CN106161008B - A kind of terminal encryption method, terminal encryption device and terminal - Google Patents

A kind of terminal encryption method, terminal encryption device and terminal Download PDF

Info

Publication number
CN106161008B
CN106161008B CN201610411861.8A CN201610411861A CN106161008B CN 106161008 B CN106161008 B CN 106161008B CN 201610411861 A CN201610411861 A CN 201610411861A CN 106161008 B CN106161008 B CN 106161008B
Authority
CN
China
Prior art keywords
key
terminal
digital
data encryption
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610411861.8A
Other languages
Chinese (zh)
Other versions
CN106161008A (en
Inventor
赵安宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201610411861.8A priority Critical patent/CN106161008B/en
Publication of CN106161008A publication Critical patent/CN106161008A/en
Application granted granted Critical
Publication of CN106161008B publication Critical patent/CN106161008B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Abstract

The present invention provides a kind of terminal encryption method and apparatus, receives the CIPHERING REQUEST for being directed to the terminal;According to the CIPHERING REQUEST, data encryption key is set;Wherein, which includes at least a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated;The terminal is encrypted using the data encryption key.Due to dynamic digital key and the terminal system time in data encryption key provided in an embodiment of the present invention wherein one it is associated, after the system time of the terminal changes, the dynamic digital key also changes, accordingly, it also changes for the data encryption key to the terminal encryption, that is, is directed to same primary encryption, user needs the system time according to the terminal, it inputs different numbers to be decrypted, improves the safety of terminal encryption password.

Description

A kind of terminal encryption method, terminal encryption device and terminal
Technical field
The present invention relates to mobile communication technology fields, and in particular to a kind of mobile terminal encryption method, device and terminal.
Background technique
With the continuous development of mobile terminal technology, the mobile terminals such as smart phone, tablet computer, intelligent wearable device exist The role taken in daily life is more and more important.At the same time, the safety of corresponding mobile terminal and user Privacy concern also have been to be concerned by more and more people.
Currently, most of mobile terminals all support encryption function, it mainly include the encryption function for mobile terminal screen, Such as numerical ciphers screen locking, nine grids screen locking, and the figure for the encryption function of file in mobile terminal, such as mobile terminal Volume encryption, address list encryption, SMS encryption etc..However, current mobile terminal Crypted password is usually one be set by the user The nine grids pattern of string stationary digital or one group of permanent order carries out mobile terminal by the way of such fixed secret key Encryption, fixed secret key are easy to be known by other people, for example other people obtain set by user nine by the sliding trace on mobile phone screen The fixation secret key etc. to mobile terminal is plagiarized when palace lattice secret key or user's input numerical ciphers, and then is lost mobile terminal and added Close original idea reduces the safety of private data in mobile terminal.
Summary of the invention
The embodiment of the present invention provides a kind of terminal encryption method, apparatus and terminal, it is intended to solve terminal encryption secret key and be easy The problem of leakage, improves the safety of private data and the user experience of terminal in terminal.
On the one hand, the present invention provides a kind of mobile terminal encryption method, comprising:
Receive the CIPHERING REQUEST for being directed to the terminal;
According to the CIPHERING REQUEST, data encryption key is set, wherein the data encryption key includes at least one and moves State digital cipher, the dynamic digital key and the terminal system time wherein one it is associated;
The terminal is encrypted using the data encryption key.
Preferably, described according to the CIPHERING REQUEST, data encryption key is set, comprising:
According to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital key;
The dynamic number is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm Word key;
Receive the static number key in the data encryption key;
The data encryption key is generated according to the dynamic digital key and the static number key.
Preferably, described according to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital Key, comprising:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the end The wherein one-bit digital of end system time is identical;
If they are the same, by the data encryption key of the digital corresponding position of the data encryption key of user's input, setting For with the wherein associated dynamic digital key of the terminal system time.
Further, it is described if they are the same, by user input the data encryption key digital corresponding position number Encryption key is set as the wherein associated dynamic digital key with the terminal system time, comprising:
If they are the same, it asks the user whether to want the number of the digital corresponding position of the data encryption key of user's input Encryption key is set as the wherein associated dynamic digital key with the terminal system time;
It is if user's selection is, the digital encryption of the digital corresponding position of the data encryption key of user's input is close Key is set as the wherein associated dynamic digital key with the terminal system time.
Preferably, described to be generated according to the wherein one-bit digital and preset digital prediction algorithm of the terminal system time The dynamic digital key, comprising:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
Preferably, after the terminal being encrypted using the data encryption key, further includes:
The digital decrypted key for receiving user's input judges whether are the digital decrypted key and the data encryption key Unanimously;
If the digital decrypted key is consistent with the data encryption key, decryption processing is executed to terminal.
On the other hand, the present invention also provides a kind of terminal encryption devices, comprising:
Receiving module, for receiving the CIPHERING REQUEST for being directed to the terminal;
Setup module, for data encryption key being arranged, wherein the data encryption key according to the CIPHERING REQUEST Including at least a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated;
Encrypting module, for the terminal to be encrypted using the data encryption key.
Preferably, the setup module includes selecting unit, dynamic key production unit, receiving unit and generation unit;
The selecting unit is used for according to the CIPHERING REQUEST, select at least one of the data encryption key for dynamically Digital cipher;
The dynamic key production unit is used for wherein one-bit digital and preset number according to the terminal system time Word prediction algorithm generates the dynamic digital key;
The receiving unit is used to receive the static number key in the data encryption key;
The generation unit, which is used to generate the number according to the dynamic digital key and the static number key, to be added Key.
Preferably, the selecting unit is used for:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the end The wherein one-bit digital of end system time is identical;
If they are the same, by the data encryption key of the digital corresponding position of the data encryption key of user's input, setting For with the wherein associated dynamic digital key of the terminal system time.
Preferably, the dynamic key production unit is used for:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
Preferably, the terminal encryption device further include:
Judgment module judges the digital decrypted key and the number for receiving the digital decrypted key of user's input Whether word encryption key is consistent;
Deciphering module executes decryption to terminal if consistent with the data encryption key for the digital decrypted key Processing.
In another aspect, the present invention also provides a kind of terminals, which is characterized in that the terminal includes above-mentioned terminal encryption dress It sets.
Terminal encryption method provided in an embodiment of the present invention, when receiving the CIPHERING REQUEST for the terminal;According to this Data encryption key is arranged in CIPHERING REQUEST;Wherein, which includes at least a dynamic digital key, the dynamic Digital cipher and the terminal system time wherein one it is associated;The terminal is carried out at encryption using the data encryption key Reason.Due to wherein one of dynamic digital key and the terminal system time in data encryption key provided in an embodiment of the present invention Position is associated, and after the system time of the terminal changes, which also changes, correspondingly, for giving The data encryption key of the terminal encryption also changes, that is, is directed to same primary encryption, and user needs the system according to the terminal Time inputs different numbers and is decrypted, improves the safety of terminal encryption password.Simultaneously as only user oneself Just know the dynamic digital key and the terminal system time who is associated, therefore work as even if having been revealed when some Preceding password, when other people are decrypted time afterwards using the password, since the variation of the terminal system time causes to move The change of state digital cipher, thus can not successful decryption, improve the safety of terminal.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Figure 1A is a kind of terminal encryption method flow diagram provided in an embodiment of the present invention;
Figure 1B is another terminal encryption method flow diagram provided in an embodiment of the present invention;
Fig. 2A~Fig. 2 E is a kind of schematic diagram of data encryption key setting up procedure provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram that data encryption key is arranged according to CIPHERING REQUEST provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal encryption apparatus structure schematic diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.It is this to set Standby may include: honeycomb or other communication equipments, show with single line display or multi-line display or without multi-line Show the honeycomb or other communication equipments of device;PCS (Personal Communications Service, PCS Personal Communications System), It can be with combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is a Personal digital assistant), may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, Calendar and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or the palm Laptop computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or Other equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (boat Empty, sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in The operation of any other of the earth and/or space position." terminal " used herein above, " terminal device " can also be communication eventually End, access terminals, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, it is mobile mutual Networked devices) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
Before carrying out detailed explanation to the embodiment of the present invention, first the application scenarios of the embodiment of the present invention are given It introduces.Method provided in an embodiment of the present invention is applied to terminal, which can be smart phone, tablet computer, computer etc.. Exemplary, method provided in an embodiment of the present invention is applied to terminal, and the terminal is configured with the display list for showing the system time Member and the encryption unit for being encrypted to the terminal.
Figure 1A is a kind of terminal encryption method flow diagram provided in an embodiment of the present invention, the terminal encryption of the embodiment of the present invention The executing subject of method is terminal, referring to Figure 1A, this method comprises:
Step S110: the CIPHERING REQUEST for being directed to the terminal is received.
Terminal needs to encrypt in many instances, for example, the unlocking pin of startup password, screen, file and file plus Password etc..Therefore, which can provide the password set interface with multiple word bits to user, to receive user's logarithm The input and setting of word encryption key, it is exemplary, as shown in Figure 2 A.
Wherein, it can be triggered by user for the CIPHERING REQUEST of the terminal, user can be by specified operation triggering, this refers to Fixed operation can be to click the operation of password setting options, the operation for clicking encryption button etc., and the embodiment of the present invention does not do this It limits.Wherein, which is used to trigger the CIPHERING REQUEST for the terminal, which can be icon, button, control Part etc., it is not limited in the embodiment of the present invention.
In practical application, which can show password set interface, and receives to be directed to based on the password set interface and be somebody's turn to do The CIPHERING REQUEST of terminal.
Step S120: according to the CIPHERING REQUEST, data encryption key is set;Wherein, which includes at least One dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated.
Specifically, refering to what is shown in Fig. 3, the implementation procedure of step S120 includes step S121~step S124.Fig. 2A~figure 2E is a kind of schematic diagram of data encryption key setting up procedure provided in an embodiment of the present invention, below in conjunction with Fig. 2A~Fig. 2 E, The implementation procedure of step S120 is described in detail.
Step S121: according to the CIPHERING REQUEST, selecting at least one of data encryption key is dynamic digital key.It receives To after CIPHERING REQUEST, which, which provides, has the password set interface of multiple word bits to user, to receive user to digital encryption The input and setting of key, that is, receive user instructions;Then extremely according to the user instruction selection data encryption key received Few one is dynamic digital key.
Wherein, according to the CIPHERING REQUEST, an at least mode for dynamic digital key for data encryption key is selected, is wrapped Include the following two kinds mode:
Mode one: with reference to shown in Fig. 2A, it is assumed that there are four word bit, i.e. password is Password Input frame (password set interface) tool Four.Can choose data encryption key wherein at least one word bit according to user instructions is dynamic digital key, such as is selected Third position is selected.With reference to Fig. 2A, user has selected clock icon corresponding with third password position, i.e., expression user has selected the Three password positions are as dynamic digital key.
Mode two: first according to the CIPHERING REQUEST, the number of the data encryption key of user's input is received.And then it obtains and is somebody's turn to do The system time of terminal, judge user input data encryption key number whether the wherein one digit number with the terminal system time Word is identical.If the number of the data encryption key of user's input is identical as the wherein one-bit digital of terminal system time, by user The data encryption key of the digital corresponding position of the data encryption key of input is set as wherein one with the terminal system time Associated dynamic digital key.
Exemplary with reference to aforesaid way two, when user is in the second word bit input number 2 of Password Input frame, and terminal is worked as Preceding system time is 16:20, then the minute of the number 2 inputted and terminal present system time, previous bit value 2 was consistent, then may be used To set dynamic digital key for the second of the data encryption key, i.e. the second word bit of Password Input frame is dynamic digital Key.
Certainly, when the number of the data encryption key of user's input is identical as the wherein one-bit digital of terminal system time When, may not be directly by user input data encryption key digital corresponding position data encryption key be set as with The wherein associated dynamic digital key of terminal system time, but first inquiry user will use further according to user instruction The data encryption key of the digital corresponding position of the data encryption key of family input is set as wherein one with the terminal system time The associated dynamic digital key in position.That is: if the number of the data encryption key of user's input and terminal system time are wherein One-bit digital is identical, asks the user whether to want that the digital encryption of the digital corresponding position for the data encryption key for inputting user is close Key is set as the wherein associated dynamic digital key with the system time of terminal;If user's selection is, by user The data encryption key of the digital corresponding position of the data encryption key of input is set as wherein one with the system time of terminal The associated dynamic digital key in position.
For example, when user is in a certain word bit input number 2 of Password Input frame, and present terminal system time is 16:20, The number then inputted is consistent with minute previous bit value, then can ask the user whether to want to set dynamic digital for the word bit Key, if being switched to dynamic digital key set interface then to select corresponding dynamic digital key.
Step S122: dynamic number is generated according to the wherein one-bit digital of terminal system time and preset digital prediction algorithm Word key.Terminal selected according to user instructions at least one of data encryption key for dynamic digital key after, then terminal It determines that who digital correlation of the dynamic digital password and the terminal system time join according to user instructions, and then determines a kind of Preset digital prediction algorithm is as the incidence relation between the dynamic digital password and the bit digital of the terminal system time.
It is exemplary, determine the process of who digital correlation connection of the dynamic digital password and the terminal system time such as Under: assuming that present terminal system time be 16 when, 20 points.Therefore, in the present system time information of the terminal, there is numerical value Temporal information 2 groups of temporal informations such as (h), point (m) sometimes, (h), point (m) are selected for user when can provide.It should be noted that , above-mentioned every group of temporal information at least all comprising double figures value (such as minute include 2 and 0 double figures value, hour include 1 and 6 Double figures value), so can also by when (h), point (m) continue to segment, such as will by when (h) be divided into h1, h2, respectively correspond 16 When in 1,6;Point (m) is divided into m1, m2, respectively corresponds 2,0 in 20 points.Please refer to Fig. 2 B, it is shown that h1, h2, m1, m2 are supplied User's selection, terminal selects the m1 of terminal system time, the i.e. tens of minute according to user instructions, it is determined that the dynamic number Word password is associated with the tens of the minute of the terminal system time.
For another example, it is assumed that present terminal system time be 16 when, 20 points.Therefore, believe in the present system time of the terminal In breath, 2 groups of temporal informations, every group of temporal information such as (h), point (m) all include double figures value to the temporal information with numerical value sometimes (such as minute includes 2 and 0 double figures value, and hour includes 1 and 6 double figures values), so can also by when (h), point (m) continue it is thin Point, for example, by when (h) be divided into h1, h2, when respectively corresponding 16 in 1,6;Point (m) is divided into m1, m2, is respectively corresponded in 20 points 2,0.It is exemplary, it is assumed that the second-order digit of the digital encryption secret key of user's input is 2, then terminal determines number 2 and terminal The m1 bit digital of present system time is identical, then present system time in the second-order digit of the digital encryption secret key and terminal M1 bit digital is associated.
It is exemplary, determine the preset digital prediction algorithm of one kind as the dynamic digital password and the terminal system time Incidence relation between the bit digital can pass through following two implementation:
Implementation one: after determining the dynamic digital password and who digital correlation connection of the terminal system time, then There is provided at least one preset digital prediction algorithm for selection by the user.Preset digital prediction algorithm is simple function, should Function includes simple addition, subtraction, multiplication, and simple addition, subtraction, multiplication can reduce the difficulty in computation of user, can be with User is allowed to be quickly obtained the dynamic digital cryptographic keys according to the present system time of terminal, it is subsequent to facilitate user to carry out Decryption oprerations.It is exemplary, such as Fig. 2 C so, with additive and for subtraction, can provide simple function i-1, i, i+1, i+2 to User's selection, the wherein one-bit digital in terminal system temporal information that wherein i has been selected for user, is only to lift herein certainly Example explanation, does not represent the preset digital prediction algorithm of the embodiment of the present invention and is confined to this.With reference to shown in Fig. 2 C, user is selected Function i+1.
Implementation two: after determining the dynamic digital password and who digital correlation connection of the terminal system time, directly It connects using the bit digital of terminal system time as the dynamic digital password, i.e. the dynamic digital password and terminal system time Incidence relation between the bit digital is relation of equality.
For example, present terminal system time be 16 when, 20 points.With reference to Fig. 2 B, it is shown that h1, h2, m1, m2 are selected for user Select, terminal selects the m1 of terminal system time according to user instructions, i.e., the tens of minute as with the data encryption key Third position key.At this point, user specifies m1 directly as the dynamic digital key of the data encryption key.
Further, during determining digital decrypted key, according to wherein one and the number of terminal system time The calculated result (dynamic digital key) that prediction algorithm obtains may not be a position, can only take to calculated result at this time a Position.That is: operation result is generated according to the wherein one-bit digital of terminal system time and preset digital prediction algorithm, then with fortune The numerical value of result position is calculated as the dynamic digital key.It is exemplary, if the digital decrypted key prestored be 9,8, m2+1,6, M2 is the latter bit value 9 of minute numerical value 49, and the corresponding function of digital prediction algorithm is m2+1, then the calculated result of function is 10, password of a position 0 of calculated result as the word bit is only taken at this time, i.e. current password is 9,8,0,6.
Step S123: terminal receives the static number key in data encryption key.The static number key is number.
For each word bit of Password Input frame, user may be static number key in word bit input, can also Can select dynamic digital key.It, can be in general, after whole word bits of Password Input frame are all inputted or selected by user Terminal issues determine instruction, such as clicks " determination " key to complete the determination of password setting.Terminal is receiving determine instruction Afterwards, the digital encryption for just receiving the static number key in the data encryption key of each word bit user input or user setting is close Dynamic digital key in key.
Therefore, terminal both can first receive the static number key in data encryption key, can also first receive number and add Dynamic digital key in key, can also be while receiving, i.e. step S122 and step S123 can be interchanged or side by side.
Step S124: terminal generates data encryption key according to the dynamic digital key and the static number key.Such as User setting password (i.e. data encryption key) 9,8, m1+1,6, with reference to shown in Fig. 2 D and Fig. 2 E, wherein 9,8,6 three are quiet State digital cipher, if it is exactly m1 that user, which has selected above-mentioned m1 and function i+1, i, dynamic digital key is m1+1.After Input password decryption when, m1 by become input password when minute numerical value previous bit value.Assuming that user 49 divides at 21 Password decryption is inputted, then the previous bit value 4 that m1 is 49 at this time, the corresponding code characters of the word bit are 4+1=5, i.e. user exists Need to be only in word bit input 5 correct matched when input password decryption, i.e. four word bits are respectively 9,8,5,6 to be only Match.
Step S130: terminal is encrypted terminal using the data encryption key.
Terminal is according to each word bit user static number key inputted or the dynamic digital key and word bit of user's selection Sequence determines data encryption key and stores.Terminal receives static number key or the user selection of each word bit user input The dynamic digital that the static number key inputted after dynamic digital key according to user corresponding to each word bit or user select Key forms whole data encryption key.
Figure 1B is another terminal encryption method flow diagram provided in an embodiment of the present invention.In the present embodiment, including step Rapid S110~step S150, step S110~step S130 are consistent with the description of above-described embodiment.The difference is that in step After S130, further comprise the steps of:
Step S140: terminal receives the digital decrypted key of user's input, judges the digital decrypted key and digital encryption Whether key is consistent;Wherein, which includes at least a dynamic digital key, the dynamic digital key and terminal System time wherein one it is associated.
Terminal can provide the Password Input frame with multiple word bits, for user inputs character namely password.User is defeated After complete, when detecting the determine instruction of user, the character of multiple word bits of user's input is received.
It is exemplary, it is assumed that there are four word bits for Password Input frame tool, i.e. password is four.User can be each in four word bits Inputting a number, totally four numbers are as digital decrypted key, such as the digital decrypted key of user's input is 9,8,7,6.Eventually After end receives the digital decrypted key of user's input, judge whether digital decrypted key is consistent with data encryption key.
Terminal determines that the process of Contemporary Digital encryption key specifically can be with reference to the step in above-mentioned terminal encryption method S122.I.e. according to wherein one (such as m1 of the user's selection among the above) number of terminal system time and preset digital budget Algorithm determines current dynamic digital key;Determine that Contemporary Digital encryption is close further according to static number key and dynamic digital key Key.
For example, if present system time 49 divides when being 21, that is, get present system time information when being 21,49 points. If the data encryption key prestored is 9,8, m1+1,6, Contemporary Digital encryption key is 9,8,5,6.
During determining digital decrypted key, obtained according to wherein one and the digital prediction algorithm of terminal system time Calculated result (dynamic digital key) may be it is double-digit, position can be only taken to calculated result at this time.That is: according to The wherein one-bit digital of terminal system time and preset digital prediction algorithm generate operation result, then with operation result position Numerical value as the dynamic digital key.Such as if the digital decrypted key prestored is 9,8, m2+1,6, m2 be minute numerical value 49 latter bit value 9, the corresponding function of digital prediction algorithm are m2+1, then the calculated result of function is 10, only take meter at this time Password of a position 0 of result as the word bit is calculated, i.e. current password is 9,8,0,6.
After terminal has determined data encryption key (current password), judge whether are digital decrypted key and data encryption key Unanimously, that is, step S150 is executed.
Step S150: if the digital decrypted key is consistent with the data encryption key, decryption processing is executed to terminal.
Specifically, if it is determined that user input digital decrypted key and data encryption key (current password) unanimously, The digital decrypted key for then illustrating user's input is that correctly, the terminal is decrypted at this time.If it is determined that arriving user At least one in the digital decrypted key of input is inconsistent with data encryption key, then password authentification fails, not to the terminal It is decrypted.
It is exemplary, user setting password (i.e. data encryption key) 9, m2+1,8,6, wherein 9,8,6 three are static number Word key, if it is exactly m2 that user, which has selected above-mentioned m2 and function i+1, i, dynamic digital key is m2+1.Assuming that user At 21,49 divide input password decryption, then the latter bit value 9 that m2 is 49 at this time, the corresponding code characters of the word bit are 9+1= 10, i.e. user needs to be only in word bit input 0 in input password decryption correct matched, i.e., at this time if what user inputted Decruption key is 9,0,8,6, then is consistent with the data encryption key 9, m2+1,8,6, then executes at decryption to the terminal Reason.For another example, 50 timesharing when the system time of terminal becomes 21, if the decruption key or 9,0,8,6 of user input, Be with the data encryption key 9, m2+1,8,6 then it is inconsistent, then decryption processing is not executed to the terminal, at this point, if user The decruption key of input is 9,1,8,6, then is consistent with the data encryption key 9, m2+1,8,6, then can hold to the terminal Row decryption processing.
Due in data encryption key provided in an embodiment of the present invention dynamic digital key and terminal system time Wherein one is associated, and after the system time of the terminal changes, which also changes, correspondingly, It also changes for the data encryption key to the terminal encryption, that is, is directed to same primary encryption, user needs according to the terminal System time, input different numbers and be decrypted, improve the safety of terminal encryption password.Simultaneously as only using Family oneself just know the dynamic digital key and the terminal system time who is associated, therefore even if let out when some Current password is revealed, when other people are decrypted time afterwards using the password, due to the variation of the terminal system time Lead to the change of dynamic digital key, thus can not successful decryption, improve the safety of terminal.
Above-mentioned terminal encryption method is corresponded to below, describes a kind of corresponding terminal encryption device.Since the device has The realization of some functions and above-mentioned terminal encryption method is consistent, therefore is only made a brief description below, and more embodiments can To be obtained in conjunction with above-mentioned terminal encryption method.
Fig. 4 is the terminal encryption apparatus module figure of one embodiment.
A kind of terminal encryption device, comprising: receiving module 101, setup module 102 and encrypting module 103.
Receiving module 101 is used to receive the CIPHERING REQUEST for the terminal.
Setup module 102 is used to that data encryption key to be arranged according to the CIPHERING REQUEST;Wherein, the data encryption key is extremely Less include a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated.
Encrypting module 103 is used to that the terminal to be encrypted using the data encryption key.
Further, setup module 102 includes:
Selecting unit, for according to CIPHERING REQUEST, selecting at least one of data encryption key to be dynamic digital key.
Dynamic key production unit, for being calculated according to the wherein one-bit digital and preset digital budget of terminal system time Method generates dynamic digital key.
Receiving unit, for receiving the static number key in data encryption key.
Generation unit, for generating data encryption key according to dynamic digital key and static number key.
Further, selecting unit is used to receive the number of the data encryption key of user's input according to CIPHERING REQUEST;It obtains Take the terminal system time, judge user input data encryption key number whether the wherein one digit number with the terminal system time Word is identical;If they are the same, it sets the data encryption key of the digital corresponding position of the data encryption key of user's input to and end The wherein associated dynamic digital key of end system time.
For example, when user is in the second word bit input number 2 of Password Input frame, and terminal present system time is 16:20, The minute of the number 2 and terminal present system time that are then inputted, previous bit value 2 was consistent, then can be by the data encryption key Second be set as dynamic digital key, i.e., the second word bit of Password Input frame is dynamic digital key.
Certainly, when the number of the data encryption key of user's input is identical as the wherein one-bit digital of terminal system time When, may not be directly by user input data encryption key digital corresponding position data encryption key be set as with The wherein associated dynamic digital key of terminal system time, but first inquiry user will use further according to user instruction The data encryption key of the digital corresponding position of the data encryption key of family input is set as wherein one with the terminal system time The associated dynamic digital key in position.
Further, dynamic key production unit is used for:
Operation result is generated according to the wherein one-bit digital of terminal system time and preset digital prediction algorithm;
Using the numerical value of operation result position as dynamic digital key.
Above-mentioned terminal encryption device further include: judgment module 104 and deciphering module 105.
Judgment module 104 is used to receive the digital decrypted key of user's input, judges digital decrypted key and digital encryption Whether key is consistent;Wherein, data encryption key includes at least a dynamic digital key, dynamic digital key and terminal system Time wherein one it is associated.
If deciphering module 105 is consistent with data encryption key for digital decrypted key, decryption processing is executed to terminal.
Terminal encryption device provided in an embodiment of the present invention, receiving module 101 receive the CIPHERING REQUEST for being directed to the terminal;If Module 102 is set according to the CIPHERING REQUEST, data encryption key is set;Wherein, which includes at least a dynamic Digital cipher, the dynamic digital key and the terminal system time wherein one it is associated;And then encrypting module 103 is used and is somebody's turn to do The terminal is encrypted in data encryption key.Due to the dynamic number in data encryption key provided in an embodiment of the present invention Word key and the terminal system time wherein one it is associated, after the system time of the terminal changes, the dynamic number Word key also changes, correspondingly, the data encryption key for the terminal encryption also changes, i.e., for primary Encryption, user need the system time according to the terminal, input different numbers and be decrypted, improve terminal encryption password Safety.Simultaneously as only user oneself just know the dynamic digital key and the terminal system time who is related Connection, therefore even if having revealed current password when some, when other people are decrypted time afterwards using the password, by Lead to the change of dynamic digital key in the variation of the terminal system time, thus can not successful decryption, improve the peace of terminal Quan Xing.
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.For example, terminal 400 can be mobile electricity Words, computer, TV or tablet computer etc..
Referring to Fig. 4, terminal 400 may include following one or more components: processing component 402, memory 404, power supply Component 406, multimedia component 408, audio component 410, the interface 412 of input/output (I/O), sensor module 414, and Communication component 416.
The integrated operation of the usual controlling terminal 400 of processing component 402, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 402 may include that one or more processors 420 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 402 may include one or more modules, just Interaction between processing component 402 and other assemblies.For example, processing component 402 may include multi-media module, it is more to facilitate Interaction between media component 408 and processing component 402.
Memory 404 is configured as storing various types of data to support the operation in terminal 400.These data are shown Example includes the instruction of any application or method for operating in terminal 400, contact data, and telephone book data disappears Breath, picture, video etc..Memory 404 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 406 provides power supply for the various assemblies of terminal 400.Power supply module 406 may include power management system System, one or more power supplys and other with for terminal 400 generate, manage, and distribute the associated component of power supply.
Multimedia component 408 includes the screen of one output interface of offer between the terminal 400 and user.One In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 408 includes a front camera and/or rear camera.When terminal 400 is in operation mode, such as screening-mode Or when video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera It can be a fixed optical lens system with rear camera or there are focusing and optical zoom capabilities.
Audio component 410 is configured as output and/or input audio signal.For example, audio component 410 includes a Mike Wind (MIC), when terminal 400 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 404 or via communication set Part 416 is sent.In some embodiments, audio component 410 further includes a loudspeaker, is used for output audio signal.
I/O interface 412 provides interface between processing component 402 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 414 includes one or more sensors, and the state for providing various aspects for terminal 400 is commented Estimate.For example, sensor module 414 can detecte the state that opens/closes of terminal 400, and the relative positioning of component, for example, it is described Component is the display and keypad of terminal 400, and sensor module 414 can also detect 400 1 components of terminal 400 or terminal Position change, the existence or non-existence that user contacts with terminal 400,400 orientation of terminal or acceleration/deceleration and terminal 400 Temperature change.Sensor module 414 may include proximity sensor, be configured to detect without any physical contact Presence of nearby objects.Sensor module 414 can also include optical sensor, such as CMOS or ccd image sensor, at As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 416 is configured to facilitate the communication of wired or wireless way between terminal 400 and other equipment.Terminal 400 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 416 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 416 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 400 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 404 of instruction, above-metioned instruction can be executed by the processor 420 of terminal 400 to complete the above method.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out the above method.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
Although it should be understood that Figure 1A, 1B, 3 flow chart in each step successively shown according to the instruction of arrow, But these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these There is no stringent sequences to limit for the execution of step, can execute in the other order.Moreover, Figure 1A, 1B, in 3 at least A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps Quarter executes completion, but can execute at different times, and execution sequence, which is also not necessarily, successively to be carried out, but can be with it The sub-step or at least part in stage of his step or other steps execute in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (8)

1. a kind of terminal encryption method characterized by comprising
Receive the CIPHERING REQUEST for being directed to the terminal;
According to the CIPHERING REQUEST, data encryption key is set, wherein the data encryption key includes at least a dynamic number Word key, the dynamic digital key and the terminal system time wherein one it is associated;
The terminal is encrypted using the data encryption key;
Wherein, described according to the CIPHERING REQUEST, data encryption key is set, comprising:
According to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital key;
It is close that the dynamic digital is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm Key;
Receive the static number key in the data encryption key;
The data encryption key is generated according to the dynamic digital key and the static number key;
Wherein, described according to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital key, packet It includes:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the terminal system The wherein one-bit digital of system time is identical;
If they are the same, it sets the data encryption key of the digital corresponding position of the data encryption key of user's input to and institute State the wherein associated dynamic digital key of terminal system time.
2. encryption method according to claim 1, which is characterized in that it is described if they are the same, by user input the number The data encryption key of the digital corresponding position of encryption key be set as with the terminal system time wherein one it is associated Dynamic digital key, comprising:
If they are the same, it asks the user whether to want the digital encryption of the digital corresponding position of the data encryption key of user's input Key is set as the wherein associated dynamic digital key with the terminal system time;
If user's selection is, the data encryption key of the digital corresponding position of the data encryption key of user's input is set It is set to the wherein associated dynamic digital key with the terminal system time.
3. encryption method according to claim 1 or 2, which is characterized in that its according to the terminal system time Middle one-bit digital and preset digital prediction algorithm generate the dynamic digital key, comprising:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
4. encryption method according to claim 1, which is characterized in that using the data encryption key to the terminal into After row encryption, further includes:
The digital decrypted key for receiving user's input, judge the digital decrypted key and the data encryption key whether one It causes;
If the digital decrypted key is consistent with the data encryption key, decryption processing is executed to terminal.
5. a kind of terminal encryption device characterized by comprising
Receiving module, for receiving the CIPHERING REQUEST for being directed to the terminal;
Setup module, for data encryption key being arranged, wherein the data encryption key is at least according to the CIPHERING REQUEST Including a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated;
Encrypting module, for the terminal to be encrypted using the data encryption key;
Wherein, the setup module includes selecting unit, dynamic key production unit, receiving unit and generation unit;
The selecting unit is used for according to the CIPHERING REQUEST, and selecting at least one of the data encryption key is dynamic digital Key;
The dynamic key production unit is used for pre- according to the wherein one-bit digital of the terminal system time and preset number It calculates algorithm and generates the dynamic digital key;
The receiving unit is used to receive the static number key in the data encryption key;
The generation unit is used to generate the digital encryption according to the dynamic digital key and the static number key close Key;
Wherein, the selecting unit is used for:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the terminal system The wherein one-bit digital of system time is identical;
If they are the same, it sets the data encryption key of the digital corresponding position of the data encryption key of user's input to and institute State the wherein associated dynamic digital key of terminal system time.
6. terminal encryption device according to claim 5, which is characterized in that the dynamic key production unit is used for:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
7. terminal encryption device according to claim 5, which is characterized in that further include:
Judgment module judges that the digital decrypted key and the number add for receiving the digital decrypted key of user's input Whether key is consistent;
Deciphering module executes decryption processing to terminal if consistent with the data encryption key for the digital decrypted key.
8. a kind of terminal, which is characterized in that the terminal includes such as the described in any item terminal encryption devices of claim 5~7.
CN201610411861.8A 2016-06-14 2016-06-14 A kind of terminal encryption method, terminal encryption device and terminal Active CN106161008B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610411861.8A CN106161008B (en) 2016-06-14 2016-06-14 A kind of terminal encryption method, terminal encryption device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610411861.8A CN106161008B (en) 2016-06-14 2016-06-14 A kind of terminal encryption method, terminal encryption device and terminal

Publications (2)

Publication Number Publication Date
CN106161008A CN106161008A (en) 2016-11-23
CN106161008B true CN106161008B (en) 2019-05-07

Family

ID=57353184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610411861.8A Active CN106161008B (en) 2016-06-14 2016-06-14 A kind of terminal encryption method, terminal encryption device and terminal

Country Status (1)

Country Link
CN (1) CN106161008B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462475B (en) * 2018-11-15 2021-08-13 泰康保险集团股份有限公司 Data encryption method, data decryption method and related devices
CN112287369A (en) * 2020-11-02 2021-01-29 珠海格力电器股份有限公司 Decryption method, decryption device, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297403A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Method and system for achieving dynamic password authentication
CN104103107A (en) * 2013-04-03 2014-10-15 陈麟华 Time-varying password and time-varying password lock
CN105095701A (en) * 2014-05-06 2015-11-25 黄熙镜 User authentication method and device and terminal equipment
CN105337729A (en) * 2015-11-19 2016-02-17 广东欧珀移动通信有限公司 Encryption method and device of mobile terminal and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150382190A1 (en) * 2014-06-25 2015-12-31 Qualcomm Incorporated Enhanced secure identity generation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297403A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Method and system for achieving dynamic password authentication
CN104103107A (en) * 2013-04-03 2014-10-15 陈麟华 Time-varying password and time-varying password lock
CN105095701A (en) * 2014-05-06 2015-11-25 黄熙镜 User authentication method and device and terminal equipment
CN105337729A (en) * 2015-11-19 2016-02-17 广东欧珀移动通信有限公司 Encryption method and device of mobile terminal and mobile terminal

Also Published As

Publication number Publication date
CN106161008A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
CN104219058B (en) Authentication, identification authorization method and device
CN104852911B (en) Safe verification method, apparatus and system
EP3001637B1 (en) Methods and devices for authorizing operation
CN103916233B (en) A kind of information ciphering method and device
US11196553B2 (en) Command transmission method and apparatus, electronic device
US7509130B2 (en) Method for locking and releasing a camera in a portable terminal
CN108269334A (en) Method for unlocking, terminal device and smart lock
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN106778225A (en) The method and apparatus for processing password
CN106372517A (en) File encryption method, file decryption method, file encryption device and equipment
CN109246110A (en) data sharing method and device
CN104768148A (en) Message encryption method and device
CN108900553B (en) Communication method, device and computer readable storage medium
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN106127062A (en) unlocking method and device
CN106161008B (en) A kind of terminal encryption method, terminal encryption device and terminal
CN106789070A (en) The decryption method of data, device and terminal
CN105681365B (en) Method and apparatus for file transmission
CN105120452B (en) Transmit the method, apparatus and system of information
CN106534083B (en) Brush machine Tool validation method and device
EP3249566B1 (en) Method and device for encrypting application
CN105046127A (en) Encryption and decryption method and apparatus
CN105591733A (en) Encryption and decryption methods and apparatuses
CN114885038B (en) Encryption protocol conversion method, result acquisition node and privacy calculation node

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee after: Qingdao Hisense Mobile Communication Technology Co.,Ltd.

Address before: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee before: HISENSE MOBILE COMMUNICATIONS TECHNOLOGY Co.,Ltd.