CN109241718A - Cipher processing method and equipment - Google Patents
Cipher processing method and equipment Download PDFInfo
- Publication number
- CN109241718A CN109241718A CN201810969584.1A CN201810969584A CN109241718A CN 109241718 A CN109241718 A CN 109241718A CN 201810969584 A CN201810969584 A CN 201810969584A CN 109241718 A CN109241718 A CN 109241718A
- Authority
- CN
- China
- Prior art keywords
- password
- crypted password
- crypted
- target
- decoding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The embodiment of the present application provides a kind of cipher processing method and equipment, comprising: successively obtains M Crypted password, M is the integer greater than 1;According to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.Cipher processing method provided by the embodiments of the present application and equipment, by obtaining multiple Crypted passwords, and terminal is encrypted according to the acquisition of Crypted password sequence, other users will not only know Crypted password in advance, it also needs to obtain encryption order, it could decrypt, password is not easy to be cracked, and improves the safety of terminal.
Description
Technical field
The invention relates to field of computer technology more particularly to a kind of cipher processing method and equipment.
Background technique
Currently, intelligent terminal has become the necessity of user.And the function that intelligent terminal has is more and more, for example pays
Function, on-line banking function etc..These functions all refer to the economic interests of user, if terminal drops into the hand of other users
In, the privacy information of user may be invaded, and economy will receive loss.
To solve the above-mentioned problems, user is that terminal is opened or is respectively provided with into scenes such as the applications or payment of terminal
Password.But current Crypted password is easier to be cracked, so that the safety of terminal is low.
Summary of the invention
The embodiment of the present application provides a kind of cipher processing method and equipment, improves the safety of terminal.
In a first aspect, the embodiment of the present application provides a kind of cipher processing method, comprising:
M Crypted password is successively obtained, M is the integer greater than 1;
According to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.
In a kind of possible design, further includes:
N number of clear crytpographic key is successively obtained, N is integer;
It is close according to the acquisition of N number of clear crytpographic key sequence, the acquisition sequence of the M Crypted password, the M encryption
The terminal is decrypted in code and N number of clear crytpographic key.
It is described according to the acquisition sequence of N number of clear crytpographic key, the M Crypted password in a kind of possible design
Acquisition sequence, the terminal is decrypted in the M Crypted password and N number of clear crytpographic key, comprising:
If N number of clear crytpographic key is identical as the M Crypted password, and N number of clear crytpographic key acquisition sequence with
The acquisition sequence of the M Crypted password is identical, it is determined that terminal deciphering success;Otherwise, it is determined that the terminal
Decryption failure.
In a kind of possible design, further includes:
More new command is obtained, the more new command is used to update the target Crypted password in the M Crypted password;
P clear crytpographic key is successively obtained according to the more new command, P is integer;
Added according to described P decoding password, the acquisition sequence of the P decoding password, S Crypted password and the S
Target Crypted password described in the acquisition sequential update of password, the S Crypted password are at least portion in M-1 Crypted password
Divide Crypted password, the M-1 Crypted password is that the encryption in the M Crypted password other than the target Crypted password is close
Code;S≤the M-1.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially,
Target Crypted password described in the acquisition sequential update of S Crypted password and the S Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the S Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that right
The target Crypted password updates failure.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially,
Target Crypted password described in the acquisition sequential update of S Crypted password and the S Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, it is determined that be updated to the target Crypted password
Function, otherwise, it is determined that the target Crypted password is updated and is failed.
In a kind of possible design, further includes:
It obtains and deletes instruction, the target Crypted password for deleting instruction for deleting in the M Crypted password;
P clear crytpographic key is successively obtained according to deletion instruction, P is integer;
Added according to described P decoding password, the acquisition sequence of the P decoding password, S Crypted password and the S
The acquisition sequence of password deletes the target Crypted password, and the S Crypted password is at least portion in M-1 Crypted password
Divide Crypted password, the M-1 Crypted password is that the encryption in the M Crypted password other than the target Crypted password is close
Code;S≤the M-1.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially,
The acquisition sequence of S Crypted password and the S Crypted password deletes the target Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the S Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that right
The target Crypted password deletes failure.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially,
The acquisition sequence of S Crypted password and the S Crypted password deletes the target Crypted password, comprising:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password delete at
Function, otherwise, it is determined that the target Crypted password is deleted and is failed.
In a kind of possible design, further includes:
Addition instruction is obtained, the addition instruction is for adding target Crypted password;
P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
Acquisition sequence, the L Crypted password and the L of password, the P decoding password are decoded according to described P
The acquisition sequence of a Crypted password adds the target Crypted password, and the L Crypted password is in the M Crypted password
At least partly Crypted password;1≤L≤M.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially,
The acquisition sequence of the L Crypted password and the L Crypted password adds the target Crypted password, comprising:
If the P decoding password is identical as the L Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that right
The target Crypted password addition failure.
In a kind of possible design, it is described according to described P decode password, it is described P decoding password acquisition sequentially,
The acquisition sequence of the L Crypted password and the L Crypted password adds the target Crypted password, comprising:
If the P decoding password is identical as the L Crypted password, it is determined that the target Crypted password addition at
Function, otherwise, it is determined that the target Crypted password is added and is failed.
In a kind of possible design, M Crypted password includes following at least two: sound password, face password, gesture
Password, iris password.
Second aspect, the embodiment of the present application provide a kind of encryption processing apparatus, comprising:
Module is obtained, for successively obtaining M Crypted password, M is the integer greater than 1;
Processing module carries out terminal using M Crypted password for the acquisition sequence according to the M Crypted password
Encryption.
In a kind of possible design, in a kind of possible design, the acquisition module is also used to successively obtain N number of
Clear crytpographic key, N are integer;
The processing module is also used to be obtained according to the acquisition of N number of clear crytpographic key sequence, the M Crypted password
Take sequence, the M Crypted password and N number of clear crytpographic key that the terminal is decrypted.
The processing module, is specifically used for: if N number of clear crytpographic key is identical as the M Crypted password, and the N
The acquisition sequence of a clear crytpographic key is identical as the acquisition sequence of the M Crypted password, it is determined that terminal deciphering success;
Otherwise, it is determined that fail to the terminal deciphering.
