CN106161008B - A kind of terminal encryption method, terminal encryption device and terminal - Google Patents
A kind of terminal encryption method, terminal encryption device and terminal Download PDFInfo
- Publication number
- CN106161008B CN106161008B CN201610411861.8A CN201610411861A CN106161008B CN 106161008 B CN106161008 B CN 106161008B CN 201610411861 A CN201610411861 A CN 201610411861A CN 106161008 B CN106161008 B CN 106161008B
- Authority
- CN
- China
- Prior art keywords
- key
- terminal
- digital
- data encryption
- encryption key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
Abstract
The present invention provides a kind of terminal encryption method and apparatus, receives the CIPHERING REQUEST for being directed to the terminal;According to the CIPHERING REQUEST, data encryption key is set;Wherein, which includes at least a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated;The terminal is encrypted using the data encryption key.Due to dynamic digital key and the terminal system time in data encryption key provided in an embodiment of the present invention wherein one it is associated, after the system time of the terminal changes, the dynamic digital key also changes, accordingly, it also changes for the data encryption key to the terminal encryption, that is, is directed to same primary encryption, user needs the system time according to the terminal, it inputs different numbers to be decrypted, improves the safety of terminal encryption password.
Description
Technical field
The present invention relates to mobile communication technology fields, and in particular to a kind of mobile terminal encryption method, device and terminal.
Background technique
With the continuous development of mobile terminal technology, the mobile terminals such as smart phone, tablet computer, intelligent wearable device exist
The role taken in daily life is more and more important.At the same time, the safety of corresponding mobile terminal and user
Privacy concern also have been to be concerned by more and more people.
Currently, most of mobile terminals all support encryption function, it mainly include the encryption function for mobile terminal screen,
Such as numerical ciphers screen locking, nine grids screen locking, and the figure for the encryption function of file in mobile terminal, such as mobile terminal
Volume encryption, address list encryption, SMS encryption etc..However, current mobile terminal Crypted password is usually one be set by the user
The nine grids pattern of string stationary digital or one group of permanent order carries out mobile terminal by the way of such fixed secret key
Encryption, fixed secret key are easy to be known by other people, for example other people obtain set by user nine by the sliding trace on mobile phone screen
The fixation secret key etc. to mobile terminal is plagiarized when palace lattice secret key or user's input numerical ciphers, and then is lost mobile terminal and added
Close original idea reduces the safety of private data in mobile terminal.
Summary of the invention
The embodiment of the present invention provides a kind of terminal encryption method, apparatus and terminal, it is intended to solve terminal encryption secret key and be easy
The problem of leakage, improves the safety of private data and the user experience of terminal in terminal.
On the one hand, the present invention provides a kind of mobile terminal encryption method, comprising:
Receive the CIPHERING REQUEST for being directed to the terminal;
According to the CIPHERING REQUEST, data encryption key is set, wherein the data encryption key includes at least one and moves
State digital cipher, the dynamic digital key and the terminal system time wherein one it is associated;
The terminal is encrypted using the data encryption key.
Preferably, described according to the CIPHERING REQUEST, data encryption key is set, comprising:
According to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital key;
The dynamic number is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm
Word key;
Receive the static number key in the data encryption key;
The data encryption key is generated according to the dynamic digital key and the static number key.
Preferably, described according to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital
Key, comprising:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the end
The wherein one-bit digital of end system time is identical;
If they are the same, by the data encryption key of the digital corresponding position of the data encryption key of user's input, setting
For with the wherein associated dynamic digital key of the terminal system time.
Further, it is described if they are the same, by user input the data encryption key digital corresponding position number
Encryption key is set as the wherein associated dynamic digital key with the terminal system time, comprising:
If they are the same, it asks the user whether to want the number of the digital corresponding position of the data encryption key of user's input
Encryption key is set as the wherein associated dynamic digital key with the terminal system time;
It is if user's selection is, the digital encryption of the digital corresponding position of the data encryption key of user's input is close
Key is set as the wherein associated dynamic digital key with the terminal system time.
Preferably, described to be generated according to the wherein one-bit digital and preset digital prediction algorithm of the terminal system time
The dynamic digital key, comprising:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
Preferably, after the terminal being encrypted using the data encryption key, further includes:
The digital decrypted key for receiving user's input judges whether are the digital decrypted key and the data encryption key
Unanimously;
If the digital decrypted key is consistent with the data encryption key, decryption processing is executed to terminal.
On the other hand, the present invention also provides a kind of terminal encryption devices, comprising:
Receiving module, for receiving the CIPHERING REQUEST for being directed to the terminal;
Setup module, for data encryption key being arranged, wherein the data encryption key according to the CIPHERING REQUEST
Including at least a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated;
Encrypting module, for the terminal to be encrypted using the data encryption key.
Preferably, the setup module includes selecting unit, dynamic key production unit, receiving unit and generation unit;
The selecting unit is used for according to the CIPHERING REQUEST, select at least one of the data encryption key for dynamically
Digital cipher;
The dynamic key production unit is used for wherein one-bit digital and preset number according to the terminal system time
Word prediction algorithm generates the dynamic digital key;
The receiving unit is used to receive the static number key in the data encryption key;
The generation unit, which is used to generate the number according to the dynamic digital key and the static number key, to be added
Key.
Preferably, the selecting unit is used for:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the end
The wherein one-bit digital of end system time is identical;
If they are the same, by the data encryption key of the digital corresponding position of the data encryption key of user's input, setting
For with the wherein associated dynamic digital key of the terminal system time.
Preferably, the dynamic key production unit is used for:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
Preferably, the terminal encryption device further include:
Judgment module judges the digital decrypted key and the number for receiving the digital decrypted key of user's input
Whether word encryption key is consistent;
Deciphering module executes decryption to terminal if consistent with the data encryption key for the digital decrypted key
Processing.
In another aspect, the present invention also provides a kind of terminals, which is characterized in that the terminal includes above-mentioned terminal encryption dress
It sets.
Terminal encryption method provided in an embodiment of the present invention, when receiving the CIPHERING REQUEST for the terminal;According to this
Data encryption key is arranged in CIPHERING REQUEST;Wherein, which includes at least a dynamic digital key, the dynamic
Digital cipher and the terminal system time wherein one it is associated;The terminal is carried out at encryption using the data encryption key
Reason.Due to wherein one of dynamic digital key and the terminal system time in data encryption key provided in an embodiment of the present invention
Position is associated, and after the system time of the terminal changes, which also changes, correspondingly, for giving
The data encryption key of the terminal encryption also changes, that is, is directed to same primary encryption, and user needs the system according to the terminal
Time inputs different numbers and is decrypted, improves the safety of terminal encryption password.Simultaneously as only user oneself
Just know the dynamic digital key and the terminal system time who is associated, therefore work as even if having been revealed when some
Preceding password, when other people are decrypted time afterwards using the password, since the variation of the terminal system time causes to move
The change of state digital cipher, thus can not successful decryption, improve the safety of terminal.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Figure 1A is a kind of terminal encryption method flow diagram provided in an embodiment of the present invention;
Figure 1B is another terminal encryption method flow diagram provided in an embodiment of the present invention;
Fig. 2A~Fig. 2 E is a kind of schematic diagram of data encryption key setting up procedure provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram that data encryption key is arranged according to CIPHERING REQUEST provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal encryption apparatus structure schematic diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication
The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware
Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.It is this to set
Standby may include: honeycomb or other communication equipments, show with single line display or multi-line display or without multi-line
Show the honeycomb or other communication equipments of device;PCS (Personal Communications Service, PCS Personal Communications System),
It can be with combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is a
Personal digital assistant), may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad,
Calendar and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or the palm
Laptop computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or
Other equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (boat
Empty, sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in
The operation of any other of the earth and/or space position." terminal " used herein above, " terminal device " can also be communication eventually
End, access terminals, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, it is mobile mutual
Networked devices) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
Before carrying out detailed explanation to the embodiment of the present invention, first the application scenarios of the embodiment of the present invention are given
It introduces.Method provided in an embodiment of the present invention is applied to terminal, which can be smart phone, tablet computer, computer etc..
Exemplary, method provided in an embodiment of the present invention is applied to terminal, and the terminal is configured with the display list for showing the system time
Member and the encryption unit for being encrypted to the terminal.
Figure 1A is a kind of terminal encryption method flow diagram provided in an embodiment of the present invention, the terminal encryption of the embodiment of the present invention
The executing subject of method is terminal, referring to Figure 1A, this method comprises:
Step S110: the CIPHERING REQUEST for being directed to the terminal is received.
Terminal needs to encrypt in many instances, for example, the unlocking pin of startup password, screen, file and file plus
Password etc..Therefore, which can provide the password set interface with multiple word bits to user, to receive user's logarithm
The input and setting of word encryption key, it is exemplary, as shown in Figure 2 A.
Wherein, it can be triggered by user for the CIPHERING REQUEST of the terminal, user can be by specified operation triggering, this refers to
Fixed operation can be to click the operation of password setting options, the operation for clicking encryption button etc., and the embodiment of the present invention does not do this
It limits.Wherein, which is used to trigger the CIPHERING REQUEST for the terminal, which can be icon, button, control
Part etc., it is not limited in the embodiment of the present invention.
In practical application, which can show password set interface, and receives to be directed to based on the password set interface and be somebody's turn to do
The CIPHERING REQUEST of terminal.
Step S120: according to the CIPHERING REQUEST, data encryption key is set;Wherein, which includes at least
One dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated.
Specifically, refering to what is shown in Fig. 3, the implementation procedure of step S120 includes step S121~step S124.Fig. 2A~figure
2E is a kind of schematic diagram of data encryption key setting up procedure provided in an embodiment of the present invention, below in conjunction with Fig. 2A~Fig. 2 E,
The implementation procedure of step S120 is described in detail.
Step S121: according to the CIPHERING REQUEST, selecting at least one of data encryption key is dynamic digital key.It receives
To after CIPHERING REQUEST, which, which provides, has the password set interface of multiple word bits to user, to receive user to digital encryption
The input and setting of key, that is, receive user instructions;Then extremely according to the user instruction selection data encryption key received
Few one is dynamic digital key.
Wherein, according to the CIPHERING REQUEST, an at least mode for dynamic digital key for data encryption key is selected, is wrapped
Include the following two kinds mode:
Mode one: with reference to shown in Fig. 2A, it is assumed that there are four word bit, i.e. password is Password Input frame (password set interface) tool
Four.Can choose data encryption key wherein at least one word bit according to user instructions is dynamic digital key, such as is selected
Third position is selected.With reference to Fig. 2A, user has selected clock icon corresponding with third password position, i.e., expression user has selected the
Three password positions are as dynamic digital key.
Mode two: first according to the CIPHERING REQUEST, the number of the data encryption key of user's input is received.And then it obtains and is somebody's turn to do
The system time of terminal, judge user input data encryption key number whether the wherein one digit number with the terminal system time
Word is identical.If the number of the data encryption key of user's input is identical as the wherein one-bit digital of terminal system time, by user
The data encryption key of the digital corresponding position of the data encryption key of input is set as wherein one with the terminal system time
Associated dynamic digital key.
Exemplary with reference to aforesaid way two, when user is in the second word bit input number 2 of Password Input frame, and terminal is worked as
Preceding system time is 16:20, then the minute of the number 2 inputted and terminal present system time, previous bit value 2 was consistent, then may be used
To set dynamic digital key for the second of the data encryption key, i.e. the second word bit of Password Input frame is dynamic digital
Key.
Certainly, when the number of the data encryption key of user's input is identical as the wherein one-bit digital of terminal system time
When, may not be directly by user input data encryption key digital corresponding position data encryption key be set as with
The wherein associated dynamic digital key of terminal system time, but first inquiry user will use further according to user instruction
The data encryption key of the digital corresponding position of the data encryption key of family input is set as wherein one with the terminal system time
The associated dynamic digital key in position.That is: if the number of the data encryption key of user's input and terminal system time are wherein
One-bit digital is identical, asks the user whether to want that the digital encryption of the digital corresponding position for the data encryption key for inputting user is close
Key is set as the wherein associated dynamic digital key with the system time of terminal;If user's selection is, by user
The data encryption key of the digital corresponding position of the data encryption key of input is set as wherein one with the system time of terminal
The associated dynamic digital key in position.
For example, when user is in a certain word bit input number 2 of Password Input frame, and present terminal system time is 16:20,
The number then inputted is consistent with minute previous bit value, then can ask the user whether to want to set dynamic digital for the word bit
Key, if being switched to dynamic digital key set interface then to select corresponding dynamic digital key.
Step S122: dynamic number is generated according to the wherein one-bit digital of terminal system time and preset digital prediction algorithm
Word key.Terminal selected according to user instructions at least one of data encryption key for dynamic digital key after, then terminal
It determines that who digital correlation of the dynamic digital password and the terminal system time join according to user instructions, and then determines a kind of
Preset digital prediction algorithm is as the incidence relation between the dynamic digital password and the bit digital of the terminal system time.
It is exemplary, determine the process of who digital correlation connection of the dynamic digital password and the terminal system time such as
Under: assuming that present terminal system time be 16 when, 20 points.Therefore, in the present system time information of the terminal, there is numerical value
Temporal information 2 groups of temporal informations such as (h), point (m) sometimes, (h), point (m) are selected for user when can provide.It should be noted that
, above-mentioned every group of temporal information at least all comprising double figures value (such as minute include 2 and 0 double figures value, hour include 1 and 6
Double figures value), so can also by when (h), point (m) continue to segment, such as will by when (h) be divided into h1, h2, respectively correspond 16
When in 1,6;Point (m) is divided into m1, m2, respectively corresponds 2,0 in 20 points.Please refer to Fig. 2 B, it is shown that h1, h2, m1, m2 are supplied
User's selection, terminal selects the m1 of terminal system time, the i.e. tens of minute according to user instructions, it is determined that the dynamic number
Word password is associated with the tens of the minute of the terminal system time.
For another example, it is assumed that present terminal system time be 16 when, 20 points.Therefore, believe in the present system time of the terminal
In breath, 2 groups of temporal informations, every group of temporal information such as (h), point (m) all include double figures value to the temporal information with numerical value sometimes
(such as minute includes 2 and 0 double figures value, and hour includes 1 and 6 double figures values), so can also by when (h), point (m) continue it is thin
Point, for example, by when (h) be divided into h1, h2, when respectively corresponding 16 in 1,6;Point (m) is divided into m1, m2, is respectively corresponded in 20 points
2,0.It is exemplary, it is assumed that the second-order digit of the digital encryption secret key of user's input is 2, then terminal determines number 2 and terminal
The m1 bit digital of present system time is identical, then present system time in the second-order digit of the digital encryption secret key and terminal
M1 bit digital is associated.
