CN106656962A - Cryptograph decryption method and cryptograph decryption device - Google Patents

Cryptograph decryption method and cryptograph decryption device Download PDF

Info

Publication number
CN106656962A
CN106656962A CN201610873508.1A CN201610873508A CN106656962A CN 106656962 A CN106656962 A CN 106656962A CN 201610873508 A CN201610873508 A CN 201610873508A CN 106656962 A CN106656962 A CN 106656962A
Authority
CN
China
Prior art keywords
ciphertext
input
password
protection password
human body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610873508.1A
Other languages
Chinese (zh)
Inventor
谭智勇
钟峰
宋承根
王子龙
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Brilliant Hi Tech Development Co Ltd
Original Assignee
Beijing Brilliant Hi Tech Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Brilliant Hi Tech Development Co Ltd filed Critical Beijing Brilliant Hi Tech Development Co Ltd
Priority to CN201610873508.1A priority Critical patent/CN106656962A/en
Publication of CN106656962A publication Critical patent/CN106656962A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Abstract

The invention discloses a cryptograph decryption method and a cryptograph decryption device, wherein the cryptograph decryption method and the cryptograph decryption device relate to the field of Internet technology. The cryptograph decryption method and the cryptograph decryption device can prevent protection password cracking by other persons through a protection password input prompt box, thereby preventing encrypted file leakage. The cryptograph decryption method mainly comprises the steps of acquiring human body biological characteristic information which is input in cryptograph decryption; acquiring a decryption cryptograph user identity validity verification result on the input human body biological characteristic information; if the result proves valid identity through verification, displaying prompt information for the protection password required for displaying the input decrypted cryptograph; acquiring the protection password required for decrypting the cryptograph, and decrypting the cryptograph by means of the protection password. The cryptograph decryption method and the cryptograph decryption device are mainly used in scenes in performing decryption on encrypted files.

Description

The decryption method and device of ciphertext
Technical field
The present invention relates to Internet technical field, the decryption method and device of more particularly to a kind of ciphertext.
Background technology
With the development of Internet technology, people are gradually accustomed to the data needed for work or life electronically Preserve in a computer.In actual applications, people inquire about for convenience, usually some e-files are stored in into client sheet Ground.However, because client is easily attacked, so in order to avoid some important e-files (such as public private key pair) produce wind Danger, usually first by these e-files by protection password be encrypted, then ciphertext is sent to into server and is stored.When When needing to use the e-file, terminal can show protection password entry prompt frame, and then terminal can pass through the protection of input Password being decrypted to ciphertext, the e-file after being decrypted.
But, protection password is easily broken, and for example other users can be in password entry prompt frame be protected by not The disconnected mode for attempting different protection passwords carries out protection password cracking, consequently, it is possible to exist cracking successful risk, and then causes Important e-file is revealed, and to user heavy losses are brought.
The content of the invention
In view of this, the present invention provides a kind of decryption method and device of ciphertext, is prevented from other people by protecting password Input prompting frame cracks protection password so that the file of encryption is revealed.
The purpose of the present invention employs the following technical solutions to realize:
In a first aspect, the invention provides a kind of decryption method of ciphertext, methods described includes:
The human body biological characteristic information that acquisition is input into when being decrypted to ciphertext;
Obtain the result that the human body biological characteristic information to the input is decrypted ciphertext user identity legitimate verification;
If the result is that authentication is legal, protection password needed for output display input decrypting ciphertext
Information;
The protection password needed for decrypting ciphertext is obtained, and the ciphertext is decrypted using the protection password.
With reference in a first aspect, in the first possible implementation of first aspect, methods described also includes:
Duration after authentication is legal is reached after preset time threshold, loads and show input human body biological characteristics letter The information of breath.
With reference in a first aspect, in second possible implementation of first aspect, methods described also includes:
Default is reached in the corresponding user of the human body biological characteristic information by the file number that decryption obtains plaintext During number threshold value, the information of input human body biological characteristic information is loaded and shown.
With reference to the second possible realization of first aspect or the first possible implementation of first aspect or first aspect Mode, in the third possible implementation of first aspect, the protection password obtained needed for decrypting ciphertext includes:
Receive the protection password needed for the decryption ciphertext directly inputted based on inputting interface;
Or the protection password according to needed for the ciphertext name acquiring of the ciphertext decrypts the ciphertext.
With reference to the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect In, the protection password according to needed for the ciphertext name acquiring of the ciphertext decrypts the ciphertext includes:
The ciphertext title of the ciphertext of receives input, searches and input from the ciphertext password mapping table for pre-building The corresponding protection password of ciphertext title, obtains the protection password needed for the decryption ciphertext;
Or output display includes the protection password list of different protection passwords and ciphertext title, will be from the protection password Protection password corresponding with ciphertext ciphertext title that is choosing in list is used as the protection password decrypted needed for the ciphertext.
With reference to the 4th kind of possible implementation of first aspect, in the 5th kind of possible implementation of first aspect In, protection password corresponding with the ciphertext title of input is being searched from the ciphertext password mapping table for pre-building, decrypted After protection password needed for the ciphertext, methods described also includes:
Protection password output needed for the decryption ciphertext for obtaining etc. is to be confirmed;
After receiving acknowledgment, the protection password for finding is defined as decrypting the protection password needed for the ciphertext.
With reference to the second possible realization of first aspect or the first possible implementation of first aspect or first aspect Mode, in the 6th kind of possible implementation of first aspect, after authentication is legal, methods described also includes:
The reset indication of receives input, the reset indication includes ciphertext title and reset password;
The corresponding protection password of the ciphertext title is searched from the ciphertext password mapping table for pre-building;
The corresponding ciphertext of the ciphertext title is decrypted using the protection password for finding, obtains corresponding plaintext;
The plaintext is encrypted using the reset password, obtains the corresponding ciphertext of the reset password.
With reference to the second possible realization of first aspect or the first possible implementation of first aspect or first aspect Mode, in the 7th kind of possible implementation of first aspect, human body biological characteristic information of the acquisition to the input Being decrypted the result of ciphertext user identity legitimate verification includes:
Ciphertext user identity legitimate verification is decrypted to the human body biological characteristic information of the input, and obtains checking Result;
Or the human body biological characteristic information of the input and User Identity number ID are being sent to into server Afterwards, the human body biological characteristic information to the input that the reception server sends is decrypted ciphertext user identity legitimate verification Result.
With reference to the 7th kind of possible implementation of first aspect, in the 8th kind of possible implementation of first aspect In, being decrypted ciphertext user identity legitimate verification to the human body biological characteristic information of the input includes:
The human body biological characteristic information of the input is compared with human body biological characteristic information registered in advance;
If both similarities are more than or equal to predetermined threshold value, it is determined that authentication is legal;
If both similarities are less than the predetermined threshold value, it is determined that authentication is illegal.
Second aspect, the invention provides a kind of decryption device of ciphertext, described device includes:
First acquisition unit, the human body biological characteristic information being input into during for obtaining and be decrypted to ciphertext;
Second acquisition unit, for obtaining the human body biological characteristics letter of the input obtained to the first acquisition unit Breath is decrypted the result of ciphertext user identity legitimate verification
First display unit, for when the result that the second acquisition unit is obtained is that authentication is legal, output to be aobvious Show the information of protection password needed for input decrypting ciphertext;
3rd acquiring unit, the protection password needed for for obtaining decrypting ciphertext;
Decryption unit, the protection password for being obtained using the second acquisition unit is solved to the ciphertext It is close.
With reference to second aspect, in the first possible implementation of second aspect, described device also includes:
Second display unit, reaches after preset time threshold for the duration after authentication is legal, loads and shows The information of input human body biological characteristic information.
With reference to second aspect, in second possible implementation of second aspect, described device also includes:
3rd display unit, for obtaining the text of plaintext by decryption in the corresponding user of the human body biological characteristic information When part number reaches predetermined number threshold value, the information of input human body biological characteristic information is loaded and shown.
With reference to the second possible realization of second aspect or the first possible implementation of second aspect or second aspect Mode, in the third possible implementation of second aspect, the 3rd acquiring unit includes:
First receiver module, the protection mouth needed for for receiving the decryption ciphertext directly inputted based on inputting interface Order;
First acquisition module, for the protection mouth needed for decrypting the ciphertext according to the ciphertext name acquiring of the ciphertext Order.
With reference to the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect In, first acquisition module includes:
Receiving submodule, for the ciphertext title of the ciphertext of receives input;
Submodule is searched, it is corresponding with the ciphertext title of input for searching from the ciphertext password mapping table for pre-building Protection password, obtains the protection password needed for the decryption ciphertext;
Display sub-module, for the protection password list that output display includes different protection passwords and ciphertext title;
First determination sub-module, for will choose in the protection password list shown from the display sub-module with The corresponding protection password of ciphertext title of the ciphertext is used as the protection password decrypted needed for the ciphertext.
With reference to the 4th kind of possible implementation of second aspect, in the 5th kind of possible implementation of second aspect In, first acquisition module also includes:
Output sub-module, for from the ciphertext password mapping table for pre-building search be input into ciphertext title it is corresponding Protection password, after obtaining the protection password needed for the decryption ciphertext, by the protection needed for the decryption ciphertext for obtaining Password output etc. is to be confirmed;
Second determination sub-module, for after receiving acknowledgment, the protection password for finding being defined as into decryption described close Protection password needed for text.
With reference to the second possible realization of second aspect or the first possible implementation of second aspect or second aspect Mode, in the 6th kind of possible implementation of second aspect, described device also includes:
Receiving unit, for after authentication is legal, the reset indication of receives input, the reset indication to include close Literary fame claims and reset password;
Searching unit, for searching the described close of the receiving unit reception from the ciphertext password mapping table for pre-building Literary fame claims corresponding protection password;
The decryption unit is additionally operable to solve the corresponding ciphertext of the ciphertext title using the protection password for finding It is close, obtain corresponding plaintext;
Ciphering unit, for being encrypted to the plaintext that the decryption unit is obtained using the reset password, is obtained Obtain the corresponding ciphertext of the reset password.
With reference to the second possible realization of second aspect or the first possible implementation of second aspect or second aspect Mode, in the 7th kind of possible implementation of second aspect, the second acquisition unit includes:
Authentication module, tests for being decrypted ciphertext user identity legitimacy to the human body biological characteristic information of the input Card;
Second acquisition module, for obtaining the result of the authentication module checking;
Second receiver module, for by the human body biological characteristic information of the input and User Identity number ID After being sent to server, the human body biological characteristic information to the input that the reception server sends is decrypted ciphertext user's body The result of part legitimate verification.
With reference to possible implementation in the 7th of second aspect the, in the 8th kind of possible implementation of second aspect In, the authentication module includes:
Submodule is compared, for the human body biological characteristic information of the input to be believed with human body biological characteristics registered in advance Breath is compared;
3rd determination sub-module, the comparison result for working as the comparison submodule is that both similarities are more than or wait When predetermined threshold value, determine that authentication is legal;When the comparison result of the comparison submodule is that both similarities are less than institute When stating predetermined threshold value, determine that authentication is illegal.
The decryption method and device of the ciphertext provided by above-mentioned technical proposal, the present invention, can solve to ciphertext When close, decrypting ciphertext user input human body biological characteristic information is first allowed to carry out identity legitimacy checking, after authentication is legal, The information of protection password needed for ability output display input decrypting ciphertext, rather than the prompting letter for directly displaying input protection password Breath.Due to human body biological characteristic information can unique mark user, so when other users log in active user account after, nothing Thus method cannot be introduced into being input into the page of protection password, so as to carry out protection password cracking, Jin Erneng by authentication Enough prevent from being revealed using the file of protection password encryption, it is to avoid user is damaged.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit is common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the decryption method of ciphertext provided in an embodiment of the present invention;
Fig. 2 shows a kind of flow chart of file decryption provided in an embodiment of the present invention;
Fig. 3 shows the flow chart of the decryption method of another kind of ciphertext provided in an embodiment of the present invention;
Fig. 4 shows a kind of schematic diagram of input protection password provided in an embodiment of the present invention;
Fig. 5 shows the schematic diagram of another kind of input protection password provided in an embodiment of the present invention;
Fig. 6 shows a kind of composition frame chart of the decryption device of ciphertext provided in an embodiment of the present invention;
Fig. 7 shows the composition frame chart of the decryption device of another kind of ciphertext provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
A kind of decryption method of ciphertext is embodiments provided, the method can apply to client-side, such as Fig. 1 institutes Show, the method mainly includes:
101st, the human body biological characteristic information being input into when being decrypted to ciphertext is obtained;
Wherein, human body biological characteristic information can unique mark user, and its type mainly include fingerprint, iris, face, Palmmprint, hand, vein or human ear etc..When user needs to be decrypted ciphertext, client can first load and show input people The information of body biological information, then carries out the input of correspondence human body biological characteristic information according to the information. When being input into the human body biological characteristic information, can directly input, it is also possible to be input into by image acquisition;When defeated by image acquisition It is fashionable, can pass through but be not limited to following method and realize that the method includes:
User is input into the image of user according to the information in corresponding input area, and gathers the figure by client Picture, feature extraction is carried out to the image, obtains human body biological characteristic information.For example, client can gather the fingerprint image of user Picture, is then analyzed to the fingerprint image, therefrom extracts fingerprint feature information.
102nd, obtain the human body biological characteristic information to the input and be decrypted ciphertext user identity legitimate verification As a result;
In actual applications, " ciphertext user identity legitimacy is decrypted to the human body biological characteristic information of the input Checking " can be implemented in client-side, it is also possible to be implemented in server.
Specifically, when " being decrypted ciphertext user identity legitimate verification to the human body biological characteristic information of the input " When being implemented in client-side, the specific implementation of step 102 can be:The human body biological characteristic information of the input is carried out Decrypting ciphertext user identity legitimate verification, and obtain the result of checking.
When " being decrypted ciphertext user identity legitimate verification to the human body biological characteristic information of the input " is implemented in During server side, the specific implementation of step 102 can be:First by the human body biological characteristic information of the input and user ID is sent to server, so as to server according to ID determining the checking of the human body biological characteristic information to the input Rule, and the human body biological characteristic information to the input carries out identity legitimacy checking, then client the reception server is sent out The human body biological characteristic information to the input sent is decrypted the result of ciphertext user identity legitimate verification.
Wherein, the concrete of ciphertext user identity legitimate verification is decrypted to the human body biological characteristic information of the input Implementation can be:The human body biological characteristic information of the input is compared with human body biological characteristic information registered in advance It is right;If both similarities are more than or equal to predetermined threshold value, it is determined that authentication is legal;If both similarities are less than pre- If threshold value, it is determined that authentication is illegal.Wherein, the opportunity of user's registration human body biological characteristic information can be in encrypting plaintext Before, it is also possible to be input into human body biological characteristic information together while the protection password needed for input encryption, it is also possible to adding Close plaintext is obtained after ciphertext.
It should be noted that when client carries out authentication using human body biological characteristic information registered in advance, institute It is local that the human body biological characteristic information registered in advance for using can be stored in client;Server side can also be stored in.If Human body biological characteristic information registered in advance is stored in into server side, then when need use human body biological characteristics registered in advance During information, client can obtain corresponding human body biological characteristic information registered in advance by sending ID to server.
Further, since client is vulnerable, so human body biological characteristic information registered in advance is stored in into client Side, it may occur that data tampering, the phenomenon such as steal, so by characteristics of human body's information Store registered in advance in server side, Its safety is ensure that, so that subsequent verification operations are normally carried out.Wherein, in order to be further ensured that human-body biological registered in advance The safety of characteristic information, when server side is stored, can be encrypted storage.
If the 103, the result is that authentication is legal, the prompting of protection password needed for output display input decrypting ciphertext Information;
After authentication is legal, client can determine that the user of input human body biological characteristic information is validated user, Have the right to be decrypted ciphertext, therefore the information of protection password needed for output display input decrypting ciphertext, so as to user According to the information input protection password decryption ciphertext.
In actual applications, the concrete manifestation form of the information is including but not limited to following several:(1) one is shown Input frame and the word for prompting input protection password (such as " protection password please be input into ");(2) show include it is digital and/or The editable region of character, for example, user clicks on successively 0,6,8, b, y, m, then client determine the protection password of user input For " 068bym ".(3) information can only include prompting input protection password word, treat user input " next step " or Person " it is determined that " after, into the interface of input protection password, for user by the interface input protection password.
Additionally, when the plaintext of user encryption is for multiple, and the protection password that isolog is not used it is different when, client shows The region of input ciphertext title can also be included in the information shown, so as to user be input into first with the region it is to be decrypted close Literary fame claims, then is input into corresponding protection password.Wherein, the concrete manifestation form for being input into the region of ciphertext title is included but is not limited to It is several below:(1) input frame and the word for prompting input ciphertext title are shown (such as " ciphertext title please be input into "); (2) showing can show the input control of drop-down menu after a click, wherein drop-down menu includes various ciphertext titles; (3) a ciphertext name list is shown, is chosen for user click.
You need to add is that, when client determines authentication is illegal after, can be illegal with output display authentication Information, to allow the user to know, it is not validated user, carries out subsequent decryption operation without right.
104th, the protection password needed for decrypting ciphertext is obtained, and the ciphertext is decrypted using the protection password.
Wherein, " using it is described protection password the ciphertext is decrypted " specific implementation can be:Client Then can locally be decrypted according to the key of the protection password generated Serial No., or client sends the key To server, so that server is decrypted to ciphertext.
Have as a example by multiple plaintexts, and the encipherment protection password difference that isolog is not used with current account encryption below, The flow process that implements of client decryption and server decryption is introduced respectively:
(1) idiographic flow that client is decrypted to ciphertext can be:When the input ciphertext title for receiving user or After the protection password of person's input, protection password is converted into into the key of Serial No., and by ID (Identity, identity mark Know number) and input ciphertext title be sent to server, so as to server according to ID and ciphertext title lookup it is corresponding Ciphertext, the ciphertext that then the reception server is returned is decrypted, so as in successful decryption finally according to key to the ciphertext for receiving When, obtain the corresponding plaintext of the ciphertext.
(2) idiographic flow that server is decrypted to ciphertext can be:When client receives the protection password of input Afterwards, first protection password can be converted into into the key of Serial No., then key, ciphertext title and ID is sent to into clothes Business device;Server is received after key, ciphertext title and ID, can search correspondence according to ciphertext title and ID Ciphertext, then the ciphertext is decrypted using protection password, and after successful decryption is obtained in plain text, by plain text feedback to visitor Family end.
Wherein, by taking fingerprint as an example, complete flow process can be as shown in Figure 2:
201st, client gathers the fingerprint image of user;
202nd, client takes the fingerprint characteristic information from fingerprint image.When the body by client executing fingerprint feature information During part verification operation, execution step 203;When the authentication operation of fingerprint feature information is performed by server, order is performed Step 204-206;
203rd, client carries out authentication to the fingerprint feature information for extracting, and to obtain the result, goes to step 207 Or 208;
204th, ID and fingerprint feature information are sent to server by client;
205th, server receives ID and the fingerprint feature information that client sends;
206th, server verified based on ID to the fingerprint feature information, and the result is fed back to into client, So that client obtains the result, step 207 or 208 are gone to;
If the 207, authentication is legal, client shows the information of input protection password, then execution step 209;
If the 208, authentication is illegal, client shows the information of authentication failure.
209th, the protection password and ciphertext title of client receives input;
210th, key of the client according to the protection password generated Serial No. of input.If server is solved to ciphertext It is close, then order execution step 211-215;If client is decrypted to ciphertext, order execution step 216-221;
211st, user end to server sends ID, ciphertext title and key;
212nd, server receives ID, ciphertext title and the key that client sends;
213rd, whois lookup ID and the corresponding ciphertext of ciphertext title;
214th, the key that server by utilizing is received is decrypted to the ciphertext, obtains corresponding plaintext.
215th, this is sent in plain text server client;
216th, user end to server sends ID and ciphertext title;
217th, server receives ID and the ciphertext title that client sends;
218th, whois lookup ID and the corresponding ciphertext of ciphertext title;
219th, the ciphertext is sent to client by server;
220th, the ciphertext that client the reception server sends;
221st, client is decrypted using key to ciphertext, is obtained in plain text.
You need to add is that, either client is decrypted to ciphertext, or server is decrypted to ciphertext, for The data that these are interacted can be encrypted by the interaction data between client and server by default AES Transmission, so as to ensure the safety of interaction data, and then ensures the safety of plaintext.
The decryption method of ciphertext provided in an embodiment of the present invention, can first allow decrypting ciphertext when being decrypted to ciphertext User input human body biological characteristic information carries out identity legitimacy checking, after authentication is legal, ability output display input solution The information of protection password needed for ciphertext, rather than the information for directly displaying input protection password.Due to human-body biological Characteristic information can unique mark user, so when other users log in active user account after, it is impossible to by authentication, Thus cannot be introduced into being input into the page of protection password, so as to protection password cracking cannot be carried out, and then be prevented from using protection The file of password encryption is revealed, it is to avoid user is damaged.
Further, in order to be further ensured that the safety for encrypting file, an alternative embodiment of the invention additionally provides one The decryption method of ciphertext is planted, as shown in figure 3, the method mainly includes:
301st, the human body biological characteristic information being input into when being decrypted to ciphertext is obtained;
Related introduction in the step refer to the associated description in step 101 corresponding to Fig. 1, and this step is repeated no more.
302nd, obtain the human body biological characteristic information to the input and be decrypted ciphertext user identity legitimate verification As a result;
Related introduction in the step refer to the associated description in step 102 corresponding to Fig. 1, and this step is repeated no more;
If the 303, the result is that authentication is legal, the prompting of protection password needed for output display input decrypting ciphertext Information;
Related introduction in the step refer to the associated description in step 103 corresponding to Fig. 1, and this step is repeated no more.
Further, after authentication is legal, a kind of conveniently replacement can also be provided the user and protects mouth The method of order:
The reset indication of client elder generation receives input, the reset indication includes ciphertext title and reset password;Then from The corresponding protection password of the ciphertext title is searched in the ciphertext password mapping table for pre-building;The protection mouth that recycling finds Order is decrypted to the corresponding ciphertext of the ciphertext title, obtains corresponding plaintext;Finally using the reset password to described It is encrypted in plain text, obtains the corresponding ciphertext of the reset password.
Because the method for the reset password of the present embodiment offer only needs user input ciphertext title and wants to replace original guarantor The reset password of retaining order, and original protection password is input into without the need for user oneself, so when user is after authentication, nothing Whether remember to decrypt the protection password needed for certain ciphertext by it, be capable of achieving the replacement operation of protection password, use so as to avoid working as When password is forgotten to protect in family, it is impossible to the phenomenon of decryption correspondence ciphertext.
304th, the protection password needed for decrypting ciphertext is obtained, and the ciphertext is decrypted using the protection password;
Related introduction in the step except may be referred to step 104 corresponding to Fig. 1 in associated description in addition to, further relate to Herein below:
Obtaining in this step protect the method for password including but not limited to following two needed for decryption:
Method one:Receive the protection password needed for the decryption ciphertext directly inputted based on inputting interface.
Wherein, the inputting interface can be the interface in information, or based on the interface that information is entered. Specifically, the region of input ciphertext title and the region of input protection password can be included on inputting interface, user can be defeated Enter the region input ciphertext title of ciphertext title, in the region input protection password of input protection password.Wherein, it is input into ciphertext name The concrete manifestation form in the region of title is referred to the description in above-mentioned steps 103, will not be described here.Input protection password The concrete manifestation form in region can be:(1) input frame;(2) including numeral and/or the editable region of character, for Family clicks directly on data and/or character in the editable region.
Method two:Protection password according to needed for the ciphertext name acquiring of the ciphertext decrypts the ciphertext.
The specific implementation of this method is including but not limited to following two:
(1) the ciphertext title of the ciphertext of receives input, search from the ciphertext password mapping table for pre-building with it is defeated The corresponding protection password of ciphertext title for entering, obtains the protection password needed for the decryption ciphertext.
Wherein, the ciphertext password mapping table for pre-building includes that difference registered in advance protects passwords and corresponding ciphertext name Claim.This method only needs user input ciphertext title, and protects password without the need for user input, such that it is able to simplify user operation.
Further, in actual applications, it is understood that there may be client is attacked, locally stored ciphertext password is reflected The situation that firing table is tampered.Therefore, when locally stored ciphertext password mapping table is tampered, if using ciphertext password mapping table In protection password directly ciphertext is decrypted, then occur decryption failure phenomenon, so as to cause client resource to waste Phenomenon.
In order to solve the technical problem, the ciphertext with input can be being searched from the ciphertext password mapping table for pre-building The corresponding protection password of title, after obtaining the protection password needed for the decryption ciphertext, the decryption ciphertext institute that will be obtained The protection password output for needing etc. is to be confirmed;After receiving acknowledgment, then by the protection password for finding it is defined as decrypting institute State the protection password needed for ciphertext.
For example, as shown in figure 4, work as user is input into " File1 " in input ciphertext title input frame, and click on after determination, Client can automatically load and show the corresponding protection password " 123456 " of the ciphertext;Now, user can utilize the note of itself Record or memory confirm to the protection password of the automatic loading of client;If praising, can click on " it is determined that ";If thinking Mistake, then can click on " cancellation ", then client auto-returned be manually entered protection password interface, so as to user it is defeated manually Enter to protect password.
(2) output display includes the protection password list of different protection passwords and ciphertext title, will be from the protection password Protection password corresponding with ciphertext ciphertext title that is choosing in list is used as the protection password decrypted needed for the ciphertext.
When the file of user encryption is more, protection password list is generally required to be divided into multipage and shown, now homepage shows Content can be:The corresponding ciphertext title of ciphertext and protection password that user Jing is often decrypted, or:User is nearest one section The corresponding ciphertext title of ciphertext and protection password of time decryption, or other show rule.
Exemplary, after authentication is legal, show for indicating to be input into after the information of protection password, point " next step " is hit, then client shows the page (as shown in Figure 5) including protection password list, when user clicks on " more " Afterwards, more ciphertext titles and corresponding protection password can be shown.
It should be noted that the method for protecting password according to ciphertext name acquiring, not only can simplify user input protection The operation carried out during password, is also prevented from user when forgetting to protect password, it is impossible to which corresponding ciphertext is decrypted.
305th, the duration after authentication is legal is reached after preset time threshold or in the human body biological characteristics When the corresponding user of information reaches predetermined number threshold value by the file number that decryption obtains plaintext, input human body is loaded and shown The information of biological information.
In actual applications, it occur frequently that the phenomenon such as hand-set from stolen, computer are stolen, and the affiliated terminal quilt of active client is worked as After robber, if state of the client state in which for authentication after legal, other people can be in protection password entry prompt frame In continuously attempting to different protection passwords by way of carry out protection password cracking, crack legal risk so as to exist.In order to Further prevent from protecting password to be cracked, can force to be loaded simultaneously in client after authentication is legal, according to preset rules The information of input human body biological characteristic information is shown, it is follow-up so as to only can proceed with after authentication is legal, Operation, and then encryption file security can be played a part of.Wherein, after authentication is legal, what is loaded and show is defeated The information for entering human body biological characteristic information may be located at the upper strata that client currently runs the page;Can also first positive closing The page of current operation, is then directly displayed in terminal.
Specifically, preset rules can be:After authentication is legal, timing is carried out;If reaching preset time threshold, Pressure allows user input human body biological characteristic information, to carry out authentication again.Can also be:It is legal in authentication Afterwards, the real-time statistics user obtains the file number of plaintext by decryption, when the accumulation of file number is to predetermined number threshold value, by force System allows user input human body biological characteristic information, to carry out authentication again.
The decryption method of ciphertext provided in an embodiment of the present invention, can not only after logon account, when being decrypted first, The identity of user is verified by obtaining the human body biological characteristic information of user, can with after authentication is legal, According to preset rules, allowing user to be input into human body biological characteristic information again carries out authentication.It is possible thereby to avoid when identity is tested After card is legal, when the affiliated terminal of client is usurped by other people, other people carry out password cracking operation using password input box, so as to keep away Exempt from vital document leakage.Further, since after authentication is legal, client can confirm that active user is when encrypting file User, it is possible to provide a user with some and simplify input protection password or exempt from the method for being input into protection password, so as to not only User operation can be simplified, being also prevented from user cannot obtain in plain text when forgetting correctly to protect password.In addition, in identity After checking is legal, can also provide a user with a kind of ciphertext title of being only input into just can be in the method for reset password, so as to can also Avoid when user forgets to protect password, it is impossible to the phenomenon of decryption correspondence ciphertext.
Further, according to the method shown in Fig. 1, an alternative embodiment of the invention additionally provides a kind of decryption of ciphertext Device, described device can apply to client-side, as shown in fig. 6, described device mainly includes first acquisition unit 41, second Acquiring unit 42, the first display unit 43, the 3rd acquiring unit 44 and decryption unit 45.Wherein,
First acquisition unit 41, the human body biological characteristic information being input into during for obtaining and be decrypted to ciphertext;
Second acquisition unit 42, the human-body biological for obtaining the input obtained to the first acquisition unit 41 is special Reference breath is decrypted the result of ciphertext user identity legitimate verification;
First display unit 43, it is defeated for when the result that the second acquisition unit 42 is obtained is that authentication is legal Go out to show the information of protection password needed for input decrypting ciphertext;
You need to add is that, after the result that second acquisition unit 42 is obtained is that authentication is illegal, first shows single Unit 43 can be with the illegal information of output display authentication, and to allow the user to know, it is not validated user, is not had Right carries out subsequent decryption operation.
3rd acquiring unit 44, the protection password needed for for obtaining decrypting ciphertext;
Decryption unit 45, the protection password for being obtained using the 3rd acquiring unit 44 is carried out to the ciphertext Decryption.
After the protection password of user input is got, client can be according to the close of the protection password generated Serial No. Key, is then locally decrypted, or sends this key to server, so that server is decrypted to ciphertext.
Additionally, either client is decrypted to ciphertext, or server is decrypted to ciphertext, for client and The data that these are interacted can be encrypted transmission by the interaction data between server by default AES, from And ensure the safety of interaction data, and then ensure the safety of plaintext.
Further, as shown in fig. 7, described device also includes:
Second display unit 46, reaches after preset time threshold for the duration after authentication is legal, loads and shows Show the information of input human body biological characteristic information.
Further, as shown in fig. 7, described device also includes:
3rd display unit 47, for obtaining plaintext by decryption in the corresponding user of the human body biological characteristic information When file number reaches predetermined number threshold value, the information of input human body biological characteristic information is loaded and shown.
Further, as shown in fig. 7, the 3rd acquiring unit 44 includes:
First receiver module 441, the protection needed for for receiving the decryption ciphertext directly inputted based on inputting interface Password;
First acquisition module 442, for the protection needed for decrypting the ciphertext according to the ciphertext name acquiring of the ciphertext Password.
Further, as shown in fig. 7, first acquisition module 442 includes:
Receiving submodule 4421, for the ciphertext title of the ciphertext of receives input;
Submodule 4422 is searched, for searching the ciphertext title pair with input from the ciphertext password mapping table for pre-building The protection password answered, obtains the protection password needed for the decryption ciphertext;
Display sub-module 4423, for the protection password list that output display includes different protection passwords and ciphertext title;
First determination sub-module 4424, for by the protection password list shown from the display sub-module 4423 Protection password corresponding with ciphertext ciphertext title that is choosing is used as the protection password decrypted needed for the ciphertext.
Further, as shown in fig. 7, first acquisition module 442 also includes:
Output sub-module 4425, for searching the ciphertext title with input from the ciphertext password mapping table for pre-building Corresponding protection password, after obtaining the protection password needed for the decryption ciphertext, by needed for the decryption ciphertext for obtaining Protection password output etc. is to be confirmed;
Second determination sub-module 4426, for, the protection password for finding being defined as decrypting institute after receiving acknowledgment State the protection password needed for ciphertext.
Further, as shown in fig. 7, described device also includes:
Receiving unit 48, for after authentication is legal, the reset indication of receives input, the reset indication to include Ciphertext title and reset password;
Searching unit 49, for searching the institute of the reception of the receiving unit 38 from the ciphertext password mapping table for pre-building State the corresponding protection password of ciphertext title;
The decryption unit 45 is additionally operable to carry out the corresponding ciphertext of the ciphertext title using the protection password for finding Decryption, obtains corresponding plaintext;
Ciphering unit 410, for carrying out adding to the plaintext that the decryption unit 45 is obtained using the reset password It is close, obtain the corresponding ciphertext of the reset password.
Further, as shown in fig. 7, the second acquisition unit 42 includes:
Authentication module 421, it is legal for being decrypted ciphertext user identity to the human body biological characteristic information of the input Property checking;
Second acquisition module 422, for obtaining the result of the checking of the authentication module 421;
Second receiver module 423, for by the human body biological characteristic information and User Identity number of the input Code ID is sent to after server, and the human body biological characteristic information to the input that the reception server sends is decrypted ciphertext use The result of family identity legitimacy checking.
Further, as shown in fig. 7, the authentication module 421 includes:
Submodule 4211 is compared, for the human body biological characteristic information of the input is special with human-body biological registered in advance Reference breath is compared;
3rd determination sub-module 4212, the similarity for when the comparison result of the comparison submodule 4211 being both is big In or during equal to predetermined threshold value, determine that authentication is legal;When the comparison result of the comparison submodule 4211 is both When similarity is less than the predetermined threshold value, determine that authentication is illegal.
The decryption device of ciphertext provided in an embodiment of the present invention, can first allow decrypting ciphertext when being decrypted to ciphertext User input human body biological characteristic information carries out identity legitimacy checking, after authentication is legal, ability output display input solution The information of protection password needed for ciphertext, rather than the information for directly displaying input protection password.Due to human-body biological Characteristic information can unique mark user, so when other users log in active user account after, it is impossible to by authentication, Thus cannot be introduced into being input into the page of protection password, so as to protection password cracking cannot be carried out, and then be prevented from using protection The file of password encryption is revealed, it is to avoid user is damaged.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, without the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiment.
It is understood that said method and the correlated characteristic in device can be referred to mutually.In addition, in above-described embodiment " first ", " second " etc. be, for distinguishing each embodiment, and not represent the quality of each embodiment.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
Provided herein algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment. Various general-purpose systems can also be used together based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done to language-specific above is to disclose this Bright preferred forms.
In description mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The more features of feature that the application claims ratio of shield is expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification is (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can it is identical by offers, be equal to or the alternative features of similar purpose carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection appoint One of meaning can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation Software module realize, or with combinations thereof realization.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) are come in the decryption method and device of realizing ciphertext according to embodiments of the present invention Some or all parts some or all functions.The present invention is also implemented as performing side as described herein Some or all equipment of method or program of device (for example, computer program and computer program).It is such Realizing the program of the present invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtained, or be provided on carrier signal, or with any other shape Formula is provided.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design without departing from the scope of the appended claims alternative embodiment.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame Claim.

Claims (18)

1. a kind of decryption method of ciphertext, it is characterised in that methods described includes:
The human body biological characteristic information that acquisition is input into when being decrypted to ciphertext;
Obtain the result that the human body biological characteristic information to the input is decrypted ciphertext user identity legitimate verification;
If the result is that authentication is legal, the information of protection password needed for output display input decrypting ciphertext;
The protection password needed for decrypting ciphertext is obtained, and the ciphertext is decrypted using the protection password.
2. method according to claim 1, it is characterised in that methods described also includes:
Duration after authentication is legal is reached after preset time threshold, loads and show input human body biological characteristic information Information.
3. method according to claim 1, it is characterised in that methods described also includes:
Predetermined number threshold is reached by the file number that decryption obtains plaintext in the human body biological characteristic information corresponding user During value, the information of input human body biological characteristic information is loaded and shown.
4. according to the method in any one of claims 1 to 3, it is characterised in that the guarantor obtained needed for decrypting ciphertext Retaining order includes:
Receive the protection password needed for the decryption ciphertext directly inputted based on inputting interface;
Or the protection password according to needed for the ciphertext name acquiring of the ciphertext decrypts the ciphertext.
5. method according to claim 4, it is characterised in that described that institute is decrypted according to the ciphertext name acquiring of the ciphertext Stating the protection password needed for ciphertext includes:
The ciphertext title of the ciphertext of receives input, searches the ciphertext with input from the ciphertext password mapping table for pre-building The corresponding protection password of title, obtains the protection password needed for the decryption ciphertext;
Or output display includes the protection password list of different protection passwords and ciphertext title, will be from the protection password list In the protection password corresponding with the ciphertext title of the ciphertext chosen as the protection password decrypted needed for the ciphertext.
6. method according to claim 5, it is characterised in that search from the ciphertext password mapping table for pre-building with The corresponding protection password of ciphertext title of input, after obtaining the protection password needed for the decryption ciphertext, methods described is also wrapped Include:
Protection password output needed for the decryption ciphertext for obtaining etc. is to be confirmed;
After receiving acknowledgment, the protection password for finding is defined as decrypting the protection password needed for the ciphertext.
7. according to the method in any one of claims 1 to 3, it is characterised in that after authentication is legal, the side Method also includes:
The reset indication of receives input, the reset indication includes ciphertext title and reset password;
The corresponding protection password of the ciphertext title is searched from the ciphertext password mapping table for pre-building;
The corresponding ciphertext of the ciphertext title is decrypted using the protection password for finding, obtains corresponding plaintext;
The plaintext is encrypted using the reset password, obtains the corresponding ciphertext of the reset password.
8. according to the method in any one of claims 1 to 3, it is characterised in that human body of the acquisition to the input Biological information is decrypted the result of ciphertext user identity legitimate verification to be included:
Ciphertext user identity legitimate verification is decrypted to the human body biological characteristic information of the input, and obtains the knot of checking Really;
Or after the human body biological characteristic information of the input and User Identity number ID are sent to into server, connect The human body biological characteristic information to the input for receiving server transmission is decrypted the knot of ciphertext user identity legitimate verification Really.
9. method according to claim 8, it is characterised in that the human body biological characteristic information of the input is decrypted Ciphertext user identity legitimate verification includes:
The human body biological characteristic information of the input is compared with human body biological characteristic information registered in advance;
If both similarities are more than or equal to predetermined threshold value, it is determined that authentication is legal;
If both similarities are less than the predetermined threshold value, it is determined that authentication is illegal.
10. the decryption device of a kind of ciphertext, it is characterised in that described device includes:
First acquisition unit, the human body biological characteristic information being input into during for obtaining and be decrypted to ciphertext;
Second acquisition unit, the human body biological characteristic information for obtaining the input obtained to the first acquisition unit is entered The result of row decrypting ciphertext user identity legitimate verification;
First display unit, for when the result that the second acquisition unit is obtained is that authentication is legal, output display to be defeated Enter the information of protection password needed for decrypting ciphertext;
3rd acquiring unit, the protection password needed for for obtaining decrypting ciphertext;
Decryption unit, the protection password for being obtained using the 3rd acquiring unit is decrypted to the ciphertext.
11. devices according to claim 10, it is characterised in that described device also includes:
Second display unit, reaches after preset time threshold for the duration after authentication is legal, loads and show input The information of human body biological characteristic information.
12. devices according to claim 10, it is characterised in that described device also includes:
3rd display unit, for obtaining the file of plaintext by decryption in the corresponding user of the human body biological characteristic information When counting to up to predetermined number threshold value, the information of input human body biological characteristic information is loaded and shown.
13. devices according to any one of claim 10 to 12, it is characterised in that the 3rd acquiring unit includes:
First receiver module, the protection password needed for for receiving the decryption ciphertext directly inputted based on inputting interface;
First acquisition module, for the protection password needed for decrypting the ciphertext according to the ciphertext name acquiring of the ciphertext.
14. devices according to claim 13, it is characterised in that first acquisition module includes:
Receiving submodule, for the ciphertext title of the ciphertext of receives input;
Submodule is searched, for searching protection corresponding with the ciphertext title of input from the ciphertext password mapping table for pre-building Password, obtains the protection password needed for the decryption ciphertext;
Display sub-module, for the protection password list that output display includes different protection passwords and ciphertext title;
First determination sub-module, for will choose in the protection password list shown from the display sub-module with it is described The corresponding protection password of ciphertext title of ciphertext is used as the protection password decrypted needed for the ciphertext.
15. devices according to claim 14, it is characterised in that first acquisition module also includes:
Output sub-module, for searching guarantor corresponding with the ciphertext title of input from the ciphertext password mapping table for pre-building Retaining makes, after obtaining the protection password needed for the decryption ciphertext, by the protection password needed for the decryption ciphertext for obtaining Output etc. is to be confirmed;
Second determination sub-module, for, the protection password for finding being defined as decrypting the ciphertext institute after receiving acknowledgment The protection password for needing.
16. devices according to any one of claim 10 to 12, it is characterised in that described device also includes:
Receiving unit, for after authentication is legal, the reset indication of receives input, the reset indication to include ciphertext name Claim and reset password;
Searching unit, for searching the ciphertext name that the receiving unit is received from the ciphertext password mapping table for pre-building Claim corresponding protection password;
The decryption unit is additionally operable to be decrypted the corresponding ciphertext of the ciphertext title using the protection password for finding, and obtains Obtain corresponding plaintext;
Ciphering unit, for being encrypted to the plaintext that the decryption unit is obtained using the reset password, obtains institute State the corresponding ciphertext of reset password.
17. devices according to any one of claim 10 to 12, it is characterised in that the second acquisition unit includes:
Authentication module, for being decrypted ciphertext user identity legitimate verification to the human body biological characteristic information of the input;
Second acquisition module, for obtaining the result of the authentication module checking;
Second receiver module, for the human body biological characteristic information of the input and User Identity number ID to be sent After server, the human body biological characteristic information to the input that the reception server sends is decrypted the conjunction of ciphertext user identity The result of method checking.
18. devices according to claim 17, it is characterised in that the authentication module includes:
Submodule is compared, for the human body biological characteristic information of the input to be entered with human body biological characteristic information registered in advance Row is compared;
3rd determination sub-module, the comparison result for working as the comparison submodule is both similarities more than or equal to pre- If during threshold value, determining that authentication is legal;When the comparison result of the comparison submodule is both similarities less than described pre- If during threshold value, determining that authentication is illegal.
CN201610873508.1A 2016-09-30 2016-09-30 Cryptograph decryption method and cryptograph decryption device Pending CN106656962A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610873508.1A CN106656962A (en) 2016-09-30 2016-09-30 Cryptograph decryption method and cryptograph decryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610873508.1A CN106656962A (en) 2016-09-30 2016-09-30 Cryptograph decryption method and cryptograph decryption device

Publications (1)

Publication Number Publication Date
CN106656962A true CN106656962A (en) 2017-05-10

Family

ID=58854823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610873508.1A Pending CN106656962A (en) 2016-09-30 2016-09-30 Cryptograph decryption method and cryptograph decryption device

Country Status (1)

Country Link
CN (1) CN106656962A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368954A (en) * 2013-07-02 2013-10-23 山东科技大学 Smart card registration entry method based on password and biological characteristics
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment
CN105871553A (en) * 2016-06-28 2016-08-17 电子科技大学 Identity-free three-factor remote user authentication method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714278A (en) * 2012-09-29 2014-04-09 北京三星通信技术研究有限公司 Password authentication method and password authentication device of terminal equipment
CN103368954A (en) * 2013-07-02 2013-10-23 山东科技大学 Smart card registration entry method based on password and biological characteristics
CN105871553A (en) * 2016-06-28 2016-08-17 电子科技大学 Identity-free three-factor remote user authentication method

Similar Documents

Publication Publication Date Title
US10904014B2 (en) Encryption synchronization method
US9698992B2 (en) Method for signing electronic documents with an analog-digital signature with additional verification
JP5330567B2 (en) Computer-implemented authentication interface system
US9317701B2 (en) Security methods and systems
ES2741513T3 (en) Software based multi-channel polymorphic data obfuscation
US8924724B2 (en) Document encryption and decryption
US20100199337A1 (en) System and method for establishing and authorizing a security code
US20080148057A1 (en) Security token
JP2008506198A (en) Online data encryption and decryption
KR102578428B1 (en) Update biometric template protection key
Pande Introduction to cyber security
CN109075972B (en) System and method for password anti-theft authentication and encryption
CN106452755B (en) The method, apparatus and system of resetting protection password based on client decryption ciphertext
CN106453398A (en) Data encryption system and method
KR20130085537A (en) System and method for accessing to encoded files
CN106341227B (en) The method, apparatus and system of resetting protection password based on server decryption ciphertext
CN106656962A (en) Cryptograph decryption method and cryptograph decryption device
CN110263553B (en) Database access control method and device based on public key verification and electronic equipment
US11514144B1 (en) Universal identification device
Kuo Data Reconnaissance and Injection
Parikh et al. Multimodal data security framework using steganography approaches
MACENA CYBER SECURITY AND DATA PROTECTION
Yatsenko et al. Secure mobile application development
KR101170822B1 (en) Confirmation method using variable secret puzzle
Jain et al. Authentication Using Three Phase Password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510