In a kind of possible design, the acquisition module is also used to obtain more new command, and the more new command is for more
Target Crypted password in the new M Crypted password;And P clear crytpographic key, P are successively obtained according to the more new command
For integer;
The processing module, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P
Target Crypted password described in the acquisition sequential update of Crypted password and the S Crypted password, the S Crypted password are M-1
At least partly Crypted password in a Crypted password, the M-1 Crypted password are in the M Crypted password in addition to the mesh
Mark the Crypted password outside Crypted password;S≤the M-1.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the S Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that right
The target Crypted password updates failure.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, it is determined that be updated to the target Crypted password
Function, otherwise, it is determined that the target Crypted password is updated and is failed.
In a kind of possible design, the acquisition module is also used to: being obtained and is deleted instruction, the deletion instruction is used for
Delete the target Crypted password in the M Crypted password;And P clear crytpographic key is successively obtained according to deletion instruction,
P is integer;
The processing module, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P
The acquisition sequence of Crypted password and the S Crypted password deletes the target Crypted password, and the S Crypted password is M-1
At least partly Crypted password in a Crypted password, the M-1 Crypted password are in the M Crypted password in addition to the mesh
Mark the Crypted password outside Crypted password;S≤the M-1.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the S Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that right
The target Crypted password deletes failure.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password delete at
Function, otherwise, it is determined that the target Crypted password is deleted and is failed.
In a kind of possible design, the acquisition module is also used to: obtaining addition instruction, the addition instruction is used for
Add target Crypted password;And P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
The processing module, is also used to: decoding password, the acquisition sequence of the P decoding password, institute according to described P
The acquisition sequence for stating L Crypted password and the L Crypted password adds the target Crypted password, the L Crypted password
For at least partly Crypted password in the M Crypted password;1≤L≤M.
In a kind of possible design, the processing module, also particularly useful for:
If the P decoding password is identical as the L Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that right
The target Crypted password addition failure.
In a kind of possible design, the processing module, also particularly useful for: if the P decoding password and the L
Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that adds to the target Crypted password
Add failure.
In a kind of possible design, M Crypted password includes following at least two: sound password, face password, gesture
Password, iris password.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, comprising: processor, the processor and memory
Coupling;
The memory is used for, and stores computer program;
The processor is used for, and calls the computer program stored in the memory, to realize claim first party
Method described in any design in face.
Fourth aspect, the embodiment of the present application provide a kind of readable storage medium storing program for executing, readable storage medium storing program for executing and computer instruction, institute
Computer instruction is stated to be stored in the readable storage medium storing program for executing;The computer instruction mentions for realizing any design of first aspect
The method of confession.
5th aspect, the embodiment of the present application provide a kind of program product, which includes that computer instruction (calculates
Machine program), which is stored in readable storage medium storing program for executing.At least one processor of electronic equipment can be deposited from readable
Storage media reads the computer instruction, at least one processor executes the computer instruction and electronic equipment is made to implement first aspect
The method that any design provides.
In the application, terminal is encrypted by obtaining multiple Crypted passwords, and according to the acquisition of Crypted password sequence,
Other users will not only know Crypted password in advance, it is also necessary to encryption order obtained, could be decrypted, password is not easy to be cracked,
Improve the safety of terminal.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this Shen
Some embodiments please for those of ordinary skill in the art without any creative labor, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart one of cipher processing method provided by the embodiments of the present application;
Fig. 2A is user interface schematic diagram one provided by the embodiments of the present application;
Fig. 2 B is user interface schematic diagram two provided by the embodiments of the present application;
Fig. 2 C is user interface schematic diagram three provided by the embodiments of the present application;
Fig. 3 is the flowchart 2 of cipher processing method provided by the embodiments of the present application;
Fig. 4 is the flow chart 3 of cipher processing method provided by the embodiments of the present application;
Fig. 5 A is user interface schematic diagram four provided by the embodiments of the present application;
Fig. 5 B is user interface schematic diagram five provided by the embodiments of the present application;
Fig. 5 C is user interface schematic diagram six provided by the embodiments of the present application;
Fig. 5 D is user interface schematic diagram seven provided by the embodiments of the present application;
Fig. 6 is the flow chart four of cipher processing method provided by the embodiments of the present application;
Fig. 7 A is user interface schematic diagram eight provided by the embodiments of the present application;
Fig. 7 B is user interface schematic diagram nine provided by the embodiments of the present application;
Fig. 7 C is user interface schematic diagram ten provided by the embodiments of the present application;
Fig. 8 is the flow chart five of cipher processing method provided by the embodiments of the present application;
Fig. 9 A is user interface schematic diagram 11 provided by the embodiments of the present application;
Fig. 9 B is user interface schematic diagram 12 provided by the embodiments of the present application;
Fig. 9 C is user interface schematic diagram 13 provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram of encryption processing apparatus provided by the embodiments of the present application;
Figure 11 is the structural schematic diagram of electronic equipment provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
All other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
Fig. 1 is the flow chart one of cipher processing method provided by the embodiments of the present application, referring to Fig. 1, the method for the present embodiment
Include:
Step S101, M Crypted password is successively obtained, M is the integer greater than 1;
Step S102, according to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.
Specifically, the executing subject in this implementation is encryption processing apparatus, and the encryption processing apparatus is settable in the terminal.
M Crypted password in the present embodiment includes following at least two: sound password, face password, gesture password, iris password,
Pattern password, finger-print cipher and password symbol.
The not sequence of conditioning step S101 and step S102 in the present embodiment.
A kind of possible embodiment: terminal first obtains M Crypted password, and M is the integer greater than 1;Then, terminal according to
The acquisition sequence of M Crypted password of acquisition and M Crypted password encrypts terminal using M Crypted password.
Specifically, user sequentially inputs M Crypted password, for example, M Crypted password include gesture password, sound password,
The camera of face password, terminal is opened, and user does a gesture, and terminal collects the gesture, gets gesture password;It connects
, user says one section of voice, and terminal collects this section of voice, gets sound password, and then the camera of terminal is used current
The face at family is shot, and face password is got.Terminal successively gets gesture password, sound password, face password, and terminal is pressed
Terminal is encrypted according to the sequence of gesture password, sound password, face password.
Fig. 2A is user interface schematic diagram one provided by the embodiments of the present application;Fig. 2 B is user provided by the embodiments of the present application
Interface schematic diagram two;Fig. 2 C is user interface schematic diagram three provided by the embodiments of the present application.A referring to fig. 2, user do a hand
Gesture, terminal acquire the gesture, and after user's click determines, terminal gets gesture password and shows interface shown in Fig. 2 B, then
User clicks determination after saying one section of voice, and terminal gets sound password, and shows interface shown in fig. 2 C, and terminal starts at this time
The facial image for acquiring user, gets face password;It is worth noting that the collected facial image of terminal is actually true
Real facial image, so being a kind of signal of facial image in Fig. 2 C.
Alternatively possible embodiment: terminal obtains the 1st Crypted password, terminal using the 1st Crypted password into
Row encryption, terminal obtain the 2nd Crypted password, and terminal is encrypted using the 2nd Crypted password, repeated the above process, directly
M-th Crypted password is got to terminal, and is encrypted using the m-th Crypted password.
For example, M Crypted password includes sound password, face password, iris password, user says one section of voice, and terminal is adopted
Collect this section of voice, gets sound password, and encrypt to terminal using the sound password;Then, the camera of terminal
It opens, the face of active user is shot, get face password, and encrypt to terminal using the face password;So
The iris information of terminal acquisition user afterwards is got iris password, and is encrypted using the iris password to terminal.It can manage
Solution, terminal at this time are that the terminal of function is acquired with iris information.
Optionally, the acquisition sequence of M Crypted password and the priority orders of M Crypted password are in inverse ratio.
The method of the present embodiment processing password is suitable for but is not limited to the scene for needing to encrypt as follows, and user opens terminal
It opens and is encrypted, the payment function of terminal is encrypted, the opening of terminal applies is encrypted.
In the present embodiment, terminal is added by obtaining multiple Crypted passwords, and according to the acquisition of Crypted password sequence
Close, other users will not only know Crypted password in advance, it is also necessary to obtain encryption order, could decrypt, password is not easy to be broken
Solution, improves the safety of terminal.
It is illustrated below with reference to cipher processing method of the decrypting process to the application.
Fig. 3 is the flowchart 2 of cipher processing method provided by the embodiments of the present application, referring to Fig. 3, the method for the present embodiment
Include:
Step S201, M Crypted password is successively obtained, M is the integer greater than 1;
Step S202, according to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password;
Step S203, N number of clear crytpographic key is successively obtained, N is integer;
Step S204, according to the acquisition of N number of clear crytpographic key sequence, M Crypted password acquisition sequentially, M Crypted password
And terminal is decrypted in N number of clear crytpographic key.
Specifically, step S201~step S202 is referring to step S101~step S102 in a upper embodiment, this implementation
Example repeats no more.
For step S203~step S204, the scene of decryption is with the scene encrypted, if user carries out the unlatching of terminal
Encryption needs successful decryption, could open terminal when then user opens terminal;If user carries out the payment function of terminal
Encryption needs successful decryption, just can be carried out payment when then user uses the payment function of terminal.
Specifically, after the completion of terminal uses M password encryption, in user's decryption, terminal successively obtains user's input
N number of clear crytpographic key, and according to the acquisition of N number of clear crytpographic key sequence, M Crypted password acquisition sequentially, M Crypted password with
And terminal is decrypted in N number of clear crytpographic key.
It is understood that if N number of clear crytpographic key is identical as M Crypted password (at this point, M=N), and N number of clear crytpographic key
Acquisition sequence it is identical as the acquisition sequence of M Crypted password, it is determined that terminal deciphering successfully;Alternatively, if N number of clear crytpographic key
It is identical as M Crypted password, it is determined that terminal deciphering success.
If N number of clear crytpographic key and M Crypted password be not identical, and/or, the acquisition sequence of N number of clear crytpographic key is encrypted with M
The acquisition sequence of password is not identical, it is determined that fails to terminal deciphering.At this point, N≤M
Manner of decryption has following but is not limited to following several modes.
First way, terminal can first obtain N number of clear crytpographic key, after the completion of acquisition, start to judge N number of clear crytpographic key with
Whether M Crypted password be identical, if so, determining to terminal deciphering success.
Which is suitable for the scene of terminal automatic collection when terminal obtains clear crytpographic key, for example M Crypted password is behaved
Face password and iris password;Alternatively, terminal needs to provide the scene at corresponding interface, such as M encryption when obtaining clear crytpographic key
Password is pattern password, face password and iris password.
The second way, terminal can first obtain N number of clear crytpographic key, after the completion of acquisition, start to judge N number of clear crytpographic key with
Whether M Crypted password be identical, if so, continuing to judge that the acquisition sequence of N number of clear crytpographic key is suitable with the acquisition of M Crypted password
Whether sequence is identical, if so, determining to terminal deciphering success.
The third mode, terminal first obtain first clear crytpographic key, if first clear crytpographic key and the when terminal encryption
The Crypted password of one acquisition is identical, then obtains second clear crytpographic key again, if when second clear crytpographic key and terminal encryption
The Crypted password of second acquisition is identical, then repeats the above process, until determining close to terminal deciphering success or N decryption
Code and the Crypted password that n-th when terminal encryption obtains be not identical, determines and fails to terminal deciphering.
4th kind of mode, terminal according to Crypted password acquisition sequence judge in preset duration, if got with
The identical clear crytpographic key of respective encrypted password, if not, it is determined that fail to terminal deciphering, if so, continuing according to Crypted password
Acquisition sequence judge in preset duration, if got clear crytpographic key identical with respective encrypted password, alternatively, determination
Terminal deciphering success.
Illustratively, if M Crypted password is gesture password, sound password, face password, and acquisition sequence is followed successively by hand
Gesture password, sound password, face password.
When user wants decryption, if terminal is got the current gesture of user (the first clear crytpographic key) first, and current
Gesture (the first Crypted password) for encryption of gesture and terminal storage it is identical, then show the first information to user, first
The gesture of information alert user input is correct, can start to input next clear crytpographic key;Then, if terminal collects the language of user
Sound, and (second adds the information of the voice for encryption of the information (the second clear crytpographic key) of collected voice and terminal storage
Password) it is identical, then the second information is shown to user, the voice of the second information alert user input is correct, can start under input
One clear crytpographic key;Then, if terminal collects the facial image (third clear crytpographic key) of active user, and the face of active user
The facial image for encryption of image and terminal storage it is identical (third Crypted password, i.e., current collected active user's
The similarity of facial image and the facial image for encryption of terminal storage is greater than preset threshold, then it is assumed that current collected
The facial image of active user is identical as the facial image for encryption of terminal storage, rear same), then terminal determination is decrypted into
Function, that is, terminal are successfully opened, and perhaps application is successfully entered or is paid successfully.Wherein, the information of voice includes language
The corresponding text of acoustic feature and voice of sound, the information of two voices is identical, refers to that acoustic feature is identical, and voice converts
Text afterwards is identical.
In the examples described above, if user want decryption, terminal first it is collected be user voice, then directly determine
This time decryption failure.
In the examples described above, if user wants decryption, terminal does not collect gesture in preset duration, then directly really
Fixed this time decryption failure.
In the present embodiment, terminal is added by obtaining multiple Crypted passwords, and according to the acquisition of Crypted password sequence
Close, so that terminal is in decryption, the clear crytpographic key of acquisition is identical with Crypted password, and in most cases, obtains decryption
The sequence of password needs the acquisition sequence with Crypted password identical, and terminal just determines successful decryption, therefore the requirement of terminal deciphering
It is relatively high, improve the safety of terminal.
The renewal process of password is illustrated using specific embodiment below.
Fig. 4 is the flow chart 3 of cipher processing method provided by the embodiments of the present application, referring to fig. 4, the method for the present embodiment
Include:
Step S301, more new command is obtained, more new command is used to update the target Crypted password in M Crypted password;
Step S302, P clear crytpographic key is successively obtained according to more new command, P is integer;
Step S303, acquisition sequence, S Crypted password and the S encryption for decoding password according to P decoding password, P are close
The acquisition sequential update target Crypted password of code, S Crypted password are at least partly Crypted password in M-1 Crypted password,
The M-1 Crypted password is the Crypted password in M Crypted password other than the target Crypted password;S≤M-1.
Specifically, when user wants to update a certain Crypted password, which is known as target Crypted password, and user is defeated
Enter more new command, user can click the icon of the more new password in user interface, and terminal shows input new password to user
Interface, user input new password after, just have input more new command, terminal receives the more new command, and more new command is true according to this
Fixed Crypted password to be updated is the target Crypted password and the updated new password of target Crypted password;At this point, can also
To say more new command for first object Crypted password to be updated to the second target Crypted password, first object Crypted password is M
Crypted password to be updated in a Crypted password.
Terminal shows that third information, third information are used to indicate user and input P decryption according to the more new command, to user
Password, user inputs P clear crytpographic key, after terminal obtains P decoding password, decodes password according to P decoding password, P
The acquisition sequential update target Crypted password of acquisition sequence, S Crypted password and S Crypted password, S Crypted password are M-1
At least partly Crypted password in a Crypted password, the M-1 Crypted password are in M Crypted password in addition to target encryption is close
Crypted password outside code, S≤M-1.
Even P decoding password is identical as the S Crypted password, and the acquisition sequence of P decoding password is close with this S encryption
The acquisition sequence of code is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that more to the target Crypted password
New failure.Alternatively,
If P decoding password is identical as the S Crypted password, it is determined that be updated successfully to target Crypted password, otherwise, then
It determines to update target Crypted password and fail.
Wherein, terminal obtains P and decodes the mode of password referring to decrypting corresponding four kinds of modes in embodiment shown in Fig. 3
The acquisition modes of middle clear crytpographic key repeat no more in the present embodiment.
Specifically, in P decoding password situation identical with the S Crypted password, P decoding password can be M-1
Any P Crypted password in Crypted password, M-1 Crypted password are in M above-mentioned Crypted password in addition to above-mentioned target adds
The Crypted password of password, at this point, P=S.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption
P Crypted password of the acquisition sequence after the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close
In addition to the Crypted password of above-mentioned target Crypted password in code, at this point, P=S.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption
P Crypted password of the acquisition sequence before the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close
In addition to the Crypted password of above-mentioned target Crypted password in code, at this point, P=S.
Illustratively, it if M Crypted password is gesture password, sound password, face password and iris password, and obtains suitable
Sequence is gesture password, sound password, face password and iris password.Sound password is target Crypted password to be updated, above-mentioned S
A Crypted password can be face password and iris password, alternatively, gesture password or gesture password, face password, iris password
At least one of.
Below by taking S Crypted password is face password and iris password as an example, illustrate that the example updates the mistake of sound password
Journey.Fig. 5 A is user interface schematic diagram four provided by the embodiments of the present application, and Fig. 5 B is user interface provided by the embodiments of the present application
Schematic diagram five, Fig. 5 C are user interface schematic diagram six provided by the embodiments of the present application, and Fig. 5 D is use provided by the embodiments of the present application
Family interface schematic diagram seven;Referring to Fig. 5 A, user clicks the icon of more new password in interface, and interface becomes Fig. 5 B, user's click sound
This icon of sound password, interface become Fig. 5 C, show " please input new sound password " in interface, user say again one section it is new
Voice, terminal receive the new voice and just have input more new command, terminal is according to the more new command, boundary after user's click determines
Face becomes Fig. 5 D, can show " verifying ", and being somebody's turn to do " verifying " can be above-mentioned third information;At this point, terminal can be according to
The secondary facial image (the first clear crytpographic key) and iris information (the second clear crytpographic key) for obtaining active user, if the first clear crytpographic key
It is identical as facial image (the first Crypted password) of storage, and (the second encryption is close for the second clear crytpographic key and the iris password of storage
Code) it is identical that (similarity of the iris information for encryption of the iris information and terminal storage of the active user obtained is greater than
When preset threshold, then it is assumed that the second clear crytpographic key is identical as the second Crypted password, rear same), it is determined that the sound password update
Success, updated sound password is the corresponding sound password of the received new voice of terminal.
It is understood that can also determine that P decoding password is identical as the S Crypted password, and P decodes password
After acquisition sequence is identical as the acquisition sequence of the S Crypted password, then obtain the updated Crypted password of target Crypted password.Or
Person is after determining that P decoding password is identical as the S Crypted password, then obtains the updated Crypted password of target Crypted password.
At this point, more new command indicates that password to be updated is the target Crypted password in M Crypted password.
In the present embodiment when updating Crypted password, need it is identical as S Crypted password in P decoding password of acquisition and
The acquisition sequence of P decoding password is identical as the acquisition sequence of S Crypted password, alternatively, in the P decoding password and S of acquisition
A Crypted password can be just successfully updated when identical, it is therefore prevented that other users arbitrarily distort password, improve the safety of terminal.
The deletion process of password is illustrated using specific embodiment below.
Fig. 6 is the flow chart four of cipher processing method provided by the embodiments of the present application, referring to Fig. 6, the method for the present embodiment
Include:
Step S401, it obtains and deletes instruction, delete instruction for deleting the target Crypted password in M Crypted password;
Step S402, according to instruction successively P clear crytpographic key of acquisition is deleted, P is integer;
Step S403, acquisition sequence, S Crypted password and the S encryption for decoding password according to P decoding password, P are close
The acquisition sequence delete target Crypted password of code, S Crypted password are at least partly Crypted password in M-1 Crypted password,
The M-1 Crypted password is the Crypted password in M Crypted password other than the target Crypted password;S≤M-1.
Specifically, when user wants to delete a certain Crypted password, it is close which is known as target encryption
Code, user, which inputs, deletes instruction, and user can click the icon of the deletion password in user interface, and instruction is deleted in input, eventually
End receives deletion instruction, determines that Crypted password to be deleted is the target Crypted password according to deletion instruction.
Terminal is instructed according to the deletion, shows that third information, third information are used to indicate user and input P decryption to user
Password, user inputs P clear crytpographic key, after terminal obtains P decoding password, according to according to P decoding password, P decryption
The acquisition sequence delete target Crypted password of the acquisition sequence of code, S Crypted password and S Crypted password, S Crypted password be
At least partly Crypted password in M-1 Crypted password, the M-1 Crypted password are in M Crypted password in addition to the target adds
Crypted password outside password.
Even P decoding password is identical as the S Crypted password, and the acquisition sequence of P decoding password is close with this S encryption
The acquisition sequence of code is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that delete to the target Crypted password
Except failure.Alternatively,
If P decoding password is identical as the S Crypted password, it is determined that delete successfully target Crypted password, otherwise, then
It determines to delete target Crypted password and fail.
Wherein, terminal obtains P and decodes the mode of password referring to decrypting corresponding four kinds of modes in embodiment shown in Fig. 3
The acquisition modes of middle clear crytpographic key repeat no more in the present embodiment.
Specifically, in P decoding password situation identical with the S Crypted password, P decoding password can be M-1
Any P Crypted password in Crypted password, M-1 Crypted password are in M above-mentioned Crypted password in addition to above-mentioned target adds
The Crypted password of password.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption
P Crypted password of the acquisition sequence after the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close
In addition to the Crypted password of above-mentioned target Crypted password in code.
In P decoding password situation identical with the S Crypted password, P decoding password can also be close for M-1 encryption
P Crypted password of the acquisition sequence before the target Crypted password in code, M-1 Crypted password are that M above-mentioned encryption is close
In addition to the Crypted password of above-mentioned target Crypted password in code.
Illustratively, it if M Crypted password is face password, sound password, gesture password and iris password, and obtains suitable
Sequence is face password, sound password, gesture password and iris password.Sound password be target Crypted password to be deleted, then on
Stating S Crypted password can be gesture password and iris password, alternatively, face password or face password, gesture password, iris
At least one of password.
Below by taking S Crypted password is gesture password and iris password as an example, illustrate that the example deletes the mistake of sound password
Journey.Fig. 7 A is user interface schematic diagram eight provided by the embodiments of the present application, and Fig. 7 B is user interface provided by the embodiments of the present application
Schematic diagram nine, Fig. 7 C are user interface schematic diagram ten provided by the embodiments of the present application;Referring to Fig. 7 A, user clicks to delete in interface
Password icon, interface become Fig. 7 B, this icon of user's click sound password just has input deletion instruction, and interface becomes Fig. 7 C,
" verifying " can be shown, being somebody's turn to do " verifying " can be above-mentioned third information;At this point, if user makes a gesture, phase
When in inputting the first clear crytpographic key, terminal obtains first clear crytpographic key, and terminal obtains the iris information of active user again, quite
In obtaining the second clear crytpographic key, if terminal determines gesture password (the first Crypted password) phase of the first clear crytpographic key with storage
Together, the second clear crytpographic key is identical as iris password (the second Crypted password) of storage, and determination is first to obtain above-mentioned first
Clear crytpographic key obtains the second above-mentioned clear crytpographic key again, it is determined that deletes successfully the sound password.
In the present embodiment when deleting Crypted password, need it is identical as S Crypted password in P decoding password of acquisition and
The acquisition sequence of P decoding password is identical as the acquisition sequence of S Crypted password, alternatively, in the P decoding password and S of acquisition
A Crypted password could be deleted successfully when identical, it is therefore prevented that other users arbitrarily delete password, improve the safety of terminal.
The adding procedure of password is illustrated using specific embodiment below.
Fig. 8 is the flow chart five of cipher processing method provided by the embodiments of the present application, referring to Fig. 8, the method for the present embodiment
Include:
Step S501, addition instruction is obtained, addition instruction is for adding target Crypted password;
Step S502, P clear crytpographic key is successively obtained according to addition instruction, P is integer;
Step S503, acquisition sequence, L Crypted password and the L encryption for decoding password according to P decoding password, P are close
The acquisition sequence of code adds the target Crypted password, and L Crypted password is at least partly encryption in M above-mentioned Crypted password
Password;1≤L≤M.
Specifically, when user wants addition Crypted password, which is known as target Crypted password, uses
Family input addition instruction, user can click the icon in user interface, input addition instruction, and terminal shows to user and inputs
The interface for adding target Crypted password after user inputs target Crypted password to be added, just has input addition instruction;Terminal connects
Addition instruction is received, target Crypted password to be added is determined according to addition instruction.
Terminal is instructed according to the addition, shows that third information, third information are used to indicate user and input P decryption to user
Password, user inputs P clear crytpographic key, after terminal obtains P decoding password, decodes password according to P decoding password, P
The acquisition sequence addition target Crypted password of acquisition sequence, L Crypted password and L Crypted password, 1≤L≤M.L encryption is close
Code is at least partly Crypted password in M above-mentioned Crypted password.
Even P decoding password is identical as the L Crypted password, and the acquisition sequence of P decoding password is close with this L encryption
The acquisition sequence of code is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that add to the target Crypted password
Add failure.Alternatively,
If P decoding password is identical as the L Crypted password, it is determined that added successfully to target Crypted password, otherwise, then
It determines to add target Crypted password and fail.
Wherein, terminal obtains P and decodes the mode of password referring to decrypting corresponding four kinds of modes in embodiment shown in Fig. 3
The acquisition modes of middle clear crytpographic key repeat no more in the present embodiment.
Specifically, in P decoding password situation identical with the L Crypted password, P=L, P decoding password can be M
Any P Crypted password in a Crypted password.
Illustratively, if M Crypted password is gesture password, sound password and face password, and acquisition sequence is gesture
Password, sound password and face password, then above-mentioned P Crypted password can be in gesture password, sound password and face password
At least one of.
It is below gesture password, for sound password and face password by L Crypted password, illustrates that the example updates sound
The process of password.Fig. 9 A is user interface schematic diagram 11 provided by the embodiments of the present application, and Fig. 9 B provides for the embodiment of the present application
User interface schematic diagram 12, Fig. 9 C be user interface schematic diagram 13 provided by the embodiments of the present application;Referring to Fig. 9 A, user
It clicks and adds password icon in interface, interface becomes Fig. 9 B, can show " please input password ", and after user's input, interface becomes figure
9C can show " verifying ", and being somebody's turn to do " verifying " can be above-mentioned third information;At this point, if terminal gets use first
The current gesture in family (the first clear crytpographic key), and the hand for encryption of current gesture (the first clear crytpographic key) and terminal storage
Gesture (the-the first Crypted password of gesture password) is identical, then shows that the first information, the first information prompt the gesture of user's input to user
Correctly, can start to input next clear crytpographic key;Then, if terminal collects the voice of user, and the information of collected voice
(the second clear crytpographic key) is identical as information (the-the second Crypted password of sound password) of voice for encryption of terminal storage, then
The second information is shown to user, and the voice of the second information alert user input is correct, can start to input next clear crytpographic key;It connects
, if terminal collects the facial image (third Crypted password) of active user, and facial image (the third decryption of active user
Password) it is identical as facial image (the face password-third Crypted password) for encryption of terminal storage, then terminal determines 3
Decoding password is identical as 3 Crypted passwords, the acquisition sequence phase of the acquisition sequence and 3 Crypted passwords of 3 decoding passwords
Together, then the success of target Crypted password is added.
It is understood that can also determine that if P decoding password is identical as the L Crypted password, and P decoding password
Acquisition sequence it is identical as the acquisition sequence of the L Crypted password after, then obtain target Crypted password.Or determining P solution
After code password is identical as the L Crypted password, then obtain the updated Crypted password of target Crypted password.
In the present embodiment when adding Crypted password, need it is identical as L Crypted password in P decoding password of acquisition and
The acquisition sequence of P decoding password is identical as the acquisition sequence of L Crypted password, alternatively, in the P decoding password and L of acquisition
A Crypted password can be just successfully updated when identical, it is therefore prevented that other users arbitrarily add password, improve the safety of terminal.
Figure 10 is the structural schematic diagram one of encryption processing apparatus provided by the embodiments of the present application, referring to Figure 10, the present embodiment
Device include: to obtain module 11 and processing module 12;
Module 11 is obtained, for successively obtaining M Crypted password, M is the integer greater than 1;
Processing module 12, for according to the acquisition of M Crypted password sequence, using M Crypted password to terminal into
Row encryption.
Optionally, M Crypted password includes following at least two: sound password, face password, gesture password, iris are close
Code.
Encryption processing apparatus provided by the embodiments of the present application can execute skill shown in above-mentioned embodiment of the method shown in FIG. 1
Art scheme, realization principle and beneficial effect are similar, are no longer repeated herein.
In a kind of possible design, the acquisition module 11 is also used to successively obtain N number of clear crytpographic key, and N is integer;
The processing module 12 is also used to according to the acquisition of N number of clear crytpographic key sequence, the M Crypted password
The terminal is decrypted in acquisition sequence, the M Crypted password and N number of clear crytpographic key.
The processing module 12, is specifically used for: if N number of clear crytpographic key and the M Crypted password are identical and described
N number of clear crytpographic key acquisition sequence it is identical as the acquisition sequence of the M Crypted password, it is determined that the terminal deciphering at
Function;Otherwise, it is determined that fail to the terminal deciphering.
In a kind of possible design, the acquisition module 11 is also used to obtain more new command, and the more new command is used for
Update the target Crypted password in the M Crypted password;And P clear crytpographic key is successively obtained according to the more new command,
P is integer;
The processing module 12, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P
Target Crypted password described in the acquisition sequential update of a Crypted password and the S Crypted password, the S Crypted password are M-
At least partly Crypted password in 1 Crypted password, the M-1 Crypted password are in the M Crypted password in addition to described
Crypted password outside target Crypted password;S≤the M-1.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the S Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that right
The target Crypted password updates failure.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the S Crypted password, it is determined that be updated to the target Crypted password
Function, otherwise, it is determined that the target Crypted password is updated and is failed.
In a kind of possible design, the acquisition module 11 is also used to: being obtained and is deleted instruction, the deletion instruction is used
Target Crypted password in the deletion M Crypted password;And successively P decryption of acquisition is close according to deletion instruction
Code, P is integer;
The processing module 12, is also used to: decoding password, the acquisition sequence of the P decoding password, S according to described P
The acquisition sequence of a Crypted password and the S Crypted password deletes the target Crypted password, and the S Crypted password is M-
At least partly Crypted password in 1 Crypted password, the M-1 Crypted password are in the M Crypted password in addition to described
Crypted password outside target Crypted password;S≤the M-1.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the S Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the S Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that right
The target Crypted password deletes failure.
In a kind of possible design, the processing module 12, also particularly useful for:
If identical as the S Crypted password for the P decoding password, it is determined that deleted to the target Crypted password
Except success, otherwise, it is determined that the target Crypted password is deleted and is failed.
In a kind of possible design, the acquisition module 11 is also used to: obtaining addition instruction, the addition instruction is used
In addition target Crypted password;And P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
The processing module 12, is also used to: according to described P decode password, it is described P decoding password acquisition sequentially,
The acquisition sequence of the L Crypted password and the L Crypted password adds the target Crypted password, and the L encryption is close
Code is at least partly Crypted password in the M Crypted password;1≤L≤M.
In a kind of possible design, the processing module 12, also particularly useful for:
If the P decoding password is identical as the L Crypted password, and it is described P decoding password acquisition sequence with
The acquisition sequence of the L Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that right
The target Crypted password addition failure.
In a kind of possible design, the processing module 12, also particularly useful for: if the P decoding password and the L
A Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that the target Crypted password
Addition failure.
Encryption processing apparatus provided by the embodiments of the present application can execute technical solution shown in above method embodiment,
Realization principle and beneficial effect are similar, are no longer repeated herein.
Figure 11 is the structural schematic diagram of electronic equipment provided by the embodiments of the present application, including processor 21,22 and of memory
Communication bus 23, communication bus 23 are used for the connection of each electronic device, wherein
Memory 22, for storing program;
Processor 21, for executing the described program of the memory storage, to realize terminal in above method embodiment
The corresponding method of equipment.
The embodiment of the present application provides a kind of readable storage medium storing program for executing, including program or instruction, when described program or instruction are being counted
When running on calculation machine, the method in above method embodiment is performed.
The embodiment of the present application also provides a kind of program product, which includes computer instruction (i.e. computer journey
Sequence), which is stored in readable storage medium storing program for executing.At least one processor of electronic equipment can be from readable storage
Medium reads the computer instruction, at least one processor executes the computer instruction and electronic equipment is made to implement aforementioned any reality
The cipher processing method of example offer is provided.
Above-mentioned electronic equipment in the specific implementation, it should be understood that processor can be central processing unit (English:
Central Processing Unit, referred to as: CPU), can also be other general processors, digital signal processor (English:
Digital Signal Processor, referred to as: DSP), specific integrated circuit (English: Application Specific
Integrated Circuit, referred to as: ASIC) etc..General processor can be microprocessor or the processor is also possible to
Any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware processor
Execute completion, or in processor hardware and software module combination execute completion.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to
The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey
When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned includes: read-only memory (English
Text: read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, solid state hard disk, tape (English: magnetic
Tape), floppy disk (English: floppy disk), CD (English: optical disc) and any combination thereof.
Finally, it should be noted that the above various embodiments is only to illustrate the technical solution of the application, rather than its limitations;To the greatest extent
Pipe is described in detail the application referring to foregoing embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, each embodiment technology of the application that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (15)
1. a kind of cipher processing method characterized by comprising
M Crypted password is successively obtained, M is the integer greater than 1;
According to the acquisition of M Crypted password sequence, terminal is encrypted using M Crypted password.
2. the method according to claim 1, wherein further include:
N number of clear crytpographic key is successively obtained, N is integer;
According to the acquisition of N number of clear crytpographic key sequence, the M Crypted password acquisition sequentially, the M Crypted password with
And the terminal is decrypted in N number of clear crytpographic key.
3. according to the method described in claim 2, it is characterized in that, described according to the acquisition sequence of N number of clear crytpographic key, institute
The terminal is decrypted in acquisition sequence, the M Crypted password and the N number of clear crytpographic key for stating M Crypted password,
Include:
If N number of clear crytpographic key is identical as the M Crypted password, and the acquisition sequence of N number of clear crytpographic key and the M
The acquisition sequence of a Crypted password is identical, it is determined that terminal deciphering success;Otherwise, it is determined that the terminal deciphering is lost
It loses.
4. method according to claim 1-3, which is characterized in that further include:
More new command is obtained, the more new command is used to update the target Crypted password in the M Crypted password;
P clear crytpographic key is successively obtained according to the more new command, P is integer;
It is close that password, the acquisition sequence of the P decoding password, S Crypted password and the S encryption are decoded according to described P
Target Crypted password described in the acquisition sequential update of code, the S Crypted password are at least partly adding in M-1 Crypted password
Password, the M-1 Crypted password are the Crypted password in the M Crypted password other than the target Crypted password;
S≤the M-1.
5. according to the method described in claim 4, it is characterized in that, it is described according to the P decoding password, it is described P decoding
Target Crypted password described in the acquisition sequence of password, the acquisition sequential update of S Crypted password and the S Crypted password, is wrapped
It includes:
If the P decoding password is identical as the S Crypted password, and the acquisition sequence of the P decoding password and the S
The acquisition sequence of a Crypted password is identical, it is determined that is updated successfully to the target Crypted password, otherwise, it is determined that the mesh
It marks Crypted password and updates failure.
6. according to the method described in claim 4, it is characterized in that, it is described according to the P decoding password, it is described P decoding
Target Crypted password described in the acquisition sequence of password, the acquisition sequential update of S Crypted password and the S Crypted password, is wrapped
It includes:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password is updated successfully,
Otherwise, it is determined that the target Crypted password is updated and is failed.
7. method according to claim 1-3, which is characterized in that further include:
It obtains and deletes instruction, the target Crypted password for deleting instruction for deleting in the M Crypted password;
P clear crytpographic key is successively obtained according to deletion instruction, P is integer;
It is close that password, the acquisition sequence of the P decoding password, S Crypted password and the S encryption are decoded according to described P
The acquisition sequence of code deletes the target Crypted password, and the S Crypted password is at least partly adding in M-1 Crypted password
Password, the M-1 Crypted password are the Crypted password in the M Crypted password other than the target Crypted password;
S≤the M-1.
8. the method according to the description of claim 7 is characterized in that it is described according to the P decoding password, it is described P decoding
The acquisition of the acquisition sequence, S Crypted password and the S Crypted password of password sequentially deletes the target Crypted password, wraps
It includes:
If the P decoding password is identical as the S Crypted password, and the acquisition sequence of the P decoding password and the S
The acquisition sequence of a Crypted password is identical, it is determined that deletes successfully the target Crypted password, otherwise, it is determined that the mesh
It marks Crypted password and deletes failure.
9. the method according to the description of claim 7 is characterized in that it is described according to the P decoding password, it is described P decoding
The acquisition of the acquisition sequence, S Crypted password and the S Crypted password of password sequentially deletes the target Crypted password, wraps
It includes:
If the P decoding password is identical as the S Crypted password, it is determined that the target Crypted password is deleted successfully,
Otherwise, it is determined that the target Crypted password is deleted and is failed.
10. method according to claim 1-3, which is characterized in that further include:
Addition instruction is obtained, the addition instruction is for adding target Crypted password;
P clear crytpographic key is successively obtained according to addition instruction, P is the integer greater than 1;
Added according to described P decoding password, the acquisition sequence of the P decoding password, the L Crypted password and the L
The acquisition sequence of password adds the target Crypted password, the L Crypted password in the M Crypted password at least
Partial encryption password;1≤L≤M.
11. according to the method described in claim 10, it is characterized in that, it is described according to the P decoding password, it is described P solution
The acquisition of the acquisition sequence, the L Crypted password and the L Crypted password of code password sequentially add the target encrypt it is close
Code, comprising:
If the P decoding password is identical as the L Crypted password, and the acquisition sequence of the P decoding password and the L
The acquisition sequence of a Crypted password is identical, it is determined that adds successfully to the target Crypted password, otherwise, it is determined that the mesh
Mark Crypted password addition failure.
12. according to right power want 10 described in method, which is characterized in that it is described according to the P decoding password, it is described P solve
The acquisition of the acquisition sequence, the L Crypted password and the L Crypted password of code password sequentially add the target encrypt it is close
Code, comprising:
If the P decoding password is identical as the L Crypted password, it is determined that the target Crypted password is added successfully,
Otherwise, it is determined that the target Crypted password is added and is failed.
13. method according to claim 1-3, which is characterized in that M Crypted password includes following at least two
: sound password, face password, gesture password, iris password.
14. a kind of electronic equipment characterized by comprising processor, the processor are coupled with memory;
The memory is used for, and stores computer program;
The processor is used for, and calls the computer program stored in the memory, to realize any institute of claim 1~13
The method stated.
15. a kind of readable storage medium storing program for executing, which is characterized in that including program or instruction, when described program or instruct on computers
When operation, any method of claim 1~13 is performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810969584.1A CN109241718A (en) | 2018-08-23 | 2018-08-23 | Cipher processing method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810969584.1A CN109241718A (en) | 2018-08-23 | 2018-08-23 | Cipher processing method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109241718A true CN109241718A (en) | 2019-01-18 |
Family
ID=65069494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810969584.1A Pending CN109241718A (en) | 2018-08-23 | 2018-08-23 | Cipher processing method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109241718A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113779555A (en) * | 2021-09-18 | 2021-12-10 | 王亚飞 | Password management method and device, electronic equipment and computer readable medium |
CN113938284A (en) * | 2021-12-16 | 2022-01-14 | 佛山职业技术学院 | Multi-connection encryption and decryption method, device and system based on gesture displacement |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150207522A1 (en) * | 2011-12-30 | 2015-07-23 | Streamscale, Inc. | Using parity data for concurrent data authentication, correction, compression, and encryption |
CN105046130A (en) * | 2015-07-10 | 2015-11-11 | 韩文兵 | Payment system based on face identification, fingerprint identification and iris identification |
CN105354501A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo processing method and processing system |
CN105608356A (en) * | 2015-07-20 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Password generation method and device, password authentication method and device as well as terminal |
CN106130729A (en) * | 2016-06-21 | 2016-11-16 | 深圳天珑无线科技有限公司 | A kind of encrypting fingerprint decryption method and encrypting fingerprint decryption system |
CN107743131A (en) * | 2017-11-20 | 2018-02-27 | 张博 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
-
2018
- 2018-08-23 CN CN201810969584.1A patent/CN109241718A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150207522A1 (en) * | 2011-12-30 | 2015-07-23 | Streamscale, Inc. | Using parity data for concurrent data authentication, correction, compression, and encryption |
CN105046130A (en) * | 2015-07-10 | 2015-11-11 | 韩文兵 | Payment system based on face identification, fingerprint identification and iris identification |
CN105608356A (en) * | 2015-07-20 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Password generation method and device, password authentication method and device as well as terminal |
CN105354501A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo processing method and processing system |
CN106130729A (en) * | 2016-06-21 | 2016-11-16 | 深圳天珑无线科技有限公司 | A kind of encrypting fingerprint decryption method and encrypting fingerprint decryption system |
CN107743131A (en) * | 2017-11-20 | 2018-02-27 | 张博 | A kind of identity identifying method and device based on a variety of different types input composite sequence |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113779555A (en) * | 2021-09-18 | 2021-12-10 | 王亚飞 | Password management method and device, electronic equipment and computer readable medium |
CN113938284A (en) * | 2021-12-16 | 2022-01-14 | 佛山职业技术学院 | Multi-connection encryption and decryption method, device and system based on gesture displacement |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3451575B1 (en) | Methods, systems and computer program product for providing encryption on a plurality of devices | |
JP6404336B2 (en) | Mobile payment device, method and apparatus based on biometric identification technology | |
JP6239788B2 (en) | Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium | |
US20140245433A1 (en) | Password authentication | |
CN105160227A (en) | Remote fingerprint verification method, user terminal and fingerprint verification system | |
EP2990959B1 (en) | Terminal and method for hiding and protecting data information | |
JP2008047085A (en) | Data security system, apparatus and method using usb device | |
US20160321450A1 (en) | Method and Apparatus for Managing Super User Password on Smart Mobile Terminal | |
CN109241718A (en) | Cipher processing method and equipment | |
US20060225043A1 (en) | Debugging device | |
CN107679391A (en) | Data processing method and system for identifying code | |
WO2017028277A1 (en) | Fingerprint recognition method and mobile terminal | |
CN111008390A (en) | Root key generation protection method and device, solid state disk and storage medium | |
CN106100851A (en) | Password management system, intelligent wristwatch and cipher management method thereof | |
CN115129332A (en) | Firmware burning method, computer equipment and readable storage medium | |
CN109617703B (en) | Key management method and device, electronic equipment and storage medium | |
CN109145533B (en) | Method and device for protecting code by using random password | |
CN105550556A (en) | Information encryption method and terminal device | |
CN108052828B (en) | Method and device for generating screen recording file, terminal and storage medium | |
US10445561B2 (en) | Binding data to a person's identity | |
CN107292133B (en) | Artificial intelligence confusion technical method and device | |
CN112636914B (en) | Identity verification method, identity verification device and smart card | |
CN107911820A (en) | Secret system data file management method and terminal device | |
EP2169586A1 (en) | Key protecting method and a computing apparatus | |
Koh et al. | Why Joanie can encrypt: Easy email encryption with easy key management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |