CN109241718A - Cipher processing method and equipment - Google Patents

Cipher processing method and equipment Download PDF

Info

Publication number
CN109241718A
CN109241718A CN201810969584.1A CN201810969584A CN109241718A CN 109241718 A CN109241718 A CN 109241718A CN 201810969584 A CN201810969584 A CN 201810969584A CN 109241718 A CN109241718 A CN 109241718A
Authority
CN
China
Prior art keywords
password
crypted password
crypted
target
decoding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810969584.1A
Other languages
Chinese (zh)
Inventor
庞文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810969584.1A priority Critical patent/CN109241718A/en
Publication of CN109241718A publication Critical patent/CN109241718A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The embodiment of the present application provides a kind of cipher processing method and equipment, comprising: successively obtains M Crypted password, M is the integer greater than 1;According to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.Cipher processing method provided by the embodiments of the present application and equipment, by obtaining multiple Crypted passwords, and terminal is encrypted according to the acquisition of Crypted password sequence, other users will not only know Crypted password in advance, it also needs to obtain encryption order, it could decrypt, password is not easy to be cracked, and improves the safety of terminal.

Description

Cipher processing method and equipment
Technical field
The invention relates to field of computer technology more particularly to a kind of cipher processing method and equipment.
Background technique
Currently, intelligent terminal has become the necessity of user.And the function that intelligent terminal has is more and more, for example pays Function, on-line banking function etc..These functions all refer to the economic interests of user, if terminal drops into the hand of other users In, the privacy information of user may be invaded, and economy will receive loss.
To solve the above-mentioned problems, user is that terminal is opened or is respectively provided with into scenes such as the applications or payment of terminal Password.But current Crypted password is easier to be cracked, so that the safety of terminal is low.
Summary of the invention
The embodiment of the present application provides a kind of cipher processing method and equipment, improves the safety of terminal.
In a first aspect, the embodiment of the present application provides a kind of cipher processing method, comprising:
M Crypted password is successively obtained, M is the integer greater than 1;
According to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.
In a kind of possible design, further includes:
N number of clear crytpographic key is successively obtained, N is integer;
It is close according to the acquisition of N number of clear crytpographic key sequence, the acquisition sequence of the M Crypted password, the M encryption The terminal is decrypted in code and N number of clear crytpographic key.
It is described according to the acquisition sequence of N number of clear crytpographic key, the M Crypted password in a kind of possible design Acquisition sequence, the terminal is decrypted in the M Crypted password and N number of clear crytpographic key, comprising:
If N number of clear crytpographic key is identical as the M Crypted password, and N number of clear crytpographic key acquisition sequence with The acquisition sequence of the M Crypted password is identical, it is determined that terminal deciphering success;Otherwise, it is determined that the terminal Decryption failure.
In a kind of possible design, further includes:
More new command is obtained, the more new command is used to update the target Crypted password in the M Crypted password;
P clear crytpographic key is successively obtained according to the more new command, P is integer;
Added according to described P decoding password, the acquisition sequence of the P decoding password, S Crypted password and the S Target Crypted password described in the acquisition sequential update of password, the S Crypted password are at least portion in M-1 Crypted password Divide Crypted password, the M-1 Crypted password is that the encryption in the M Crypted password other than the target Crypted password is close Code;S≤the M-1.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially, Target Crypted password described in the acquisition sequential update of S Crypted password and the S Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the S Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that right The target Crypted password updates failure.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially, Target Crypted password described in the acquisition sequential update of S Crypted password and the S Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, it is determined that be updated to the target Crypted password Function, otherwise, it is determined that the target Crypted password is updated and is failed.
In a kind of possible design, further includes:
It obtains and deletes instruction, the target Crypted password for deleting instruction for deleting in the M Crypted password;
P clear crytpographic key is successively obtained according to deletion instruction, P is integer;
Added according to described P decoding password, the acquisition sequence of the P decoding password, S Crypted password and the S The acquisition sequence of password deletes the target Crypted password, and the S Crypted password is at least portion in M-1 Crypted password Divide Crypted password, the M-1 Crypted password is that the encryption in the M Crypted password other than the target Crypted password is close Code;S≤the M-1.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially, The acquisition sequence of S Crypted password and the S Crypted password deletes the target Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the S Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that right The target Crypted password deletes failure.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially, The acquisition sequence of S Crypted password and the S Crypted password deletes the target Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password delete at Function, otherwise, it is determined that the target Crypted password is deleted and is failed.
In a kind of possible design, further includes:
Addition instruction is obtained, the addition instruction is for adding target Crypted password;
P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
Acquisition sequence, the L Crypted password and the L of password, the P decoding password are decoded according to described P The acquisition sequence of a Crypted password adds the target Crypted password, and the L Crypted password is in the M Crypted password At least partly Crypted password;1≤L≤M.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially, The acquisition sequence of the L Crypted password and the L Crypted password adds the target Crypted password, comprising:
If the P decoding password is identical as the L Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that right The target Crypted password addition failure.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially, The acquisition sequence of the L Crypted password and the L Crypted password adds the target Crypted password, comprising:
If the P decoding password is identical as the L Crypted password, it is determined that the target Crypted password addition at Function, otherwise, it is determined that the target Crypted password is added and is failed.
In a kind of possible design, M Crypted password includes following at least two: sound password, face password, gesture Password, iris password.
Second aspect, the embodiment of the present application provide a kind of encryption processing apparatus, comprising:
Module is obtained, for successively obtaining M Crypted password, M is the integer greater than 1;
Processing module carries out terminal using M Crypted password for the acquisition sequence according to the M Crypted password Encryption.
In a kind of possible design, in a kind of possible design, the acquisition module is also used to successively obtain N number of Clear crytpographic key, N are integer;
The processing module is also used to be obtained according to the acquisition of N number of clear crytpographic key sequence, the M Crypted password Take sequence, the M Crypted password and N number of clear crytpographic key that the terminal is decrypted.
The processing module, is specifically used for: if N number of clear crytpographic key is identical as the M Crypted password, and the N The acquisition sequence of a clear crytpographic key is identical as the acquisition sequence of the M Crypted password, it is determined that terminal deciphering success; Otherwise, it is determined that fail to the terminal deciphering.
In a kind of possible design, the acquisition module is also used to obtain more new command, and the more new command is for more Target Crypted password in the new M Crypted password;And P clear crytpographic key, P are successively obtained according to the more new command For integer;
