05-17 2018-11-06 Oppo广东移动通信有限公司 Processing method, device, storage medium and the electronic device of touch information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385472A (en) * 2010-09-06 2012-03-21 深圳富泰宏精密工业有限公司 Unlocking system and method for portable electronic device
CN103236176A (en) * 2013-03-19 2013-08-07 郭海锋 Method and system for mobile equipment to sense traffic signals on traveling path
CN103248477A (en) * 2013-04-27 2013-08-14 深圳创维-Rgb电子有限公司 Dynamic encryption method and device
CN104183036A (en) * 2013-05-20 2014-12-03 Nxp股份有限公司 Movement history assurance for secure passive keyless entry and start systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385472A (en) * 2010-09-06 2012-03-21 深圳富泰宏精密工业有限公司 Unlocking system and method for portable electronic device
CN103236176A (en) * 2013-03-19 2013-08-07 郭海锋 Method and system for mobile equipment to sense traffic signals on traveling path
CN103248477A (en) * 2013-04-27 2013-08-14 深圳创维-Rgb电子有限公司 Dynamic encryption method and device
CN104183036A (en) * 2013-05-20 2014-12-03 Nxp股份有限公司 Movement history assurance for secure passive keyless entry and start systems

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107889102A (en) * 2016-09-30 2018-04-06 中兴通讯股份有限公司 The method and apparatus of information encryption and decryption in a kind of short message
CN108762553A (en) * 2018-05-17 2018-11-06 Oppo广东移动通信有限公司 Processing method, device, storage medium and the electronic device of touch information
CN108762553B (en) * 2018-05-17 2021-05-07 Oppo广东移动通信有限公司 Touch information processing method and device, storage medium and electronic device

Also Published As

Publication number Publication date
CN106027229B (en) 2019-04-23

Similar Documents

Publication Publication Date Title
CN101300808B (en) Method and arrangement for secure autentication
CN106656476A (en) Password protecting method and device
CN109600223A (en) Verification method, Activiation method, device, equipment and storage medium
CN102685749B (en) Wireless safety authentication method orienting to mobile terminal
CN101262349A (en) SMS-based identity authentication method and device
CN105447394B (en) Intelligent password key with local data encryption function
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN111615105A (en) Information providing method, information obtaining method, information providing device, information obtaining device and terminal
CN109617675B (en) Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal
CN101593550B (en) High strength encrypting USB flash disk for police
CN101122942A (en) Data safe reading method and its safe storage device
CN103888429B (en) Virtual machine starts method, relevant device and system
CN101488111A (en) Identification authentication method and system
CN101964805B (en) Method, equipment and system for safely sending and receiving data
CN1855809A (en) Securely using a display to exchange information
CN1838141A (en) Technology for improving security of accessing computer application system by mobile phone
CN105631298B (en) A kind of ciphering and deciphering device and method
CN105592431B (en) SMS encryption system based on iOS system mobile terminal
CN101540675B (en) Smart key equipment and communication method and system of application software
CN102082669A (en) Security certification method and device
CN201716734U (en) Usb safe storage encryption device
CN108182745A (en) The smart lock and its encryption method of a kind of decentralization
CN106027229A (en) Encryption and decryption method and system based on intelligent terminal compass
CN106210240B (en) A kind of encryption and decryption method and system based on intelligent terminal gyroscope

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230831

Address after: 518042 13D02-2, Zone A, Hongsong Building, Tian'an Community, Shatou Street, Futian District, Shenzhen City, Guangdong Province, China

Patentee after: Shenzhen SBL Technology Co.,Ltd.

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.