CN106027229A - Encryption and decryption method and system based on intelligent terminal compass - Google Patents
Encryption and decryption method and system based on intelligent terminal compass Download PDFInfo
- Publication number
- CN106027229A CN106027229A CN201610606364.3A CN201610606364A CN106027229A CN 106027229 A CN106027229 A CN 106027229A CN 201610606364 A CN201610606364 A CN 201610606364A CN 106027229 A CN106027229 A CN 106027229A
- Authority
- CN
- China
- Prior art keywords
- encryption
- compass
- deciphering
- submodule
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an encryption and decryption method and system based on an intelligent terminal compass, relating to the technical field of encryption of intelligent terminals. The encryption and decryption system comprises an encryption module and a decryption module, wherein the encryption module comprises an encryption initialization sub-module, an encryption pre-operation sub-module, an encryption monitoring sub-module, an encryption information generating sub-module and an encryption process judging sub-module; and the decryption module comprises a decryption initialization sub-module, a decryption pre-operation sub-module, a decryption monitoring sub-module, a decryption information generating sub-module, a decryption information check sub-module and a decryption process judging sub-module. According to the encryption and decryption method and system disclosed by the invention, the directional angle of the compass is used as basic data for encryption and decryption; according to the related basic data, compass data is dynamically generated in combination with the random stay time; the compass data and a pre-set software secret key are encrypted in a hybridized manner; real encryption information is generated, such that encryption is realized; therefore, violence cracking can be effectively avoided; the safety is relatively high; and furthermore, operation is convenient and rapid.
Description
Technical field
The present invention relates to intelligent terminal's encryption technology field, be specifically a kind of whole based on intelligence
The encryption and decryption method and system of end compass.
Background technology
Along with development of Mobile Internet technology and the development of mobile device technology, Mobile portable formula intelligence is eventually
The volume of holding of end is increasing year by year.At present, the volume of holding of China intelligent terminal is sure to occupy the first in the world,
This illustrates that intelligent terminal has become requisite life instrument in people's daily life undoubtedly.
Meanwhile, along with the fast development of the technology such as mobile payment so that intelligent terminal etc. are mobile to be set
Standby safety problem is more and more prominent, and encrypting and decrypting method is then the core of security fields.
Present stage, the encrypting and decrypting mode of intelligent terminal has a lot, such as: Password Input, and figure
Case identification etc., i.e. during encrypting and decrypting, the password that directly inputted by user or be depicted as
Pattern carries out encryption and decryption in plain text.But, these encrypting and decrypting modes existing be all directly with
Clear-text passwords is correlated with, and cryptography infrastructure data volume based on character and pattern is limited, and complexity is inadequate
Height, easily by Brute Force;Further, since by intelligent terminal's screen size and interaction capabilities
Limit so that user exists inconvenient operation, the problem such as loaded down with trivial details in key input process, special
Not being the input for some long key, the time needing input is longer, brings the biggest to user
Inconvenience.
Summary of the invention
The invention aims to overcome the deficiency of above-mentioned background technology, it is provided that a kind of based on intelligence
The encryption and decryption method and system of energy terminal compass, not only encryption data amount is big, complexity is high, energy
It is prevented effectively from Brute Force;And without long-time input during encryption and decryption, convenient to operation.
For reaching object above, the present invention adopts the technical scheme that: provide a kind of based on intelligence
The encipher-decipher method of terminal compass, this encipher-decipher method includes encryption flow and deciphering flow process.Its
In, encryption flow includes: A1, initialize on intelligent terminal after user enters encrypted interface
Compass information, proceed to A2;A2, will initialize successfully after compass information be shown to intelligence
On terminal interface;And one time of staying corresponding with this encryption data of stochastic generation, proceed to
A3;A3, intelligent terminal's compass is monitored, rotate compass to expecting when listening to user
Position after stopping operating, it is judged that whether the time that stops operating reaches the described time of staying, if so,
Read and record current compass data, proceed to A4;Otherwise, return A3, continue to monitor;
A4, current compass data is carried out Hybrid Encryption with the software key preset, generate MD5
Character string, this character string is added confidential information and the described time of staying as one and preserves down in the lump
Come.
On the basis of technique scheme, described deciphering flow process includes: B1, enter as user
Initialize the compass information on intelligent terminal after entering decryption interface, proceed to B2;B2, general are initially
Compass information after chemical conversion merit is shown on intelligent terminal interface;And obtain and this decryption oprerations
The corresponding time of staying, proceed to B3;B3, intelligent terminal's compass is monitored, work as monitoring
After rotating compass extremely expectation position to user and stop operating, it is judged that whether the time that stops operating reaches
To the corresponding time of staying, if so, read and record current compass data, proceeding to B4;
Otherwise, return B3, continue to monitor;B4, by current compass data with preset software secret
Key carries out hybrid combining, generates a decryption information, proceeds to B5;B5, judge current solution
It is consistent whether confidential information adds confidential information with the correspondence preserved, and if so, deciphering flow process terminates;Otherwise,
Return B2, restart deciphering.
On the basis of technique scheme, in step A1 of described encryption flow, if intelligent
Compass information in terminal initializes unsuccessful, then show input through keyboard interface or figure input circle
Face, carries out character encryption or figure encryption operation for user;Step B1 of described deciphering flow process
In, if compass information on intelligent terminal initializes unsuccessful, then show input through keyboard interface or
Figure inputting interface, carries out character deciphering or figure decryption oprerations for user.
On the basis of technique scheme, between step A3 of described encryption flow, A4,
Also include compass data verification operation: judge whether current compass data reaches encryption data
Requirement, if so, proceeds to A4;Otherwise, return A2, regenerate the random time of staying and
Compass data;Between step B3 of described deciphering flow process, B4, the most also include compass data
Verification operation: judge whether current compass data reaches to solve the requirement of ciphertext data, if so, turns
Enter B4;Otherwise, return B2, reacquire the corresponding time of staying and compass data.
On the basis of technique scheme, also include after step A4 of described encryption flow
Below operation: judge whether also to need generation to add confidential information, if so, returns step A2, continues
Generate another and add confidential information;If it is not, encryption flow terminates;The step of described deciphering flow process
Following operation is also included: judge whether also to need to proceed decryption oprerations, if so, after B5
Return step B2, proceed decryption oprerations;If it is not, deciphering flow process terminates.
The present invention also provides for a kind of encrypting and deciphering system based on intelligent terminal's compass, this encryption and decryption system
System includes encrypting module and deciphering module.Wherein, encrypting module include encrypted initialization submodule,
Encryption pre-operation submodule, encryption are monitored submodule and add confidential information generation submodule;Described add
Close initialization submodule is used for: initialize sieve on intelligent terminal after user enters encrypted interface
Dish information, and send encryption pre-operation signal to encryption pre-operation submodule after successful initialization;
Described encryption pre-operation submodule is used for: after receiving encryption pre-operation signal, will initialize successfully
After compass information be shown on intelligent terminal interface;And stochastic generation one with this encrypt number
According to the corresponding time of staying, monitor submodule to encryption and send encryption monitoring signal;Described encryption prison
Listen submodule for: receive encryption monitoring signal after, intelligent terminal's compass is monitored, when
Listen to user and rotate compass to expecting position and after stopping operating, it is judged that the time of stopping operating is
No reach the described time of staying, if so, read and record current compass data, to encryption
Information generates submodule transmission and adds confidential information generation signal;Otherwise, send encryption monitoring signal,
Continue to monitor;Described add confidential information generate submodule for: receive and add confidential information and generate after signal,
Current compass data is carried out Hybrid Encryption with the software key preset, generates the word of MD5
Symbol string, adds confidential information using this character string as one and preserves in the lump with the described time of staying.
On the basis of technique scheme, described deciphering module include decipher initialization submodule,
Deciphering pre-operation submodule, deciphering monitor submodule, decryption information generates submodule and conciliates secret letter
Breath syndrome module;Described deciphering initialization submodule is used for: after user enters decryption interface
Initialize the compass information on intelligent terminal, and after successful initialization to deciphering pre-operation submodule
Block sends deciphering pre-operation signal;Described deciphering pre-operation submodule is used for: receive the pre-behaviour of deciphering
After making signal, the compass information after initializing successfully is shown on intelligent terminal interface;And obtain
Take the time of staying corresponding with this decryption oprerations, monitor submodule to deciphering and send deciphering monitoring
Signal;Described deciphering is monitored submodule and is used for: after receiving deciphering monitoring signal, to intelligent terminal
Compass is monitored, and rotates compass to expecting position and after stopping operating when listening to user, sentences
Whether the disconnected time that stops operating reaches the corresponding time of staying, if so, reads and record current
Compass data, to decryption information generate submodule send decryption information generate signal;Otherwise,
Send deciphering monitoring signal, continue to monitor;Described decryption information generates submodule and is used for: receive
After decryption information generates signal, current compass data is mixed with the software key preset
Combination, generates a decryption information, and sends deciphering inspection letter to decryption information syndrome module
Number;Described decryption information syndrome module is used for: after receiving deciphering inspection signal, it is judged that current
Decryption information whether to add confidential information with the correspondence preserved consistent, if so, terminate to decipher;Otherwise,
Send deciphering pre-operation signal to deciphering pre-operation submodule, restart deciphering.
On the basis of technique scheme, described encrypted initialization submodule is at the beginning of compass information
When beginningization is unsuccessful, display input through keyboard interface or figure inputting interface, carry out character for user
Encryption or figure encryption operation;Described deciphering initialization submodule initializes not become in compass information
During merit, display input through keyboard interface or figure inputting interface, carry out character deciphering or figure for user
Shape decryption oprerations.
On the basis of technique scheme, described encrypting module also includes that encrypting compass data tests
Card submodule, for judging whether the current compass data of encryption monitoring submodule record reaches to add
The requirement of ciphertext data, if so, to add confidential information generate submodule send add confidential information generate signal;
Otherwise, send encryption pre-operation signal to encryption pre-operation submodule, regenerate random stopping
Stay time and compass data;Described deciphering module also includes deciphering compass data checking submodule,
For judging whether the current compass data of deciphering monitoring submodule record reaches to solve ciphertext data
Requirement, if so, generates submodule to decryption information and sends decryption information generation signal;Otherwise,
Send deciphering pre-operation signal to deciphering pre-operation submodule, reacquire the corresponding time of staying
And compass data.
On the basis of technique scheme, described encrypting module also includes that encryption flow judges son
Module, other adds confidential information, if so, to encryption pre-operation for judging whether also to need to generate
Submodule sends encryption pre-operation signal, continues to generate another and adds confidential information;If it is not, terminate
Encryption flow;Described deciphering module also includes that deciphering flow process judges submodule, is used for judging whether
Also need to proceed decryption oprerations, if so, send deciphering pre-operation to deciphering pre-operation submodule
Signal, proceeds decryption oprerations;If it is not, terminate deciphering flow process.
The beneficial effects of the present invention is:
1, the present invention uses a kind of encryption and decryption technology based on intelligent terminal's compass to solve tradition
Easily crack present in encryption and decryption mode, the problem of difficult input.The present invention utilizes the direction of compass
Angle is as the basic data of encryption and decryption, according to the basic data that these are relevant, in conjunction with at random
The time of staying, dynamically generate compass data;Again compass data is entered with the software key preset
Row Hybrid Encryption, generates the real confidential information that adds and realizes encryption.This carried out by multiple data
In conjunction with the confidential information that adds generated, for more traditional character encryption or figure encryption, it encrypts base
Plinth data volume is quite big, and complexity is the highest, by Brute Force when can effectively prevent from deciphering, instead
Cracking is strong.It addition, user is in the encryption and decryption technology (solution of adding based on compass using the present invention
Secret skill art) when inputting password, it is only necessary to the direction adjusting intelligent terminal (i.e. uses compass
Generate encryption data) can be carried out the input of encryption and decryption, input the easiest, Consumer's Experience
Preferably.
2, in the present invention, in order to effectiveness and the deciphering sieve of the compass data of encryption are effectively ensured
The effectiveness of dish data, all includes compass data checking behaviour in encryption flow and deciphering flow process
Make, the accuracy in encryption process and reliability can be improved further, reduce the generation of mistake.
3, the present invention is when carrying out encryption and decryption, if occurring, the compass of intelligent terminal initializes not become
The situation (likely this intelligent terminal does not support compass function) of merit, then can use tradition accordingly instead
Input through keyboard interface or figure inputting interface, carry out character encryption and decryption for user or figure add solution
Close operation, can meet the needs of various service condition, practicality and the suitability good.
4, the use scene using the present invention to carry out encryption and decryption includes being not limited to: intelligent terminal solves
Lock, software unlocks, and the use scene of Password Input required for all, applied widely.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of encryption flow based on intelligent terminal's compass in the embodiment of the present invention;
Fig. 2 is the schematic diagram of deciphering flow process based on intelligent terminal's compass in the embodiment of the present invention;
Fig. 3 is the structure of encrypting and deciphering system based on intelligent terminal's compass in the embodiment of the present invention
Block diagram.
Detailed description of the invention
Below in conjunction with the accompanying drawings and specific embodiment the present invention is described in further detail.
Seeing shown in Fig. 1 and Fig. 2, the embodiment of the present invention provides a kind of based on intelligent terminal's compass
Encipher-decipher method, the method include encryption flow and deciphering two steps of flow process;
Wherein, encryption flow specifically includes following steps (as shown in Figure 1):
Step A1, after user is by clicking through encrypted interface, initialize on intelligent terminal
Compass information, if initializing successfully, proceed to step A2;If initializing unsuccessful, then show
Show traditional input through keyboard interface or figure inputting interface, carry out character encryption or figure for user
Cryptographic operation.
Step A2, will initialize successfully after compass information be shown on intelligent terminal interface,
Prompting user begins to use compass to generate encryption data;And stochastic generation one with this encrypt
The time of staying that data are corresponding, proceed to step A3.
It is understood that the described time of staying refers to that user uses compass to generate encryption data
Time, need residence time.When encryption, only after waiting the described time of staying,
Read compass data and generate encryption data;When deciphering, the most only waiting described stop
After time, just read compass data and be decrypted operation.It is to say, this stochastic generation
The time of staying can improve the complexity of encryption data further, can be prevented effectively from violence during deciphering
Crack, improve safety.In the present embodiment, the value of the time of staying of stochastic generation is 10 seconds
Within, preferably 2 seconds, user's practical operation can be also allowed for while meeting time requirement.
Step A3, intelligent terminal's compass is monitored, rotate compass extremely when listening to user
After expecting position and stopping operating, it is judged that whether the time that stops operating reaches the described time of staying,
If so, read and record current compass data, proceeding to step A4;Otherwise, step is returned
Rapid A3, continues to monitor.
During practical operation, in order to the effectiveness of compass data is effectively ensured, after step A3
Also include compass data verification operation: judge whether current compass data reaches encryption data
Requirement, if so, proceeds to step A4;Otherwise, it is back to step A2, regenerates random
The time of staying and compass data.Wherein, it is judged that whether current compass data reaches encryption data
Requirement time, its basis for estimation is: whether current compass data is at the beginning of intelligent terminal's compass
Beginningization data (i.e. active user take intelligent terminal just to direction), if so, show user also
It is not provided with the password of non-initial, then judges that current compass data is not up to encryption data
Requirement;If it is not, show the password of user setup non-initial, then judge current compass number
According to the requirement having reached encryption data.
Step A4, by current compass data with preset software key carry out Hybrid Encryption,
Generate the character string of MD5, this character string is added confidential information and the described time of staying as one
Preserve in the lump, proceed to step A5.
Step A5, judge whether also to need generation to add confidential information, if so, return step A2, continue
Continuous prompting user generates another and adds confidential information;If it is not, encryption flow terminates.
Deciphering flow process specifically includes following steps (as shown in Figure 2):
Step B1, after user enters decryption interface, initialize the compass letter on intelligent terminal
Breath, if initializing successfully, proceeds to step B2;If initializing unsuccessful, then show traditional
Input through keyboard interface or figure inputting interface, carry out character deciphering or figure deciphering behaviour for user
Make.
Step B2, will initialize successfully after compass information be shown on intelligent terminal interface,
Prompting user begins to use compass to be decrypted operation;And obtain corresponding with this decryption oprerations
The time of staying, proceed to step B3.
Step B3, intelligent terminal's compass is monitored, rotate compass extremely when listening to user
After expecting position and stopping operating, it is judged that whether the time that stops operating reaches corresponding described stop
Time, if so, read and record current compass data, proceeding to step B4;Otherwise,
Return step B3, continue to monitor.
It can also be appreciated that the effectiveness of compass data during in order to deciphering be effectively ensured,
Compass data verification operation is the most also included: judge that current compass data is after step B3
The no requirement reaching to solve ciphertext data, if so, proceeds to step B4;Otherwise, it is back to step B2,
Reacquire the corresponding time of staying and compass data.Judge whether current compass data reaches
Solving the requirement of ciphertext data, its basis for estimation is consistent with the requirement of encryption data, does not repeats.
Step B4, by current compass data with preset software key carry out hybrid combining,
Generate a decryption information, proceed to step B5.
Step B5, to judge that whether current decryption information adds confidential information with the correspondence preserved consistent,
If so, prompting user's successful decryption, proceeds to step B6;Otherwise, prompting user deciphers failure,
Return step B2, restart deciphering.
Step B6, judge whether also to need to proceed decryption oprerations and (i.e. also have other to solve secret letters
Breath needs to generate), if so, return step B2, prompting user proceeds decryption oprerations;If
No, deciphering flow process terminates.
Shown in Figure 3, present invention also offers a kind of encryption and decryption based on intelligent terminal's compass
System, including encrypting module and deciphering module.Specifically, described encrypting module includes encryption
Initialization submodule, encryption pre-operation submodule, encryption are monitored submodule, are added confidential information generation
Submodule and encryption flow judge submodule.Due in the present embodiment, the above-mentioned son of encrypting module
The function of module is to operate one to one with encryption flow, therefore, does not repeats (concrete
Can be found in the corresponding contents of Summary).It addition, described deciphering module includes at the beginning of deciphering
Submodule, decryption information generation are monitored in beginning beggar's module, deciphering pre-operation submodule, deciphering
Module, decryption information syndrome module and deciphering flow process judge submodule.Similarly, since this reality
Executing in example, the function of the above-mentioned submodule of deciphering module is with deciphering flow operations one to one,
Therefore, (specifically can be found in the corresponding contents of Summary) is not repeated.
Further, during practical operation, in order to the effectiveness of the compass data of encryption is effectively ensured
With the effectiveness of deciphering compass data, therefore, also have additional encryption sieve in the inside of encrypting module
Dish data verification submodule;Also deciphering compass data checking is had additional in the inside of deciphering module
Module.Wherein, described encryption compass data checking submodule is used for: judge that submodule is monitored in encryption
Whether the current compass data of block record reaches the requirement of encryption data, if so, to adding confidential information
Generate submodule transmission and add confidential information generation signal;Otherwise, send to encryption pre-operation submodule
Encryption pre-operation signal, regenerates the random time of staying and compass data.Described deciphering sieve
Dish data verification submodule is used for: judge that deciphering is monitored the current compass data of submodule record and is
The no requirement reaching to solve ciphertext data, if so, generates submodule to decryption information and sends decryption information
Generate signal;Otherwise, send deciphering pre-operation signal to deciphering pre-operation submodule, again obtain
Take the random time of staying and compass data.
It should be understood that the encryption and decryption system based on intelligent terminal's compass that above-described embodiment provides
System, when carrying out encryption and decryption, is only illustrated with the division of above-mentioned each functional module, actual
In application, as required above-mentioned functions distribution can be completed by different functional modules, will be
The internal structure of system is divided into different functional modules, to complete described above whole or portion
Divide function.
The present invention is not limited to above-mentioned embodiment, for those skilled in the art
For, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications,
Within these improvements and modifications are also considered as protection scope of the present invention.This specification is not made in detail
The content described belongs to prior art known to professional and technical personnel in the field.
Claims (10)
1. an encipher-decipher method based on intelligent terminal's compass, this encipher-decipher method includes adding
Close flow process and deciphering flow process, it is characterised in that described encryption flow includes:
A1, after user enters encrypted interface, initialize the compass information on intelligent terminal, turn
Enter A2;
A2, will initialize successfully after compass information be shown on intelligent terminal interface;And with
Machine generates a time of staying corresponding with this encryption data, proceeds to A3;
A3, intelligent terminal's compass is monitored, rotate compass to expecting when listening to user
Position after stopping operating, it is judged that whether the time that stops operating reaches the described time of staying, if so,
Read and record current compass data, proceed to A4;Otherwise, return A3, continue to monitor;
A4, by current compass data with preset software key carry out Hybrid Encryption, generate
The character string of MD5, adds confidential information with the described time of staying in the lump using this character string as one
Preserve.
2. encipher-decipher method based on intelligent terminal's compass as claimed in claim 1, it is special
Levying and be, described deciphering flow process includes:
B1, after user enters decryption interface, initialize the compass information on intelligent terminal, turn
Enter B2;
B2, will initialize successfully after compass information be shown on intelligent terminal interface;And obtain
Take the time of staying corresponding with this decryption oprerations, proceed to B3;
B3, intelligent terminal's compass is monitored, rotate compass to expecting when listening to user
Position after stopping operating, it is judged that whether the time that stops operating reaches the corresponding time of staying, if
It is to read and record current compass data, proceed to B4;Otherwise, return B3, continue
Monitor;
B4, by current compass data with preset software key carry out hybrid combining, generate
One decryption information, proceeds to B5;
B5, to judge that whether current decryption information adds confidential information with the correspondence preserved consistent, if
It is that deciphering flow process terminates;Otherwise, return B2, restart deciphering.
3. encipher-decipher method based on intelligent terminal's compass as claimed in claim 2, it is special
Levy and be: in step A1 of described encryption flow, if the compass information on intelligent terminal is initial
Change unsuccessful, then show input through keyboard interface or figure inputting interface, carry out character for user and add
Close or figure encryption operates;In step B1 of described deciphering flow process, if sieve on intelligent terminal
Dish information initializing is unsuccessful, then show input through keyboard interface or figure inputting interface, for user
Carry out character deciphering or figure decryption oprerations.
4. encipher-decipher method based on intelligent terminal's compass as claimed in claim 2, it is special
Levy and be: between step A3 of described encryption flow, A4, also include compass data checking behaviour
Make: judge whether current compass data reaches the requirement of encryption data, if so, proceed to A4;
Otherwise, return A2, regenerate the random time of staying and compass data;
Between step B3 of described deciphering flow process, B4, the most also include compass data checking behaviour
Make: judge whether current compass data reaches to solve the requirement of ciphertext data, if so, proceed to B4;
Otherwise, return B2, reacquire the corresponding time of staying and compass data.
5. encipher-decipher method based on intelligent terminal's compass as claimed in claim 2, it is special
Levy and be: also include following operation after step A4 of described encryption flow: judge whether also
Need to generate and add confidential information, if so, return step A2, continue to generate another and add confidential information;
If it is not, encryption flow terminates;
Following operation is also included: judge whether also to need to continue after step B5 of described deciphering flow process
Continue and be decrypted operation, if so, return step B2, proceed decryption oprerations;If it is not,
Deciphering flow process terminates.
6. an encrypting and deciphering system based on intelligent terminal's compass, this encrypting and deciphering system includes adding
Close module and deciphering module, it is characterised in that;Described encrypting module includes encrypted initialization submodule
Block, encryption pre-operation submodule, encryption are monitored submodule and add confidential information generation submodule;
Described encrypted initialization submodule is used for: initialize intelligence after user enters encrypted interface
Compass information in terminal, and send encryption to encryption pre-operation submodule after successful initialization
Pre-operation signal;
Described encryption pre-operation submodule is used for: after receiving encryption pre-operation signal, will initialize
Compass information after success is shown on intelligent terminal interface;And stochastic generation one adds with this
The time of staying that ciphertext data is corresponding, monitor submodule to encryption and send encryption monitoring signal;
Described encryption is monitored submodule and is used for: after receiving encryption monitoring signal, to intelligent terminal sieve
Dish is monitored, and rotates compass to expecting position and after stopping operating when listening to user, it is judged that
Whether the time that stops operating reaches the described time of staying, if so, reads and records current sieve
Dish data, add confidential information generation signal to adding confidential information generation submodule transmission;Otherwise, send
Encryption monitoring signal, continues to monitor;
Described add confidential information generate submodule for: receive and add confidential information and generate after signal, ought
Front compass data carries out Hybrid Encryption with the software key preset, and generates the character string of MD5,
As one, this character string is added confidential information preserve in the lump with the described time of staying.
7. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 6, it is special
Levy and be: described deciphering module include decipher initialization submodule, deciphering pre-operation submodule,
Submodule is monitored in deciphering, decryption information generates submodule and decryption information syndrome module;
Described deciphering initialization submodule is used for: initialize intelligence after user enters decryption interface
Compass information in terminal, and send deciphering to deciphering pre-operation submodule after successful initialization
Pre-operation signal;
Described deciphering pre-operation submodule is used for: after receiving deciphering pre-operation signal, will initialize
Compass information after success is shown on intelligent terminal interface;And obtain and this decryption oprerations pair
The time of staying answered, monitor submodule to deciphering and send deciphering monitoring signal;
Described deciphering is monitored submodule and is used for: after receiving deciphering monitoring signal, to intelligent terminal sieve
Dish is monitored, and rotates compass to expecting position and after stopping operating when listening to user, it is judged that
Whether the time that stops operating reaches the corresponding time of staying, if so, reads and records current
Compass data, generates submodule to decryption information and sends decryption information generation signal;Otherwise, send out
Send deciphering monitoring signal, continue to monitor;
Described decryption information generates submodule and is used for: after receiving decryption information generation signal, ought
Front compass data carries out hybrid combining with the software key preset, and generates a decryption information,
And send deciphering inspection signal to decryption information syndrome module;
Described decryption information syndrome module is used for: after receiving deciphering inspection signal, it is judged that current
Decryption information whether to add confidential information with the correspondence preserved consistent, if so, terminate to decipher;Otherwise,
Send deciphering pre-operation signal to deciphering pre-operation submodule, restart deciphering.
8. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 7, it is special
Levy and be: described encrypted initialization submodule, when compass information initializes unsuccessful, shows key
Dish inputting interface or figure inputting interface, carry out character encryption or figure encryption operation for user;
Described deciphering initialization submodule, when compass information initializes unsuccessful, shows input through keyboard circle
Face or figure inputting interface, carry out character deciphering or figure decryption oprerations for user.
9. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 7, it is special
Levy and be: described encrypting module also includes encrypting compass data checking submodule, adds for judgement
Whether the current compass data of close monitoring submodule record reaches the requirement of encryption data, if so,
Confidential information generation signal is added to adding confidential information generation submodule transmission;Otherwise, to encryption pre-operation
Submodule sends encryption pre-operation signal, regenerates the random time of staying and compass data;
Described deciphering module also includes deciphering compass data checking submodule, is used for judging deciphering prison
Whether the current compass data listening submodule record reaches to solve the requirement of ciphertext data, if so, to solution
Confidential information generates submodule and sends decryption information generation signal;Otherwise, to deciphering pre-operation submodule
Block sends deciphering pre-operation signal, reacquires the corresponding time of staying and compass data.
10. encrypting and deciphering system based on intelligent terminal's compass as claimed in claim 7, it is special
Levy and be: described encrypting module also includes that encryption flow judges submodule, be used for judging whether also
Need to generate and other add confidential information, if so, send encryption pre-operation to encryption pre-operation submodule
Signal, continues to generate another and adds confidential information;If it is not, end encryption flow;
Described deciphering module also includes that deciphering flow process judges submodule, is used for judging whether also to need to continue
Continue and be decrypted operation, if so, send deciphering pre-operation signal to deciphering pre-operation submodule,
Proceed decryption oprerations;If it is not, terminate deciphering flow process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610606364.3A CN106027229B (en) | 2016-07-28 | 2016-07-28 | A kind of encryption and decryption method and system based on intelligent terminal compass |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610606364.3A CN106027229B (en) | 2016-07-28 | 2016-07-28 | A kind of encryption and decryption method and system based on intelligent terminal compass |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106027229A true CN106027229A (en) | 2016-10-12 |
CN106027229B CN106027229B (en) | 2019-04-23 |
Family
ID=57114796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610606364.3A Active CN106027229B (en) | 2016-07-28 | 2016-07-28 | A kind of encryption and decryption method and system based on intelligent terminal compass |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027229B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107889102A (en) * | 2016-09-30 | 2018-04-06 | 中兴通讯股份有限公司 | The method and apparatus of information encryption and decryption in a kind of short message |
CN108762553A (en) * | 2018-05-17 | 2018-11-06 | Oppo广东移动通信有限公司 | Processing method, device, storage medium and the electronic device of touch information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385472A (en) * | 2010-09-06 | 2012-03-21 | 深圳富泰宏精密工业有限公司 | Unlocking system and method for portable electronic device |
CN103236176A (en) * | 2013-03-19 | 2013-08-07 | 郭海锋 | Method and system for mobile equipment to sense traffic signals on traveling path |
CN103248477A (en) * | 2013-04-27 | 2013-08-14 | 深圳创维-Rgb电子有限公司 | Dynamic encryption method and device |
CN104183036A (en) * | 2013-05-20 | 2014-12-03 | Nxp股份有限公司 | Movement history assurance for secure passive keyless entry and start systems |
-
2016
- 2016-07-28 CN CN201610606364.3A patent/CN106027229B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102385472A (en) * | 2010-09-06 | 2012-03-21 | 深圳富泰宏精密工业有限公司 | Unlocking system and method for portable electronic device |
CN103236176A (en) * | 2013-03-19 | 2013-08-07 | 郭海锋 | Method and system for mobile equipment to sense traffic signals on traveling path |
CN103248477A (en) * | 2013-04-27 | 2013-08-14 | 深圳创维-Rgb电子有限公司 | Dynamic encryption method and device |
CN104183036A (en) * | 2013-05-20 | 2014-12-03 | Nxp股份有限公司 | Movement history assurance for secure passive keyless entry and start systems |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107889102A (en) * | 2016-09-30 | 2018-04-06 | 中兴通讯股份有限公司 | The method and apparatus of information encryption and decryption in a kind of short message |
CN108762553A (en) * | 2018-05-17 | 2018-11-06 | Oppo广东移动通信有限公司 | Processing method, device, storage medium and the electronic device of touch information |
CN108762553B (en) * | 2018-05-17 | 2021-05-07 | Oppo广东移动通信有限公司 | Touch information processing method and device, storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN106027229B (en) | 2019-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101300808B (en) | Method and arrangement for secure autentication | |
CN106656476A (en) | Password protecting method and device | |
CN109600223A (en) | Verification method, Activiation method, device, equipment and storage medium | |
CN102685749B (en) | Wireless safety authentication method orienting to mobile terminal | |
CN101262349A (en) | SMS-based identity authentication method and device | |
CN105447394B (en) | Intelligent password key with local data encryption function | |
CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN111615105A (en) | Information providing method, information obtaining method, information providing device, information obtaining device and terminal | |
CN109617675B (en) | Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal | |
CN101593550B (en) | High strength encrypting USB flash disk for police | |
CN101122942A (en) | Data safe reading method and its safe storage device | |
CN103888429B (en) | Virtual machine starts method, relevant device and system | |
CN101488111A (en) | Identification authentication method and system | |
CN101964805B (en) | Method, equipment and system for safely sending and receiving data | |
CN1855809A (en) | Securely using a display to exchange information | |
CN1838141A (en) | Technology for improving security of accessing computer application system by mobile phone | |
CN105631298B (en) | A kind of ciphering and deciphering device and method | |
CN105592431B (en) | SMS encryption system based on iOS system mobile terminal | |
CN101540675B (en) | Smart key equipment and communication method and system of application software | |
CN102082669A (en) | Security certification method and device | |
CN201716734U (en) | Usb safe storage encryption device | |
CN108182745A (en) | The smart lock and its encryption method of a kind of decentralization | |
CN106027229A (en) | Encryption and decryption method and system based on intelligent terminal compass | |
CN106210240B (en) | A kind of encryption and decryption method and system based on intelligent terminal gyroscope |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230831 Address after: 518042 13D02-2, Zone A, Hongsong Building, Tian'an Community, Shatou Street, Futian District, Shenzhen City, Guangdong Province, China Patentee after: Shenzhen SBL Technology Co.,Ltd. Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd. |