The processing module, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P Target Crypted password described in the acquisition sequential update of Crypted password and the S Crypted password, the S Crypted password are M-1 At least partly Crypted password in a Crypted password, the M-1 Crypted password are in the M Crypted password in addition to the mesh Mark the Crypted password outside Crypted password;S≤the M-1.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the S Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that right The target Crypted password updates failure.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, it is determined that be updated to the target Crypted password Function, otherwise, it is determined that the target Crypted password is updated and is failed.
In a kind of possible design, the acquisition module is also used to: being obtained and is deleted instruction, the deletion instruction is used for Delete the target Crypted password in the M Crypted password;And P clear crytpographic key is successively obtained according to deletion instruction, P is integer;
The processing module, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P The acquisition sequence of Crypted password and the S Crypted password deletes the target Crypted password, and the S Crypted password is M-1 At least partly Crypted password in a Crypted password, the M-1 Crypted password are in the M Crypted password in addition to the mesh Mark the Crypted password outside Crypted password;S≤the M-1.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the S Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that right The target Crypted password deletes failure.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password delete at Function, otherwise, it is determined that the target Crypted password is deleted and is failed.
In a kind of possible design, the acquisition module is also used to: obtaining addition instruction, the addition instruction is used for Add target Crypted password;And P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
The processing module, is also used to: decoding password, the acquisition sequence of the P decoding password, institute according to described P The acquisition sequence for stating L Crypted password and the L Crypted password adds the target Crypted password, the L Crypted password For at least partly Crypted password in the M Crypted password;1≤L≤M.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the L Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that right The target Crypted password addition failure.
In a kind of possible design, the processing module, also particularly useful for: if the P decoding password and the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that adds to the target Crypted password Add failure.
In a kind of possible design, M Crypted password includes following at least two: sound password, face password, gesture Password, iris password.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, comprising: processor, the processor and memory Coupling;
The memory is used for, and stores computer program;
The processor is used for, and calls the computer program stored in the memory, to realize claim first party Method described in any design in face.
Fourth aspect, the embodiment of the present application provide a kind of readable storage medium storing program for executing, readable storage medium storing program for executing and computer instruction, institute Computer instruction is stated to be stored in the readable storage medium storing program for executing;The computer instruction mentions for realizing any design of first aspect The method of confession.
5th aspect, the embodiment of the present application provide a kind of program product, which includes that computer instruction (calculates Machine program), which is stored in readable storage medium storing program for executing.At least one processor of electronic equipment can be deposited from readable Storage media reads the computer instruction, at least one processor executes the computer instruction and electronic equipment is made to implement first aspect The method that any design provides.
In the application, terminal is encrypted by obtaining multiple Crypted passwords, and according to the acquisition of Crypted password sequence, Other users will not only know Crypted password in advance, it is also necessary to encryption order obtained, could be decrypted, password is not easy to be cracked, Improve the safety of terminal.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this Shen Some embodiments please for those of ordinary skill in the art without any creative labor, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart one of cipher processing method provided by the embodiments of the present application;
Fig. 2A is user interface schematic diagram one provided by the embodiments of the present application;
Fig. 2 B is user interface schematic diagram two provided by the embodiments of the present application;
Fig. 2 C is user interface schematic diagram three provided by the embodiments of the present application;
Fig. 3 is the flowchart 2 of cipher processing method provided by the embodiments of the present application;
Fig. 4 is the flow chart 3 of cipher processing method provided by the embodiments of the present application;
Fig. 5 A is user interface schematic diagram four provided by the embodiments of the present application;
Fig. 5 B is user interface schematic diagram five provided by the embodiments of the present application;
Fig. 5 C is user interface schematic diagram six provided by the embodiments of the present application;
Fig. 5 D is user interface schematic diagram seven provided by the embodiments of the present application;
Fig. 6 is the flow chart four of cipher processing method provided by the embodiments of the present application;
Fig. 7 A is user interface schematic diagram eight provided by the embodiments of the present application;
Fig. 7 B is user interface schematic diagram nine provided by the embodiments of the present application;
Fig. 7 C is user interface schematic diagram ten provided by the embodiments of the present application;
Fig. 8 is the flow chart five of cipher processing method provided by the embodiments of the present application;
Fig. 9 A is user interface schematic diagram 11 provided by the embodiments of the present application;
Fig. 9 B is user interface schematic diagram 12 provided by the embodiments of the present application;
Fig. 9 C is user interface schematic diagram 13 provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram of encryption processing apparatus provided by the embodiments of the present application;
Figure 11 is the structural schematic diagram of electronic equipment provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art All other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
Fig. 1 is the flow chart one of cipher processing method provided by the embodiments of the present application, referring to Fig. 1, the method for the present embodiment Include:
Step S101, M Crypted password is successively obtained, M is the integer greater than 1;
Step S102, according to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.
Specifically, the executing subject in this implementation is encryption processing apparatus, and the encryption processing apparatus is settable in the terminal. M Crypted password in the present embodiment includes following at least two: sound password, face password, gesture password, iris password, Pattern password, finger-print cipher and password symbol.
The not sequence of conditioning step S101 and step S102 in the present embodiment.
A kind of possible embodiment: terminal first obtains M Crypted password, and M is the integer greater than 1;Then, terminal according to The acquisition sequence of M Crypted password of acquisition and M Crypted password encrypts terminal using M Crypted password.
Specifically, user sequentially inputs M Crypted password, for example, M Crypted password include gesture password, sound password, The camera of face password, terminal is opened, and user does a gesture, and terminal collects the gesture, gets gesture password;It connects , user says one section of voice, and terminal collects this section of voice, gets sound password, and then the camera of terminal is used current The face at family is shot, and face password is got.Terminal successively gets gesture password, sound password, face password, and terminal is pressed Terminal is encrypted according to the sequence of gesture password, sound password, face password.
Fig. 2A is user interface schematic diagram one provided by the embodiments of the present application;Fig. 2 B is user provided by the embodiments of the present application Interface schematic diagram two;Fig. 2 C is user interface schematic diagram three provided by the embodiments of the present application.A referring to fig. 2, user do a hand Gesture, terminal acquire the gesture, and after user's click determines, terminal gets gesture password and shows interface shown in Fig. 2 B, then User clicks determination after saying one section of voice, and terminal gets sound password, and shows interface shown in fig. 2 C, and terminal starts at this time The facial image for acquiring user, gets face password;It is worth noting that the collected facial image of terminal is actually true Real facial image, so being a kind of signal of facial image in Fig. 2 C.
Alternatively possible embodiment: terminal obtains the 1st Crypted password, terminal using the 1st Crypted password into Row encryption, terminal obtain the 2nd Crypted password, and terminal is encrypted using the 2nd Crypted password, repeated the above process, directly M-th Crypted password is got to terminal, and is encrypted using the m-th Crypted password.
For example, M Crypted password includes sound password, face password, iris password, user says one section of voice, and terminal is adopted Collect this section of voice, gets sound password, and encrypt to terminal using the sound password;Then, the camera of terminal It opens, the face of active user is shot, get face password, and encrypt to terminal using the face password;So The iris information of terminal acquisition user afterwards is got iris password, and is encrypted using the iris password to terminal.It can manage Solution, terminal at this time are that the terminal of function is acquired with iris information.
Optionally, the acquisition sequence of M Crypted password and the priority orders of M Crypted password are in inverse ratio.
The method of the present embodiment processing password is suitable for but is not limited to the scene for needing to encrypt as follows, and user opens terminal It opens and is encrypted, the payment function of terminal is encrypted, the opening of terminal applies is encrypted.
In the present embodiment, terminal is added by obtaining multiple Crypted passwords, and according to the acquisition of Crypted password sequence Close, other users will not only know Crypted password in advance, it is also necessary to obtain encryption order, could decrypt, password is not easy to be broken Solution, improves the safety of terminal.
It is illustrated below with reference to cipher processing method of the decrypting process to the application.
Fig. 3 is the flowchart 2 of cipher processing method provided by the embodiments of the present application, referring to Fig. 3, the method for the present embodiment Include:
Step S201, M Crypted password is successively obtained, M is the integer greater than 1;
Step S202, according to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password;
Step S203, N number of clear crytpographic key is successively obtained, N is integer;
Step S204, according to the acquisition of N number of clear crytpographic key sequence, M Crypted password acquisition sequentially, M Crypted password And terminal is decrypted in N number of clear crytpographic key.
Specifically, step S201~step S202 is referring to step S101~step S102 in a upper embodiment, this implementation Example repeats no more.
For step S203~step S204, the scene of decryption is with the scene encrypted, if user carries out the unlatching of terminal Encryption needs successful decryption, could open terminal when then user opens terminal;If user carries out the payment function of terminal Encryption needs successful decryption, just can be carried out payment when then user uses the payment function of terminal.
Specifically, after the completion of terminal uses M password encryption, in user's decryption, terminal successively obtains user's input N number of clear crytpographic key, and according to the acquisition of N number of clear crytpographic key sequence, M Crypted password acquisition sequentially, M Crypted password with And terminal is decrypted in N number of clear crytpographic key.
It is understood that if N number of clear crytpographic key is identical as M Crypted password (at this point, M=N), and N number of clear crytpographic key Acquisition sequence it is identical as the acquisition sequence of M Crypted password, it is determined that terminal deciphering successfully;Alternatively, if N number of clear crytpographic key It is identical as M Crypted password, it is determined that terminal deciphering success.
If N number of clear crytpographic key and M Crypted password be not identical, and/or, the acquisition sequence of N number of clear crytpographic key is encrypted with M The acquisition sequence of password is not identical, it is determined that fails to terminal deciphering.At this point, N≤M
Manner of decryption has following but is not limited to following several modes.
First way, terminal can first obtain N number of clear crytpographic key, after the completion of acquisition, start to judge N number of clear crytpographic key with Whether M Crypted password be identical, if so, determining to terminal deciphering success.
Which is suitable for the scene of terminal automatic collection when terminal obtains clear crytpographic key, for example M Crypted password is behaved Face password and iris password;Alternatively, terminal needs to provide the scene at corresponding interface, such as M encryption when obtaining clear crytpographic key Password is pattern password, face password and iris password.
The second way, terminal can first obtain N number of clear crytpographic key, after the completion of acquisition, start to judge N number of clear crytpographic key with Whether M Crypted password be identical, if so, continuing to judge that the acquisition sequence of N number of clear crytpographic key is suitable with the acquisition of M Crypted password Whether sequence is identical, if so, determining to terminal deciphering success.
The third mode, terminal first obtain first clear crytpographic key, if first clear crytpographic key and the when terminal encryption The Crypted password of one acquisition is identical, then obtains second clear crytpographic key again, if when second clear crytpographic key and terminal encryption The Crypted password of second acquisition is identical, then repeats the above process, until determining close to terminal deciphering success or N decryption Code and the Crypted password that n-th when terminal encryption obtains be not identical, determines and fails to terminal deciphering.
4th kind of mode, terminal according to Crypted password acquisition sequence judge in preset duration, if got with The identical clear crytpographic key of respective encrypted password, if not, it is determined that fail to terminal deciphering, if so, continuing according to Crypted password Acquisition sequence judge in preset duration, if got clear crytpographic key identical with respective encrypted password, alternatively, determination Terminal deciphering success.
Illustratively, if M Crypted password is gesture password, sound password, face password, and acquisition sequence is followed successively by hand Gesture password, sound password, face password.
When user wants decryption, if terminal is got the current gesture of user (the first clear crytpographic key) first, and current Gesture (the first Crypted password) for encryption of gesture and terminal storage it is identical, then show the first information to user, first The gesture of information alert user input is correct, can start to input next clear crytpographic key;Then, if terminal collects the language of user Sound, and (second adds the information of the voice for encryption of the information (the second clear crytpographic key) of collected voice and terminal storage Password) it is identical, then the second information is shown to user, the voice of the second information alert user input is correct, can start under input One clear crytpographic key;Then, if terminal collects the facial image (third clear crytpographic key) of active user, and the face of active user The facial image for encryption of image and terminal storage it is identical (third Crypted password, i.e., current collected active user's The similarity of facial image and the facial image for encryption of terminal storage is greater than preset threshold, then it is assumed that current collected The facial image of active user is identical as the facial image for encryption of terminal storage, rear same), then terminal determination is decrypted into Function, that is, terminal are successfully opened, and perhaps application is successfully entered or is paid successfully.Wherein, the information of voice includes language The corresponding text of acoustic feature and voice of sound, the information of two voices is identical, refers to that acoustic feature is identical, and voice converts Text afterwards is identical.
In the examples described above, if user want decryption, terminal first it is collected be user voice, then directly determine This time decryption failure.
In the examples described above, if user wants decryption, terminal does not collect gesture in preset duration, then directly really Fixed this time decryption failure.
In the present embodiment, terminal is added by obtaining multiple Crypted passwords, and according to the acquisition of Crypted password sequence Close, so that terminal is in decryption, the clear crytpographic key of acquisition is identical with Crypted password, and in most cases, obtains decryption The sequence of password needs the acquisition sequence with Crypted password identical, and terminal just determines successful decryption, therefore the requirement of terminal deciphering It is relatively high, improve the safety of terminal.