It is exemplary, determine the preset digital prediction algorithm of one kind as the dynamic digital password and the terminal system time
Incidence relation between the bit digital can pass through following two implementation:
Implementation one: after determining the dynamic digital password and who digital correlation connection of the terminal system time, then
There is provided at least one preset digital prediction algorithm for selection by the user.Preset digital prediction algorithm is simple function, should
Function includes simple addition, subtraction, multiplication, and simple addition, subtraction, multiplication can reduce the difficulty in computation of user, can be with
User is allowed to be quickly obtained the dynamic digital cryptographic keys according to the present system time of terminal, it is subsequent to facilitate user to carry out
Decryption oprerations.It is exemplary, such as Fig. 2 C so, with additive and for subtraction, can provide simple function i-1, i, i+1, i+2 to
User's selection, the wherein one-bit digital in terminal system temporal information that wherein i has been selected for user, is only to lift herein certainly
Example explanation, does not represent the preset digital prediction algorithm of the embodiment of the present invention and is confined to this.With reference to shown in Fig. 2 C, user is selected
Function i+1.
Implementation two: after determining the dynamic digital password and who digital correlation connection of the terminal system time, directly
It connects using the bit digital of terminal system time as the dynamic digital password, i.e. the dynamic digital password and terminal system time
Incidence relation between the bit digital is relation of equality.
For example, present terminal system time be 16 when, 20 points.With reference to Fig. 2 B, it is shown that h1, h2, m1, m2 are selected for user
Select, terminal selects the m1 of terminal system time according to user instructions, i.e., the tens of minute as with the data encryption key
Third position key.At this point, user specifies m1 directly as the dynamic digital key of the data encryption key.
Further, during determining digital decrypted key, according to wherein one and the number of terminal system time
The calculated result (dynamic digital key) that prediction algorithm obtains may not be a position, can only take to calculated result at this time a
Position.That is: operation result is generated according to the wherein one-bit digital of terminal system time and preset digital prediction algorithm, then with fortune
The numerical value of result position is calculated as the dynamic digital key.It is exemplary, if the digital decrypted key prestored be 9,8, m2+1,6,
M2 is the latter bit value 9 of minute numerical value 49, and the corresponding function of digital prediction algorithm is m2+1, then the calculated result of function is
10, password of a position 0 of calculated result as the word bit is only taken at this time, i.e. current password is 9,8,0,6.
Step S123: terminal receives the static number key in data encryption key.The static number key is number.
For each word bit of Password Input frame, user may be static number key in word bit input, can also
Can select dynamic digital key.It, can be in general, after whole word bits of Password Input frame are all inputted or selected by user
Terminal issues determine instruction, such as clicks " determination " key to complete the determination of password setting.Terminal is receiving determine instruction
Afterwards, the digital encryption for just receiving the static number key in the data encryption key of each word bit user input or user setting is close
Dynamic digital key in key.
Therefore, terminal both can first receive the static number key in data encryption key, can also first receive number and add
Dynamic digital key in key, can also be while receiving, i.e. step S122 and step S123 can be interchanged or side by side.
Step S124: terminal generates data encryption key according to the dynamic digital key and the static number key.Such as
User setting password (i.e. data encryption key) 9,8, m1+1,6, with reference to shown in Fig. 2 D and Fig. 2 E, wherein 9,8,6 three are quiet
State digital cipher, if it is exactly m1 that user, which has selected above-mentioned m1 and function i+1, i, dynamic digital key is m1+1.After
Input password decryption when, m1 by become input password when minute numerical value previous bit value.Assuming that user 49 divides at 21
Password decryption is inputted, then the previous bit value 4 that m1 is 49 at this time, the corresponding code characters of the word bit are 4+1=5, i.e. user exists
Need to be only in word bit input 5 correct matched when input password decryption, i.e. four word bits are respectively 9,8,5,6 to be only
Match.
Step S130: terminal is encrypted terminal using the data encryption key.
Terminal is according to each word bit user static number key inputted or the dynamic digital key and word bit of user's selection
Sequence determines data encryption key and stores.Terminal receives static number key or the user selection of each word bit user input
The dynamic digital that the static number key inputted after dynamic digital key according to user corresponding to each word bit or user select
Key forms whole data encryption key.
Figure 1B is another terminal encryption method flow diagram provided in an embodiment of the present invention.In the present embodiment, including step
Rapid S110~step S150, step S110~step S130 are consistent with the description of above-described embodiment.The difference is that in step
After S130, further comprise the steps of:
Step S140: terminal receives the digital decrypted key of user's input, judges the digital decrypted key and digital encryption
Whether key is consistent;Wherein, which includes at least a dynamic digital key, the dynamic digital key and terminal
System time wherein one it is associated.
Terminal can provide the Password Input frame with multiple word bits, for user inputs character namely password.User is defeated
After complete, when detecting the determine instruction of user, the character of multiple word bits of user's input is received.
It is exemplary, it is assumed that there are four word bits for Password Input frame tool, i.e. password is four.User can be each in four word bits
Inputting a number, totally four numbers are as digital decrypted key, such as the digital decrypted key of user's input is 9,8,7,6.Eventually
After end receives the digital decrypted key of user's input, judge whether digital decrypted key is consistent with data encryption key.
Terminal determines that the process of Contemporary Digital encryption key specifically can be with reference to the step in above-mentioned terminal encryption method
S122.I.e. according to wherein one (such as m1 of the user's selection among the above) number of terminal system time and preset digital budget
Algorithm determines current dynamic digital key;Determine that Contemporary Digital encryption is close further according to static number key and dynamic digital key
Key.
For example, if present system time 49 divides when being 21, that is, get present system time information when being 21,49 points.
If the data encryption key prestored is 9,8, m1+1,6, Contemporary Digital encryption key is 9,8,5,6.
During determining digital decrypted key, obtained according to wherein one and the digital prediction algorithm of terminal system time
Calculated result (dynamic digital key) may be it is double-digit, position can be only taken to calculated result at this time.That is: according to
The wherein one-bit digital of terminal system time and preset digital prediction algorithm generate operation result, then with operation result position
Numerical value as the dynamic digital key.Such as if the digital decrypted key prestored is 9,8, m2+1,6, m2 be minute numerical value
49 latter bit value 9, the corresponding function of digital prediction algorithm are m2+1, then the calculated result of function is 10, only take meter at this time
Password of a position 0 of result as the word bit is calculated, i.e. current password is 9,8,0,6.
After terminal has determined data encryption key (current password), judge whether are digital decrypted key and data encryption key
Unanimously, that is, step S150 is executed.
Step S150: if the digital decrypted key is consistent with the data encryption key, decryption processing is executed to terminal.
Specifically, if it is determined that user input digital decrypted key and data encryption key (current password) unanimously,
The digital decrypted key for then illustrating user's input is that correctly, the terminal is decrypted at this time.If it is determined that arriving user
At least one in the digital decrypted key of input is inconsistent with data encryption key, then password authentification fails, not to the terminal
It is decrypted.
It is exemplary, user setting password (i.e. data encryption key) 9, m2+1,8,6, wherein 9,8,6 three are static number
Word key, if it is exactly m2 that user, which has selected above-mentioned m2 and function i+1, i, dynamic digital key is m2+1.Assuming that user
At 21,49 divide input password decryption, then the latter bit value 9 that m2 is 49 at this time, the corresponding code characters of the word bit are 9+1=
10, i.e. user needs to be only in word bit input 0 in input password decryption correct matched, i.e., at this time if what user inputted
Decruption key is 9,0,8,6, then is consistent with the data encryption key 9, m2+1,8,6, then executes at decryption to the terminal
Reason.For another example, 50 timesharing when the system time of terminal becomes 21, if the decruption key or 9,0,8,6 of user input,
Be with the data encryption key 9, m2+1,8,6 then it is inconsistent, then decryption processing is not executed to the terminal, at this point, if user
The decruption key of input is 9,1,8,6, then is consistent with the data encryption key 9, m2+1,8,6, then can hold to the terminal
Row decryption processing.
Due in data encryption key provided in an embodiment of the present invention dynamic digital key and terminal system time
Wherein one is associated, and after the system time of the terminal changes, which also changes, correspondingly,
It also changes for the data encryption key to the terminal encryption, that is, is directed to same primary encryption, user needs according to the terminal
System time, input different numbers and be decrypted, improve the safety of terminal encryption password.Simultaneously as only using
Family oneself just know the dynamic digital key and the terminal system time who is associated, therefore even if let out when some
Current password is revealed, when other people are decrypted time afterwards using the password, due to the variation of the terminal system time
Lead to the change of dynamic digital key, thus can not successful decryption, improve the safety of terminal.
Above-mentioned terminal encryption method is corresponded to below, describes a kind of corresponding terminal encryption device.Since the device has
The realization of some functions and above-mentioned terminal encryption method is consistent, therefore is only made a brief description below, and more embodiments can
To be obtained in conjunction with above-mentioned terminal encryption method.
Fig. 4 is the terminal encryption apparatus module figure of one embodiment.
A kind of terminal encryption device, comprising: receiving module 101, setup module 102 and encrypting module 103.
Receiving module 101 is used to receive the CIPHERING REQUEST for the terminal.
Setup module 102 is used to that data encryption key to be arranged according to the CIPHERING REQUEST;Wherein, the data encryption key is extremely
Less include a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated.
Encrypting module 103 is used to that the terminal to be encrypted using the data encryption key.
Further, setup module 102 includes:
Selecting unit, for according to CIPHERING REQUEST, selecting at least one of data encryption key to be dynamic digital key.
Dynamic key production unit, for being calculated according to the wherein one-bit digital and preset digital budget of terminal system time
Method generates dynamic digital key.
Receiving unit, for receiving the static number key in data encryption key.
Generation unit, for generating data encryption key according to dynamic digital key and static number key.
Further, selecting unit is used to receive the number of the data encryption key of user's input according to CIPHERING REQUEST;It obtains
Take the terminal system time, judge user input data encryption key number whether the wherein one digit number with the terminal system time
Word is identical;If they are the same, it sets the data encryption key of the digital corresponding position of the data encryption key of user's input to and end
The wherein associated dynamic digital key of end system time.
For example, when user is in the second word bit input number 2 of Password Input frame, and terminal present system time is 16:20,
The minute of the number 2 and terminal present system time that are then inputted, previous bit value 2 was consistent, then can be by the data encryption key
Second be set as dynamic digital key, i.e., the second word bit of Password Input frame is dynamic digital key.
Certainly, when the number of the data encryption key of user's input is identical as the wherein one-bit digital of terminal system time
When, may not be directly by user input data encryption key digital corresponding position data encryption key be set as with
The wherein associated dynamic digital key of terminal system time, but first inquiry user will use further according to user instruction
The data encryption key of the digital corresponding position of the data encryption key of family input is set as wherein one with the terminal system time
The associated dynamic digital key in position.
Further, dynamic key production unit is used for:
Operation result is generated according to the wherein one-bit digital of terminal system time and preset digital prediction algorithm;
Using the numerical value of operation result position as dynamic digital key.
Above-mentioned terminal encryption device further include: judgment module 104 and deciphering module 105.
Judgment module 104 is used to receive the digital decrypted key of user's input, judges digital decrypted key and digital encryption
Whether key is consistent;Wherein, data encryption key includes at least a dynamic digital key, dynamic digital key and terminal system
Time wherein one it is associated.
If deciphering module 105 is consistent with data encryption key for digital decrypted key, decryption processing is executed to terminal.
Terminal encryption device provided in an embodiment of the present invention, receiving module 101 receive the CIPHERING REQUEST for being directed to the terminal;If
Module 102 is set according to the CIPHERING REQUEST, data encryption key is set;Wherein, which includes at least a dynamic
Digital cipher, the dynamic digital key and the terminal system time wherein one it is associated;And then encrypting module 103 is used and is somebody's turn to do
The terminal is encrypted in data encryption key.Due to the dynamic number in data encryption key provided in an embodiment of the present invention
Word key and the terminal system time wherein one it is associated, after the system time of the terminal changes, the dynamic number
Word key also changes, correspondingly, the data encryption key for the terminal encryption also changes, i.e., for primary
Encryption, user need the system time according to the terminal, input different numbers and be decrypted, improve terminal encryption password
Safety.Simultaneously as only user oneself just know the dynamic digital key and the terminal system time who is related
Connection, therefore even if having revealed current password when some, when other people are decrypted time afterwards using the password, by
Lead to the change of dynamic digital key in the variation of the terminal system time, thus can not successful decryption, improve the peace of terminal
Quan Xing.
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.For example, terminal 400 can be mobile electricity
Words, computer, TV or tablet computer etc..
Referring to Fig. 4, terminal 400 may include following one or more components: processing component 402, memory 404, power supply
Component 406, multimedia component 408, audio component 410, the interface 412 of input/output (I/O), sensor module 414, and
Communication component 416.
The integrated operation of the usual controlling terminal 400 of processing component 402, such as with display, telephone call, data communication, phase
Machine operation and record operate associated operation.Processing component 402 may include that one or more processors 420 refer to execute
It enables, to perform all or part of the steps of the methods described above.In addition, processing component 402 may include one or more modules, just
Interaction between processing component 402 and other assemblies.For example, processing component 402 may include multi-media module, it is more to facilitate
Interaction between media component 408 and processing component 402.
Memory 404 is configured as storing various types of data to support the operation in terminal 400.These data are shown
Example includes the instruction of any application or method for operating in terminal 400, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 404 can be by any kind of volatibility or non-volatile memory device or their group
It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile
Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 406 provides power supply for the various assemblies of terminal 400.Power supply module 406 may include power management system
System, one or more power supplys and other with for terminal 400 generate, manage, and distribute the associated component of power supply.
Multimedia component 408 includes the screen of one output interface of offer between the terminal 400 and user.One
In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action
Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers
Body component 408 includes a front camera and/or rear camera.When terminal 400 is in operation mode, such as screening-mode
Or when video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera
It can be a fixed optical lens system with rear camera or there are focusing and optical zoom capabilities.
Audio component 410 is configured as output and/or input audio signal.For example, audio component 410 includes a Mike
Wind (MIC), when terminal 400 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched
It is set to reception external audio signal.The received audio signal can be further stored in memory 404 or via communication set
Part 416 is sent.In some embodiments, audio component 410 further includes a loudspeaker, is used for output audio signal.
I/O interface 412 provides interface between processing component 402 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 414 includes one or more sensors, and the state for providing various aspects for terminal 400 is commented
Estimate.For example, sensor module 414 can detecte the state that opens/closes of terminal 400, and the relative positioning of component, for example, it is described
Component is the display and keypad of terminal 400, and sensor module 414 can also detect 400 1 components of terminal 400 or terminal
Position change, the existence or non-existence that user contacts with terminal 400,400 orientation of terminal or acceleration/deceleration and terminal 400
Temperature change.Sensor module 414 may include proximity sensor, be configured to detect without any physical contact
Presence of nearby objects.Sensor module 414 can also include optical sensor, such as CMOS or ccd image sensor, at
As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 416 is configured to facilitate the communication of wired or wireless way between terminal 400 and other equipment.Terminal
400 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation
In example, communication component 416 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 416 further includes near-field communication (NFC) module, to promote short range communication.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 400 can be believed by one or more application specific integrated circuit (ASIC), number
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 404 of instruction, above-metioned instruction can be executed by the processor 420 of terminal 400 to complete the above method.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device executes, so that mobile terminal is able to carry out the above method.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
Although it should be understood that Figure 1A, 1B, 3 flow chart in each step successively shown according to the instruction of arrow,
But these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these
There is no stringent sequences to limit for the execution of step, can execute in the other order.Moreover, Figure 1A, 1B, in 3 at least
A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps
Quarter executes completion, but can execute at different times, and execution sequence, which is also not necessarily, successively to be carried out, but can be with it
The sub-step or at least part in stage of his step or other steps execute in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (8)
1. a kind of terminal encryption method characterized by comprising
Receive the CIPHERING REQUEST for being directed to the terminal;
According to the CIPHERING REQUEST, data encryption key is set, wherein the data encryption key includes at least a dynamic number
Word key, the dynamic digital key and the terminal system time wherein one it is associated;
The terminal is encrypted using the data encryption key;
Wherein, described according to the CIPHERING REQUEST, data encryption key is set, comprising:
According to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital key;
It is close that the dynamic digital is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm
Key;
Receive the static number key in the data encryption key;
The data encryption key is generated according to the dynamic digital key and the static number key;
Wherein, described according to the CIPHERING REQUEST, selecting at least one of the data encryption key is dynamic digital key, packet
It includes:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the terminal system
The wherein one-bit digital of system time is identical;
If they are the same, it sets the data encryption key of the digital corresponding position of the data encryption key of user's input to and institute
State the wherein associated dynamic digital key of terminal system time.
2. encryption method according to claim 1, which is characterized in that it is described if they are the same, by user input the number
The data encryption key of the digital corresponding position of encryption key be set as with the terminal system time wherein one it is associated
Dynamic digital key, comprising:
If they are the same, it asks the user whether to want the digital encryption of the digital corresponding position of the data encryption key of user's input
Key is set as the wherein associated dynamic digital key with the terminal system time;
If user's selection is, the data encryption key of the digital corresponding position of the data encryption key of user's input is set
It is set to the wherein associated dynamic digital key with the terminal system time.
3. encryption method according to claim 1 or 2, which is characterized in that its according to the terminal system time
Middle one-bit digital and preset digital prediction algorithm generate the dynamic digital key, comprising:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
4. encryption method according to claim 1, which is characterized in that using the data encryption key to the terminal into
After row encryption, further includes:
The digital decrypted key for receiving user's input, judge the digital decrypted key and the data encryption key whether one
It causes;
If the digital decrypted key is consistent with the data encryption key, decryption processing is executed to terminal.
5. a kind of terminal encryption device characterized by comprising
Receiving module, for receiving the CIPHERING REQUEST for being directed to the terminal;
Setup module, for data encryption key being arranged, wherein the data encryption key is at least according to the CIPHERING REQUEST
Including a dynamic digital key, the dynamic digital key and the terminal system time wherein one it is associated;
Encrypting module, for the terminal to be encrypted using the data encryption key;
Wherein, the setup module includes selecting unit, dynamic key production unit, receiving unit and generation unit;
The selecting unit is used for according to the CIPHERING REQUEST, and selecting at least one of the data encryption key is dynamic digital
Key;
The dynamic key production unit is used for pre- according to the wherein one-bit digital of the terminal system time and preset number
It calculates algorithm and generates the dynamic digital key;
The receiving unit is used to receive the static number key in the data encryption key;
The generation unit is used to generate the digital encryption according to the dynamic digital key and the static number key close
Key;
Wherein, the selecting unit is used for:
According to the CIPHERING REQUEST, the number of the data encryption key of user's input is received;
Obtain the terminal system time, judge user input the data encryption key number whether with the terminal system
The wherein one-bit digital of system time is identical;
If they are the same, it sets the data encryption key of the digital corresponding position of the data encryption key of user's input to and institute
State the wherein associated dynamic digital key of terminal system time.
6. terminal encryption device according to claim 5, which is characterized in that the dynamic key production unit is used for:
Operation result is generated according to the wherein one-bit digital of the terminal system time and preset digital prediction algorithm;
Using the numerical value of the operation result position as the dynamic digital key.
7. terminal encryption device according to claim 5, which is characterized in that further include:
Judgment module judges that the digital decrypted key and the number add for receiving the digital decrypted key of user's input
Whether key is consistent;
Deciphering module executes decryption processing to terminal if consistent with the data encryption key for the digital decrypted key.
8. a kind of terminal, which is characterized in that the terminal includes such as the described in any item terminal encryption devices of claim 5~7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610411861.8A CN106161008B (en) | 2016-06-14 | 2016-06-14 | A kind of terminal encryption method, terminal encryption device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610411861.8A CN106161008B (en) | 2016-06-14 | 2016-06-14 | A kind of terminal encryption method, terminal encryption device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106161008A CN106161008A (en) | 2016-11-23 |
CN106161008B true CN106161008B (en) | 2019-05-07 |
Family
ID=57353184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610411861.8A Active CN106161008B (en) | 2016-06-14 | 2016-06-14 | A kind of terminal encryption method, terminal encryption device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106161008B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109462475B (en) * | 2018-11-15 | 2021-08-13 | 泰康保险集团股份有限公司 | Data encryption method, data decryption method and related devices |
CN112287369A (en) * | 2020-11-02 | 2021-01-29 | 珠海格力电器股份有限公司 | Decryption method, decryption device, computer equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297403A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Method and system for achieving dynamic password authentication |
CN104103107A (en) * | 2013-04-03 | 2014-10-15 | 陈麟华 | Time-varying password and time-varying password lock |
CN105095701A (en) * | 2014-05-06 | 2015-11-25 | 黄熙镜 | User authentication method and device and terminal equipment |
CN105337729A (en) * | 2015-11-19 | 2016-02-17 | 广东欧珀移动通信有限公司 | Encryption method and device of mobile terminal and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150382190A1 (en) * | 2014-06-25 | 2015-12-31 | Qualcomm Incorporated | Enhanced secure identity generation |
-
2016
- 2016-06-14 CN CN201610411861.8A patent/CN106161008B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297403A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Method and system for achieving dynamic password authentication |
CN104103107A (en) * | 2013-04-03 | 2014-10-15 | 陈麟华 | Time-varying password and time-varying password lock |
CN105095701A (en) * | 2014-05-06 | 2015-11-25 | 黄熙镜 | User authentication method and device and terminal equipment |
CN105337729A (en) * | 2015-11-19 | 2016-02-17 | 广东欧珀移动通信有限公司 | Encryption method and device of mobile terminal and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106161008A (en) | 2016-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104219058B (en) | Authentication, identification authorization method and device | |
CN104852911B (en) | Safe verification method, apparatus and system | |
EP3001637B1 (en) | Methods and devices for authorizing operation | |
CN103916233B (en) | A kind of information ciphering method and device | |
US11196553B2 (en) | Command transmission method and apparatus, electronic device | |
US7509130B2 (en) | Method for locking and releasing a camera in a portable terminal | |
CN108269334A (en) | Method for unlocking, terminal device and smart lock | |
CN104318177A (en) | Protection method and protection device for data of terminal equipment | |
CN106778225A (en) | The method and apparatus for processing password | |
CN106372517A (en) | File encryption method, file decryption method, file encryption device and equipment | |
CN109246110A (en) | data sharing method and device | |
CN104768148A (en) | Message encryption method and device | |
CN108900553B (en) | Communication method, device and computer readable storage medium | |
CN106060098B (en) | Processing method, processing unit and the processing system of identifying code | |
CN104219053A (en) | Information displaying method, information concealing method and information concealing device | |
CN106127062A (en) | unlocking method and device | |
CN106161008B (en) | A kind of terminal encryption method, terminal encryption device and terminal | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN105681365B (en) | Method and apparatus for file transmission | |
CN105120452B (en) | Transmit the method, apparatus and system of information | |
CN106534083B (en) | Brush machine Tool validation method and device | |
EP3249566B1 (en) | Method and device for encrypting application | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN105591733A (en) | Encryption and decryption methods and apparatuses | |
CN114885038B (en) | Encryption protocol conversion method, result acquisition node and privacy calculation node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11 Patentee after: Qingdao Hisense Mobile Communication Technology Co.,Ltd. Address before: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11 Patentee before: HISENSE MOBILE COMMUNICATIONS TECHNOLOGY Co.,Ltd. |