The renewal process of password is illustrated using specific embodiment below.
Fig. 4 is the flow chart 3 of cipher processing method provided by the embodiments of the present application, referring to fig. 4, the method for the present embodiment Include:
Step S301, more new command is obtained, more new command is used to update the target Crypted password in M Crypted password;
Step S302, P clear crytpographic key is successively obtained according to more new command, P is integer;
Step S303, acquisition sequence, S Crypted password and the S encryption for decoding password according to P decoding password, P are close The acquisition sequential update target Crypted password of code, S Crypted password are at least partly Crypted password in M-1 Crypted password, The M-1 Crypted password is the Crypted password in M Crypted password other than the target Crypted password;S≤M-1.
Specifically, when user wants to update a certain Crypted password, which is known as target Crypted password, and user is defeated Enter more new command, user can click the icon of the more new password in user interface, and terminal shows input new password to user Interface, user input new password after, just have input more new command, terminal receives the more new command, and more new command is true according to this Fixed Crypted password to be updated is the target Crypted password and the updated new password of target Crypted password;At this point, can also To say more new command for first object Crypted password to be updated to the second target Crypted password, first object Crypted password is M Crypted password to be updated in a Crypted password.
Terminal shows that third information, third information are used to indicate user and input P decryption according to the more new command, to user Password, user inputs P clear crytpographic key, after terminal obtains P decoding password, decodes password according to P decoding password, P The acquisition sequential update target Crypted password of acquisition sequence, S Crypted password and S Crypted password, S Crypted password are M-1 At least partly Crypted password in a Crypted password, the M-1 Crypted password are in M Crypted password in addition to target encryption is close Crypted password outside code, S≤M-1.
Even P decoding password is identical as the S Crypted password, and the acquisition sequence of P decoding password is close with this S encryption The acquisition sequence of code is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that more to the target Crypted password New failure.Alternatively,
If P decoding password is identical as the S Crypted password, it is determined that be updated successfully to target Crypted password, otherwise, then It determines to update target Crypted password and fail.
Wherein, terminal obtains P and decodes the mode of password referring to decrypting corresponding four kinds of modes in embodiment shown in Fig. 3 The acquisition modes of middle clear crytpographic key repeat no more in the present embodiment.
Specifically, in P decoding password situation identical with the S Crypted password, P decoding password can be M-1 Any P Crypted password in Crypted password, M-1 Crypted password are in M above-mentioned Crypted password in addition to above-mentioned target adds The Crypted password of password, at this point, P=S.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption P Crypted password of the acquisition sequence after the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close In addition to the Crypted password of above-mentioned target Crypted password in code, at this point, P=S.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption P Crypted password of the acquisition sequence before the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close In addition to the Crypted password of above-mentioned target Crypted password in code, at this point, P=S.
Illustratively, it if M Crypted password is gesture password, sound password, face password and iris password, and obtains suitable Sequence is gesture password, sound password, face password and iris password.Sound password is target Crypted password to be updated, above-mentioned S A Crypted password can be face password and iris password, alternatively, gesture password or gesture password, face password, iris password At least one of.
Below by taking S Crypted password is face password and iris password as an example, illustrate that the example updates the mistake of sound password Journey.Fig. 5 A is user interface schematic diagram four provided by the embodiments of the present application, and Fig. 5 B is user interface provided by the embodiments of the present application Schematic diagram five, Fig. 5 C are user interface schematic diagram six provided by the embodiments of the present application, and Fig. 5 D is use provided by the embodiments of the present application Family interface schematic diagram seven;Referring to Fig. 5 A, user clicks the icon of more new password in interface, and interface becomes Fig. 5 B, user's click sound This icon of sound password, interface become Fig. 5 C, show " please input new sound password " in interface, user say again one section it is new Voice, terminal receive the new voice and just have input more new command, terminal is according to the more new command, boundary after user's click determines Face becomes Fig. 5 D, can show " verifying ", and being somebody's turn to do " verifying " can be above-mentioned third information;At this point, terminal can be according to The secondary facial image (the first clear crytpographic key) and iris information (the second clear crytpographic key) for obtaining active user, if the first clear crytpographic key It is identical as facial image (the first Crypted password) of storage, and (the second encryption is close for the second clear crytpographic key and the iris password of storage Code) it is identical that (similarity of the iris information for encryption of the iris information and terminal storage of the active user obtained is greater than When preset threshold, then it is assumed that the second clear crytpographic key is identical as the second Crypted password, rear same), it is determined that the sound password update Success, updated sound password is the corresponding sound password of the received new voice of terminal.
It is understood that can also determine that P decoding password is identical as the S Crypted password, and P decodes password After acquisition sequence is identical as the acquisition sequence of the S Crypted password, then obtain the updated Crypted password of target Crypted password.Or Person is after determining that P decoding password is identical as the S Crypted password, then obtains the updated Crypted password of target Crypted password. At this point, more new command indicates that password to be updated is the target Crypted password in M Crypted password.
In the present embodiment when updating Crypted password, need it is identical as S Crypted password in P decoding password of acquisition and The acquisition sequence of P decoding password is identical as the acquisition sequence of S Crypted password, alternatively, in the P decoding password and S of acquisition A Crypted password can be just successfully updated when identical, it is therefore prevented that other users arbitrarily distort password, improve the safety of terminal.
The deletion process of password is illustrated using specific embodiment below.
Fig. 6 is the flow chart four of cipher processing method provided by the embodiments of the present application, referring to Fig. 6, the method for the present embodiment Include:
Step S401, it obtains and deletes instruction, delete instruction for deleting the target Crypted password in M Crypted password;
Step S402, according to instruction successively P clear crytpographic key of acquisition is deleted, P is integer;
Step S403, acquisition sequence, S Crypted password and the S encryption for decoding password according to P decoding password, P are close The acquisition sequence delete target Crypted password of code, S Crypted password are at least partly Crypted password in M-1 Crypted password, The M-1 Crypted password is the Crypted password in M Crypted password other than the target Crypted password;S≤M-1.
Specifically, when user wants to delete a certain Crypted password, it is close which is known as target encryption Code, user, which inputs, deletes instruction, and user can click the icon of the deletion password in user interface, and instruction is deleted in input, eventually End receives deletion instruction, determines that Crypted password to be deleted is the target Crypted password according to deletion instruction.
Terminal is instructed according to the deletion, shows that third information, third information are used to indicate user and input P decryption to user Password, user inputs P clear crytpographic key, after terminal obtains P decoding password, according to according to P decoding password, P decryption The acquisition sequence delete target Crypted password of the acquisition sequence of code, S Crypted password and S Crypted password, S Crypted password be At least partly Crypted password in M-1 Crypted password, the M-1 Crypted password are in M Crypted password in addition to the target adds Crypted password outside password.
Even P decoding password is identical as the S Crypted password, and the acquisition sequence of P decoding password is close with this S encryption The acquisition sequence of code is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that delete to the target Crypted password Except failure.Alternatively,
If P decoding password is identical as the S Crypted password, it is determined that delete successfully target Crypted password, otherwise, then It determines to delete target Crypted password and fail.
Wherein, terminal obtains P and decodes the mode of password referring to decrypting corresponding four kinds of modes in embodiment shown in Fig. 3 The acquisition modes of middle clear crytpographic key repeat no more in the present embodiment.
Specifically, in P decoding password situation identical with the S Crypted password, P decoding password can be M-1 Any P Crypted password in Crypted password, M-1 Crypted password are in M above-mentioned Crypted password in addition to above-mentioned target adds The Crypted password of password.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption P Crypted password of the acquisition sequence after the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close In addition to the Crypted password of above-mentioned target Crypted password in code.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption P Crypted password of the acquisition sequence before the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close In addition to the Crypted password of above-mentioned target Crypted password in code.
Illustratively, it if M Crypted password is face password, sound password, gesture password and iris password, and obtains suitable Sequence is face password, sound password, gesture password and iris password.Sound password be target Crypted password to be deleted, then on Stating S Crypted password can be gesture password and iris password, alternatively, face password or face password, gesture password, iris At least one of password.
Below by taking S Crypted password is gesture password and iris password as an example, illustrate that the example deletes the mistake of sound password Journey.Fig. 7 A is user interface schematic diagram eight provided by the embodiments of the present application, and Fig. 7 B is user interface provided by the embodiments of the present application Schematic diagram nine, Fig. 7 C are user interface schematic diagram ten provided by the embodiments of the present application;Referring to Fig. 7 A, user clicks to delete in interface Password icon, interface become Fig. 7 B, this icon of user's click sound password just has input deletion instruction, and interface becomes Fig. 7 C, " verifying " can be shown, being somebody's turn to do " verifying " can be above-mentioned third information;At this point, if user makes a gesture, phase When in inputting the first clear crytpographic key, terminal obtains first clear crytpographic key, and terminal obtains the iris information of active user again, quite In obtaining the second clear crytpographic key, if terminal determines gesture password (the first Crypted password) phase of the first clear crytpographic key with storage Together, the second clear crytpographic key is identical as iris password (the second Crypted password) of storage, and determination is first to obtain above-mentioned first Clear crytpographic key obtains the second above-mentioned clear crytpographic key again, it is determined that deletes successfully the sound password.
In the present embodiment when deleting Crypted password, need it is identical as S Crypted password in P decoding password of acquisition and The acquisition sequence of P decoding password is identical as the acquisition sequence of S Crypted password, alternatively, in the P decoding password and S of acquisition A Crypted password could be deleted successfully when identical, it is therefore prevented that other users arbitrarily delete password, improve the safety of terminal.
The adding procedure of password is illustrated using specific embodiment below.
Fig. 8 is the flow chart five of cipher processing method provided by the embodiments of the present application, referring to Fig. 8, the method for the present embodiment Include:
Step S501, addition instruction is obtained, addition instruction is for adding target Crypted password;
Step S502, P clear crytpographic key is successively obtained according to addition instruction, P is integer;
Step S503, acquisition sequence, L Crypted password and the L encryption for decoding password according to P decoding password, P are close The acquisition sequence of code adds the target Crypted password, and L Crypted password is at least partly encryption in M above-mentioned Crypted password Password;1≤L≤M.
Specifically, when user wants addition Crypted password, which is known as target Crypted password, uses Family input addition instruction, user can click the icon in user interface, input addition instruction, and terminal shows to user and inputs The interface for adding target Crypted password after user inputs target Crypted password to be added, just has input addition instruction;Terminal connects Addition instruction is received, target Crypted password to be added is determined according to addition instruction.
Terminal is instructed according to the addition, shows that third information, third information are used to indicate user and input P decryption to user Password, user inputs P clear crytpographic key, after terminal obtains P decoding password, decodes password according to P decoding password, P The acquisition sequence addition target Crypted password of acquisition sequence, L Crypted password and L Crypted password, 1≤L≤M.L encryption is close Code is at least partly Crypted password in M above-mentioned Crypted password.
Even P decoding password is identical as the L Crypted password, and the acquisition sequence of P decoding password is close with this L encryption The acquisition sequence of code is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that add to the target Crypted password Add failure.Alternatively,
If P decoding password is identical as the L Crypted password, it is determined that added successfully to target Crypted password, otherwise, then It determines to add target Crypted password and fail.
Wherein, terminal obtains P and decodes the mode of password referring to decrypting corresponding four kinds of modes in embodiment shown in Fig. 3 The acquisition modes of middle clear crytpographic key repeat no more in the present embodiment.
Specifically, in P decoding password situation identical with the L Crypted password, P=L, P decoding password can be M Any P Crypted password in a Crypted password.
Illustratively, if M Crypted password is gesture password, sound password and face password, and acquisition sequence is gesture Password, sound password and face password, then above-mentioned P Crypted password can be in gesture password, sound password and face password At least one of.
It is below gesture password, for sound password and face password by L Crypted password, illustrates that the example updates sound The process of password.Fig. 9 A is user interface schematic diagram 11 provided by the embodiments of the present application, and Fig. 9 B provides for the embodiment of the present application User interface schematic diagram 12, Fig. 9 C be user interface schematic diagram 13 provided by the embodiments of the present application;Referring to Fig. 9 A, user It clicks and adds password icon in interface, interface becomes Fig. 9 B, can show " please input password ", and after user's input, interface becomes figure 9C can show " verifying ", and being somebody's turn to do " verifying " can be above-mentioned third information;At this point, if terminal gets use first The current gesture in family (the first clear crytpographic key), and the hand for encryption of current gesture (the first clear crytpographic key) and terminal storage Gesture (the-the first Crypted password of gesture password) is identical, then shows that the first information, the first information prompt the gesture of user's input to user Correctly, can start to input next clear crytpographic key;Then, if terminal collects the voice of user, and the information of collected voice (the second clear crytpographic key) is identical as information (the-the second Crypted password of sound password) of voice for encryption of terminal storage, then The second information is shown to user, and the voice of the second information alert user input is correct, can start to input next clear crytpographic key;It connects , if terminal collects the facial image (third Crypted password) of active user, and facial image (the third decryption of active user Password) it is identical as facial image (the face password-third Crypted password) for encryption of terminal storage, then terminal determines 3 Decoding password is identical as 3 Crypted passwords, the acquisition sequence phase of the acquisition sequence and 3 Crypted passwords of 3 decoding passwords Together, then the success of target Crypted password is added.
It is understood that can also determine that if P decoding password is identical as the L Crypted password, and P decoding password Acquisition sequence it is identical as the acquisition sequence of the L Crypted password after, then obtain target Crypted password.Or determining P solution After code password is identical as the L Crypted password, then obtain the updated Crypted password of target Crypted password.
In the present embodiment when adding Crypted password, need it is identical as L Crypted password in P decoding password of acquisition and The acquisition sequence of P decoding password is identical as the acquisition sequence of L Crypted password, alternatively, in the P decoding password and L of acquisition A Crypted password can be just successfully updated when identical, it is therefore prevented that other users arbitrarily add password, improve the safety of terminal.
Figure 10 is the structural schematic diagram one of encryption processing apparatus provided by the embodiments of the present application, referring to Figure 10, the present embodiment Device include: to obtain module 11 and processing module 12;
Module 11 is obtained, for successively obtaining M Crypted password, M is the integer greater than 1;
Processing module 12, for according to the acquisition of M Crypted password sequence, using M Crypted password to terminal into Row encryption.
Optionally, M Crypted password includes following at least two: sound password, face password, gesture password, iris are close Code.
Encryption processing apparatus provided by the embodiments of the present application can execute skill shown in above-mentioned embodiment of the method shown in FIG. 1 Art scheme, realization principle and beneficial effect are similar, are no longer repeated herein.
In a kind of possible design, the acquisition module 11 is also used to successively obtain N number of clear crytpographic key, and N is integer;
The processing module 12 is also used to according to the acquisition of N number of clear crytpographic key sequence, the M Crypted password The terminal is decrypted in acquisition sequence, the M Crypted password and N number of clear crytpographic key.
The processing module 12, is specifically used for: if N number of clear crytpographic key and the M Crypted password are identical and described N number of clear crytpographic key acquisition sequence it is identical as the acquisition sequence of the M Crypted password, it is determined that the terminal deciphering at Function;Otherwise, it is determined that fail to the terminal deciphering.
In a kind of possible design, the acquisition module 11 is also used to obtain more new command, and the more new command is used for Update the target Crypted password in the M Crypted password;And P clear crytpographic key is successively obtained according to the more new command, P is integer;
The processing module 12, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P Target Crypted password described in the acquisition sequential update of a Crypted password and the S Crypted password, the S Crypted password are M- At least partly Crypted password in 1 Crypted password, the M-1 Crypted password are in the M Crypted password in addition to described Crypted password outside target Crypted password;S≤the M-1.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the S Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that right The target Crypted password updates failure.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the S Crypted password, it is determined that be updated to the target Crypted password Function, otherwise, it is determined that the target Crypted password is updated and is failed.
In a kind of possible design, the acquisition module 11 is also used to: being obtained and is deleted instruction, the deletion instruction is used Target Crypted password in the deletion M Crypted password;And successively P decryption of acquisition is close according to deletion instruction Code, P is integer;
The processing module 12, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P The acquisition sequence of a Crypted password and the S Crypted password deletes the target Crypted password, and the S Crypted password is M- At least partly Crypted password in 1 Crypted password, the M-1 Crypted password are in the M Crypted password in addition to described Crypted password outside target Crypted password;S≤the M-1.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the S Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that right The target Crypted password deletes failure.
In a kind of possible design, the processing module 12, also particularly useful for:
If identical as the S Crypted password for the P decoding password, it is determined that deleted to the target Crypted password Except success, otherwise, it is determined that the target Crypted password is deleted and is failed.
In a kind of possible design, the acquisition module 11 is also used to: obtaining addition instruction, the addition instruction is used In addition target Crypted password;And P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
The processing module 12, is also used to: according to described P decode password, it is described P decoding password acquisition sequentially, The acquisition sequence of the L Crypted password and the L Crypted password adds the target Crypted password, and the L encryption is close Code is at least partly Crypted password in the M Crypted password;1≤L≤M.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the L Crypted password, and it is described P decoding password acquisition sequence with The acquisition sequence of the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that right The target Crypted password addition failure.
In a kind of possible design, the processing module 12, also particularly useful for: if the P decoding password and the L A Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that the target Crypted password Addition failure.
Encryption processing apparatus provided by the embodiments of the present application can execute technical solution shown in above method embodiment, Realization principle and beneficial effect are similar, are no longer repeated herein.
Figure 11 is the structural schematic diagram of electronic equipment provided by the embodiments of the present application, including processor 21,22 and of memory Communication bus 23, communication bus 23 are used for the connection of each electronic device, wherein
Memory 22, for storing program;
Processor 21, for executing the described program of the memory storage, to realize terminal in above method embodiment The corresponding method of equipment.
The embodiment of the present application provides a kind of readable storage medium storing program for executing, including program or instruction, when described program or instruction are being counted When running on calculation machine, the method in above method embodiment is performed.
The embodiment of the present application also provides a kind of program product, which includes computer instruction (i.e. computer journey Sequence), which is stored in readable storage medium storing program for executing.At least one processor of electronic equipment can be from readable storage Medium reads the computer instruction, at least one processor executes the computer instruction and electronic equipment is made to implement aforementioned any reality The cipher processing method of example offer is provided.
Above-mentioned electronic equipment in the specific implementation, it should be understood that processor can be central processing unit (English: Central Processing Unit, referred to as: CPU), can also be other general processors, digital signal processor (English: Digital Signal Processor, referred to as: DSP), specific integrated circuit (English: Application Specific Integrated Circuit, referred to as: ASIC) etc..General processor can be microprocessor or the processor is also possible to Any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware processor Execute completion, or in processor hardware and software module combination execute completion.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes: read-only memory (English Text: read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, solid state hard disk, tape (English: magnetic Tape), floppy disk (English: floppy disk), CD (English: optical disc) and any combination thereof.
Finally, it should be noted that the above various embodiments is only to illustrate the technical solution of the application, rather than its limitations;To the greatest extent Pipe is described in detail the application referring to foregoing embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, each embodiment technology of the application that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (15)

1. a kind of cipher processing method characterized by comprising
M Crypted password is successively obtained, M is the integer greater than 1;
According to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.
2. the method according to claim 1, wherein further include:
N number of clear crytpographic key is successively obtained, N is integer;
According to the acquisition of N number of clear crytpographic key sequence, the M Crypted password acquisition sequentially, the M Crypted password with And the terminal is decrypted in N number of clear crytpographic key.
3. according to the method described in claim 2, it is characterized in that, described according to the acquisition sequence of N number of clear crytpographic key, institute The terminal is decrypted in acquisition sequence, the M Crypted password and the N number of clear crytpographic key for stating M Crypted password, Include:
If N number of clear crytpographic key is identical as the M Crypted password, and the acquisition sequence of N number of clear crytpographic key and the M The acquisition sequence of a Crypted password is identical, it is determined that terminal deciphering success;Otherwise, it is determined that the terminal deciphering is lost It loses.
4. method according to claim 1-3, which is characterized in that further include:
More new command is obtained, the more new command is used to update the target Crypted password in the M Crypted password;
P clear crytpographic key is successively obtained according to the more new command, P is integer;
It is close that password, the acquisition sequence of the P decoding password, S Crypted password and the S encryption are decoded according to described P Target Crypted password described in the acquisition sequential update of code, the S Crypted password are at least partly adding in M-1 Crypted password Password, the M-1 Crypted password are the Crypted password in the M Crypted password other than the target Crypted password; S≤the M-1.
5. according to the method described in claim 4, it is characterized in that, it is described according to the P decoding password, it is described P decoding Target Crypted password described in the acquisition sequence of password, the acquisition sequential update of S Crypted password and the S Crypted password, is wrapped It includes:
If the P decoding password is identical as the S Crypted password, and the acquisition sequence of the P decoding password and the S The acquisition sequence of a Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that the mesh It marks Crypted password and updates failure.
6. according to the method described in claim 4, it is characterized in that, it is described according to the P decoding password, it is described P decoding Target Crypted password described in the acquisition sequence of password, the acquisition sequential update of S Crypted password and the S Crypted password, is wrapped It includes:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password is updated successfully, Otherwise, it is determined that the target Crypted password is updated and is failed.
7. method according to claim 1-3, which is characterized in that further include:
It obtains and deletes instruction, the target Crypted password for deleting instruction for deleting in the M Crypted password;
P clear crytpographic key is successively obtained according to deletion instruction, P is integer;
It is close that password, the acquisition sequence of the P decoding password, S Crypted password and the S encryption are decoded according to described P The acquisition sequence of code deletes the target Crypted password, and the S Crypted password is at least partly adding in M-1 Crypted password Password, the M-1 Crypted password are the Crypted password in the M Crypted password other than the target Crypted password; S≤the M-1.
8. the method according to the description of claim 7 is characterized in that it is described according to the P decoding password, it is described P decoding The acquisition of the acquisition sequence, S Crypted password and the S Crypted password of password sequentially deletes the target Crypted password, wraps It includes:
If the P decoding password is identical as the S Crypted password, and the acquisition sequence of the P decoding password and the S The acquisition sequence of a Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that the mesh It marks Crypted password and deletes failure.
9. the method according to the description of claim 7 is characterized in that it is described according to the P decoding password, it is described P decoding The acquisition of the acquisition sequence, S Crypted password and the S Crypted password of password sequentially deletes the target Crypted password, wraps It includes:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password is deleted successfully, Otherwise, it is determined that the target Crypted password is deleted and is failed.
10. method according to claim 1-3, which is characterized in that further include:
Addition instruction is obtained, the addition instruction is for adding target Crypted password;
P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
Added according to described P decoding password, the acquisition sequence of the P decoding password, the L Crypted password and the L The acquisition sequence of password adds the target Crypted password, the L Crypted password in the M Crypted password at least Partial encryption password;1≤L≤M.
11. according to the method described in claim 10, it is characterized in that, it is described according to the P decoding password, it is described P solution The acquisition of the acquisition sequence, the L Crypted password and the L Crypted password of code password sequentially add the target encrypt it is close Code, comprising:
If the P decoding password is identical as the L Crypted password, and the acquisition sequence of the P decoding password and the L The acquisition sequence of a Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that the mesh Mark Crypted password addition failure.
12. according to right power want 10 described in method, which is characterized in that it is described according to the P decoding password, it is described P solve The acquisition of the acquisition sequence, the L Crypted password and the L Crypted password of code password sequentially add the target encrypt it is close Code, comprising:
If the P decoding password is identical as the L Crypted password, it is determined that the target Crypted password is added successfully, Otherwise, it is determined that the target Crypted password is added and is failed.
13. method according to claim 1-3, which is characterized in that M Crypted password includes following at least two : sound password, face password, gesture password, iris password.
14. a kind of electronic equipment characterized by comprising processor, the processor are coupled with memory;
The memory is used for, and stores computer program;
The processor is used for, and calls the computer program stored in the memory, to realize any institute of claim 1~13 The method stated.
15. a kind of readable storage medium storing program for executing, which is characterized in that including program or instruction, when described program or instruct on computers When operation, any method of claim 1~13 is performed.
CN201810969584.1A 2018-08-23 2018-08-23 Cipher processing method and equipment Pending CN109241718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810969584.1A CN109241718A (en) 2018-08-23 2018-08-23 Cipher processing method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810969584.1A CN109241718A (en) 2018-08-23 2018-08-23 Cipher processing method and equipment

Publications (1)

Publication Number Publication Date
CN109241718A true CN109241718A (en) 2019-01-18

Family

ID=65069494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810969584.1A Pending CN109241718A (en) 2018-08-23 2018-08-23 Cipher processing method and equipment

Country Status (1)

Country Link
CN (1) CN109241718A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779555A (en) * 2021-09-18 2021-12-10 王亚飞 Password management method and device, electronic equipment and computer readable medium
CN113938284A (en) * 2021-12-16 2022-01-14 佛山职业技术学院 Multi-connection encryption and decryption method, device and system based on gesture displacement

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150207522A1 (en) * 2011-12-30 2015-07-23 Streamscale, Inc. Using parity data for concurrent data authentication, correction, compression, and encryption
CN105046130A (en) * 2015-07-10 2015-11-11 韩文兵 Payment system based on face identification, fingerprint identification and iris identification
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system
CN105608356A (en) * 2015-07-20 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Password generation method and device, password authentication method and device as well as terminal
CN106130729A (en) * 2016-06-21 2016-11-16 深圳天珑无线科技有限公司 A kind of encrypting fingerprint decryption method and encrypting fingerprint decryption system
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150207522A1 (en) * 2011-12-30 2015-07-23 Streamscale, Inc. Using parity data for concurrent data authentication, correction, compression, and encryption
CN105046130A (en) * 2015-07-10 2015-11-11 韩文兵 Payment system based on face identification, fingerprint identification and iris identification
CN105608356A (en) * 2015-07-20 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Password generation method and device, password authentication method and device as well as terminal
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system
CN106130729A (en) * 2016-06-21 2016-11-16 深圳天珑无线科技有限公司 A kind of encrypting fingerprint decryption method and encrypting fingerprint decryption system
CN107743131A (en) * 2017-11-20 2018-02-27 张博 A kind of identity identifying method and device based on a variety of different types input composite sequence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779555A (en) * 2021-09-18 2021-12-10 王亚飞 Password management method and device, electronic equipment and computer readable medium
CN113938284A (en) * 2021-12-16 2022-01-14 佛山职业技术学院 Multi-connection encryption and decryption method, device and system based on gesture displacement

Similar Documents

Publication Publication Date Title
EP3451575B1 (en) Methods, systems and computer program product for providing encryption on a plurality of devices
JP6404336B2 (en) Mobile payment device, method and apparatus based on biometric identification technology
JP6239788B2 (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
US20140245433A1 (en) Password authentication
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
EP2990959B1 (en) Terminal and method for hiding and protecting data information
JP2008047085A (en) Data security system, apparatus and method using usb device
US20160321450A1 (en) Method and Apparatus for Managing Super User Password on Smart Mobile Terminal
CN109241718A (en) Cipher processing method and equipment
US20060225043A1 (en) Debugging device
CN107679391A (en) Data processing method and system for identifying code
WO2017028277A1 (en) Fingerprint recognition method and mobile terminal
CN111008390A (en) Root key generation protection method and device, solid state disk and storage medium
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
CN109617703B (en) Key management method and device, electronic equipment and storage medium
CN109145533B (en) Method and device for protecting code by using random password
CN105550556A (en) Information encryption method and terminal device
CN108052828B (en) Method and device for generating screen recording file, terminal and storage medium
US10445561B2 (en) Binding data to a person's identity
CN107292133B (en) Artificial intelligence confusion technical method and device
CN112636914B (en) Identity verification method, identity verification device and smart card
CN107911820A (en) Secret system data file management method and terminal device
EP2169586A1 (en) Key protecting method and a computing apparatus
Koh et al. Why Joanie can encrypt: Easy email encryption with easy key management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication