CN110336669A - A kind of encryption method of information, device and electronic equipment - Google Patents
A kind of encryption method of information, device and electronic equipment Download PDFInfo
- Publication number
- CN110336669A CN110336669A CN201910588230.7A CN201910588230A CN110336669A CN 110336669 A CN110336669 A CN 110336669A CN 201910588230 A CN201910588230 A CN 201910588230A CN 110336669 A CN110336669 A CN 110336669A
- Authority
- CN
- China
- Prior art keywords
- encryption function
- curved section
- encryption
- encrypted
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of encryption method of information, device and electronic equipment, it is easy to be stolen by other people or reverse engineered for solving the problem of that existing cipher mode security level is lower.The described method includes: generating initial curve on the screen, the initial curve includes at least one continuous curved section;It receives user to operate the adjustment of at least one curved section, and according to the corresponding curved section of the adjustment operation adjustment;According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes at least one encryption function, and a curved section corresponds to an encryption function;According to the encryption function collection, treats encryption information and encrypted.
Description
Technical field
This application involves field of computer technology more particularly to a kind of encryption methods of information, device and electronic equipment.
Background technique
It is the Core Superiority of block chain technology that anonymity is traceable.In the environment of complete open source, pipe that user can trust
The account for managing oneself executes the intelligent contract of oneself trust, anonymous information can also be re-encrypted, while guaranteeing to encrypt
Information still can operate.
In the application of reality, the place of block chain and user's generation interaction is wallet, especially operation circle in mobile terminal
Face, user only have limited several possible methods for generating encryption parameter: 1) keyboard typing;2) gesture is slided;3) voice is defeated
Enter;4) recognition of face.
The user interface of existing security product, usually in a manner of typing password, typing fingerprint or other contacts
Key is inputted, this scene is commonly available to not need the scene of user's Custom Encryption function.But in this scene,
There is the risk for the leakage keys such as spied upon, record is shielded by other people in user's typing cryptographic processes, there is very big security risk.
And intelligent contract is encrypted if necessary to user's Custom Encryption function, such as with the mode that isomorphism encrypts, then
System can only recommended user's default encryption function, this information for largely increasing user encryption, which is reversed, to be cracked
Possibility.
Therefore, the security level for how improving user encryption information avoids password leakage and reverse engineered, becomes urgently
The technical issues of solution.
Summary of the invention
The embodiment of the present application provides encryption method, device and the electronic equipment of a kind of information, to solve existing encryption
The problem of mode security level is lower, is easy by other people stealing passwords or reverse engineered.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, proposing a kind of encryption method of information, comprising:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment
Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes
At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Second aspect proposes a kind of encryption device of information characterized by comprising
Generation unit, for generating initial curve on the screen, the initial curve includes at least one continuous curve
Section;
Receiving unit operates the adjustment of at least one curved section for receiving user, and is grasped according to the adjustment
Adjust the corresponding curved section;
Determination unit, for determining encryption function collection, wherein described according to adjusted at least one curved section
Encryption function collection includes at least one encryption function, and a curved section corresponds to an encryption function;
Encryption unit, for treating encryption information and being encrypted according to the encryption function collection.
The third aspect proposes a kind of electronic equipment, which includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
It manages device and executes following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment
Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes
At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Fourth aspect proposes a kind of computer readable storage medium, the computer-readable recording medium storage one
Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity
Sub- equipment executes following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment
Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes
At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
The embodiment of the present application at least can achieve following technical effects by adopting the above technical scheme:
The method of this specification embodiment can generate initial curve on the screen, which includes at least one
Continuous curved section, and user can be received, the adjustment of curved section is operated, further according to adjustment operation adjustment curved section, then root
According to curved section adjusted, encryption function collection is determined, wherein encryption function collection includes at least one encryption function, and a song
Line segment corresponds to an encryption function to be treated encryption information and is encrypted finally according to encryption function collection.So pass through curved section
Shape backstage determine encryption function, encryption function is not shown on the screen, even if being spied upon or being recorded screen, can not also be restored
Specific parameter out improves the security level of encryption, and encryption function is determined by user's curved section adjusted, tool
There is very big randomness, further improves the difficulty of reverse engineered.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of implementation process schematic diagram of the encryption method for information that this specification one embodiment provides;
Fig. 2 (a) is the schematic diagram for the initial curve that this specification one embodiment provides;
Fig. 2 (b) is that the user that this specification one embodiment provides adjusts the schematic diagram after curved section;
Fig. 3 is a kind of structural schematic diagram of the encryption device for information that this specification one embodiment provides;
Fig. 4 is the structural schematic diagram for a kind of electronic equipment that this specification one embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
It is lower to solve existing cipher mode security level, it is easy asking by other people stealing passwords or reverse engineered
Topic, this specification embodiment provide a kind of encryption method of information, and the executing subject of this method can be, but not limited to mobile phone, put down
Plate computer etc. can be configured as executing at least one of the user terminal of this method that this specification embodiment supplies.Alternatively,
The executing subject of this method can also be client.
For ease of description, hereafter executing subject in this way is to be able to carry out for the terminal device of this method, to this
The embodiment of method is introduced.It is appreciated that it is that one kind is illustratively said that the executing subject of this method, which is terminal device,
It is bright, it is not construed as the restriction to this method.
Specifically, key generation method of the invention includes: the initial curve firstly, generate initial curve on the screen
Including at least one continuous curved section;Then, user can be received to operate the adjustment of at least one curved section, and according to
Adjust operation adjustment homologous thread section;Again, according at least one curved section adjusted, encryption function collection is determined, wherein encryption
Collection of functions includes at least one encryption function, and a curved section corresponds to an encryption function;Finally, according to encryption function
Collection, treats encryption information and is encrypted.
The method of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section
It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption
Not, and encryption function is determined by user's curved section adjusted, has very big randomness, is further improved reversed
The difficulty cracked.
Implementation for implementation process schematic diagram below with reference to the encryption method of information shown in FIG. 1, to this method
Journey describes in detail, comprising:
Step 110, initial curve is generated on the screen, which includes at least one continuous curved section;
Optionally, in order to improve the complexity that information encrypts, the security level of encrypted information, this specification one are improved
The initial curve that a or multiple embodiments generate on the screen may include one or more intermediate points, these intermediate points are supported to use
Its position is moved at family by predetermined registration operation, to change the shape of initial curve, and then the corresponding encryption of customized initial curve
Collection of functions.So, initial curve is generated on the screen, comprising:
Two endpoints are generated on the screen, and generate at least one intermediate point between two endpoints;
It is sequentially connected the adjacent two o'clock on screen according to predetermined manner, obtains at least one continuous curved section, this is at least
One continuous curved section forms initial curve.
As shown in Fig. 2 (a), for the schematic diagram for the initial curve that this specification embodiment generates on the screen.In Fig. 2
(a) in, which includes two endpoints (i.e. point A and point B) and 3 intermediate points (i.e. point M1, point M2 and point M3).
It should be understood that for the ease of the adjacent two o'clock on connection screen, that is, be sequentially connected in Fig. 2 AM1, M1M2, M2M3 and
M3B, with forming curves section AM1, M1M2, M2M3 and M3B, there are corresponding first between the adjacent two o'clock in this specification embodiment
Beginning function, the initial function are derived from preset function library, which determines the shape of curved section;Alternatively, adjacent two o'clock
Between can also be connected at random.So, the adjacent two o'clock being sequentially connected according to predetermined manner on screen, comprising:
It determines corresponding initial function between the adjacent two o'clock on screen, is sequentially connected on screen based on initial function
Adjacent two o'clock;Or
Adjacent two o'clock on random connection screen.
As shown in Fig. 2 (a), it is assumed that point A between this adjacent two o'clock of point M1 correspond to an encryption function E1 (X), then
It can be based on encryption function E1 (X) tie point A and point M1;Postulated point M1 adds between this adjacent two o'clock of point M2 corresponding to one
Close function E2 (X), then encryption function E2 (X) tie point M1 to point M2 can be based on;Postulated point M2 to point M3 this adjacent two
Correspond to an encryption function E3 (X) between point, then can be based on encryption function E3 (X) tie point M2 and point M3;Assuming that
Correspond to an encryption function E4 (X) between point M3 and point B this adjacent two o'clock, then can be based on encryption function E4 (X) even
Contact M3 and point B.
Step 120, it receives user to operate the adjustment of at least one curved section, and according to the corresponding song of adjustment operation adjustment
Line segment.
As shown in Fig. 2 (a), user sees the initial curve of displaying on the screen (between point A and point B shown in Fig. 2 (a)
Curve) and intermediate point M1, M2 and M3 of the initial curve after, the position of intermediate point M1, M2 and M3 can be moved, such as
It can position that is upward, downward, being moved to the left or right intermediate point M1, M2 and M3.Receive user to the intermediate point M1 of curve,
After the position adjustment operation of M2 and M3, it can be operated according to the adjustment of user to adjust the curved section between point A and point B.
Assuming that shown in curve such as Fig. 2 (b) that user generates after being adjusted.The curve is by the song point A to point M1 '
Curved section, point M2 ' between line segment, point M1 ' to point M2 ' arrive the curved section between point M3 ' and point M3 ' to the song between point B
Line segment composition.
Step 130, according at least one curved section adjusted, encryption function collection is determined, wherein encryption function collection includes
At least one encryption function, and a curved section corresponds to an encryption function;
It should be understood that since the shape of curved section adjusted is changed, then in curved section between each adjacent two o'clock
Corresponding change can also occur for corresponding function, then determining encryption function collection according at least one curved section adjusted, wrap
It includes:
According to coordinate in the coordinate system pre-established of the starting point and terminal of every curved section adjusted and right
The initial function answered determines the corresponding encryption function of every curved section adjusted;
Based on the corresponding encryption function of every curved section adjusted, encryption function collection is obtained.
It optionally, is to realize isomorphism encryption, all curved sections adjusted are dull continuous in this specification embodiment
, and the curve of all curved section compositions adjusted is also dull continuous.
Isomorphism encryption is a kind of mathe-matical map method, it is assumed that encryption function is expressed as E, meets condition below:
E (A op B)=E (A) op E (B);
That is, after the result decryption operated in ciphertext, as the operating result on plaintext:
E-1(E (A op B))=A op B.
Wherein, op indicates the operations mode such as addition subtraction multiplication and division or string-concatenation.
Here, since all curved sections adjusted are dull continuous, and all curved section compositions adjusted
Curve is also dull continuous, therefore is also dull continuous according to the encryption function collection that curved section adjusted determines.Input
Any set of number combination (X1, X2 ...) calculates ciphertext (E (X1), E (X2) ...) from encryption function collection, it is subsequent can be
Ciphertext is exported to application.Since E is dull, so ciphertext is also to protect to continue.Ciphertext, which protects to continue, refers to that ciphertext is kept and in plain text one
The sequence of sample, if X1 < X2 < X3 < ..., E (X1) < E (X2) < E (X3) < ....
Step 140, it according to encryption function collection, treats encryption information and is encrypted.
Optionally, the password of setting is caused to reveal to avoid user from peeping screen or record screen etc. by other people in setting cryptographic processes
The problems such as, the confidential information to be added in this specification embodiment may include clear-text passwords to be encrypted;
According to encryption function collection, treats encryption information and carry out encryption and include:
According to encryption function collection, clear-text passwords to be encrypted is encrypted, to generate key.
At this point, the encryption function collection generated due to that can not spy upon backstage will not cause key even if clear-text passwords is revealed
Leakage, improves safety.
Certainly, the encryption application scenarios of the embodiment of the present invention are not limited to encrypt clear-text passwords, apply also for appointing
It what is the need for the scene to be encrypted, such as using encryption function collection to confidential data encryption etc..
Optionally, above-mentioned clear-text passwords to be encrypted includes that multiple numbers or text, an encryption function correspond respectively to
One value range;
According to encryption function collection, clear-text passwords to be encrypted is encrypted, comprising:
Concentrate the corresponding value range of each encryption function based on encryption function, concentrated from encryption function, it is determining with it is to be added
The corresponding encryption function of codomain of multiple numbers or text in close clear-text passwords;
Based on encryption function corresponding with the codomain of multiple numbers or text in clear-text passwords to be encrypted, to be added
Multiple numbers or text in close clear-text passwords are encrypted.
Optionally, clear-text passwords to be encrypted can be the clear-text passwords being made of multiple numbers, and the clear-text passwords is such as
Six clear-text passwords " 312645 " that can be made of number 1,2,3,4,5,6;The plaintext that can also be made of multiple letters is close
Code, six passwords " bacedf " which can such as be made of alphabetical a, b, c, d, e, f;It can also be by alphabetical sum number
The clear-text passwords of word composition, six passwords which can such as be made of number 1,2,3 and letter a, b, c
"a2c1b3";Can also by letter, number and the clear-text passwords that form of underscore, the clear-text passwords such as can by number 1,2,
Alphabetical a, b, c and six passwords " 12_cba " of underscore _ composition.
It should be understood that since the value range of the corresponding one or more encryption functions of curved section adjusted is often number
Value range, for the ease of user setting include letter or underscore clear-text passwords, this specification embodiment can be preparatory
The mapping table of letter and underscore and number is set, for example underscore can be set and correspond to number 10, alphabetical a corresponds to
Number 11, alphabetical b correspond to number 12, etc..
It should be understood that the composition and digit of the above-mentioned clear-text passwords to be encrypted enumerated are a kind of illustrative explanation,
The digit and particular content of letter included in clear-text passwords to be encrypted, number and underscore can be in practical applications
Specifically it is arranged according to the memory habit of user and operation behavior habit, this specification one or more embodiment does not make this to have
Body limits.
Assuming that it is " 312645 " that clear-text passwords to be encrypted, which includes multiple numbers, for the curved section shown in Fig. 2 (b),
The curved section includes four sections, the value range of the corresponding encryption function of curved section between midpoint A to point M1 ' for [x0,
X1 '], the value range of point M1 ' to the corresponding encryption function of curved section between point M2 ' is [x1 ', x2 '], point M2 ' to point M3 '
Between the value range of the corresponding encryption function of curved section be [x2 ', x3 '], the curved section that point M3 ' is arrived between point B is corresponding
The value range of encryption function is [x3 ', x4].
So for clear-text passwords " 312645 " to be encrypted, it is first determined " 3 " belong to [x0, x1 '], [x1 ', x2 '],
Which of [x2 ', x3 '] and [x3 ', x4] range, it is assumed that " 3 " belong to [x1 ', x2 '], then can determine " 3 " it is corresponding plus
Close function is the corresponding encryption function E2 ' (X) of curved section between point M1 ' to point M2 ', is carried out based on the encryption function to " 3 "
Encryption obtains E2 ' (3);
Determine that " 1 " belongs to which of [x0, x1 '], [x1 ', x2 '], [x2 ', x3 '] and [x3 ', x4] range, vacation again
If " 1 " belongs to [x0, x1 '], then can determine curved section of " 1 " the corresponding encryption function between point A to point M1 ' it is corresponding plus
Close function E1 ' (X) is encrypted " 1 " to obtain E1 ' (1) based on the encryption function;
Then determine that " 2 " belong to which of [x0, x1 '], [x1 ', x2 '], [x2 ', x3 '] and [x3 ', x4] range,
Assuming that " 2 " belong to [x1 ', x2 '], then it can determine that " 2 " corresponding encryption function is the curved section pair that point M1 ' is arrived between point M2 '
The encryption function E2 ' (X) answered is encrypted " 1 " to obtain E2 ' (2) based on the encryption function;
And so on, successively determine " 6 ", " 4 ", " 5 " corresponding encryption function, and based at corresponding encryption function
Manage obtained key, it is assumed that be E4 ' (6), E3 ' (4), E3 ' (5);It can so determine the clear-text passwords " 312645 " via right
The key that the encryption function encryption answered obtains is the group of E2 ' (3), E1 ' (1), E2 ' (2), E4 ' (6), E3 ' (4), E3 ' (5)
It closes.
Optionally, in one embodiment, it can be used as using the component for the method encapsulation that this specification embodiment provides
One plug-in unit of target application, the plug-in unit can be used for the setting of the passwords such as the login password of target application, payment cipher, Yi Jideng
The input of the passwords such as password and payment cipher is recorded, then after being encrypted to information, this method further include:
Based on encrypted information, the operation of at least one of register, delivery operation and transfer operation is executed.
By taking the scene set of the passwords such as the login password of target application, payment cipher as an example, it is assumed that user is downloading mesh
Mark application after, register the account of the target application, generally require at this time user's manual setting target application login password and
The passwords such as payment cipher.In this case, in the set interface of the passwords such as the login password of target application or payment cipher,
The shape of the curve for the default that can be provided first for user's display systems, as shown in Fig. 2 (a), which is risen
Point is point A, and terminal is point B, and there are several points between point A and point B, slide up and down for user.User can lead to
Cross and slide up and down carried out to the several points between point A and point B, come change the default curve shape, in turn
Realize the customized setting to the corresponding encryption function of curved section.
Confirmation operation, such as the curved section can be carried out to the curved section when user adjusts the shape of curved section after
It may include " confirmation " and " cancellation " two buttons in display interface.When detecting that user clicks " confirmation " button, then show
User has confirmed that the shape of the curved section, and completes the setting to the shape of the curved section.At this point it is possible to be carried out to the curved section
It saves, so that user logs in next time or when delivery operation calls the curved section to input user clear-text passwords adds
Close operation.
After the shape of the good curved section of user setting, the bright of setting can be inputted in the input frame that password is arranged
Literary password, it should be appreciated that the clear-text passwords is not the actual login password of the target application or payment cipher, then, even if
The clear-text passwords spies upon perhaps record screen by other people and also can not log in target application based on the clear-text passwords or pass through target application
It carries out the operation such as paying.
The method of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section
It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption
Not, and encryption function is determined by user's curved section adjusted, has very big randomness, is further improved reversed
The difficulty cracked.
Fig. 3 is the structural schematic diagram of the encryption device 300 for the information that this specification embodiment provides.Referring to FIG. 3, one
In kind embodiment, the encryption device 300 of information can include:
Generation unit 301, for generating initial curve on the screen, the initial curve includes at least one continuous bent
Line segment;
Receiving unit 302 operates the adjustment of at least one section curved section for receiving user, and according to the adjustment
Curved section described in operation adjustment;
Determination unit 303, for determining encryption function collection, wherein institute according at least one section of curved section adjusted
Stating encryption function collection includes at least one encryption function, and a curved section corresponds to an encryption function;
Encryption unit 304, for treating encryption information and being encrypted according to the encryption function collection.
The device of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section
It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption
Not, and encryption function is determined by user's curved section adjusted, has very big randomness, is further improved reversed
The difficulty cracked.
Optionally, in one embodiment, it in the generation unit 301, is used for:
Two endpoints are generated on the screen, and at least one intermediate point is generated between described two endpoints;
It is sequentially connected the adjacent two o'clock on the screen according to predetermined manner, obtains at least one continuous curved section, institute
It states at least one continuous curved section and forms the initial curve.
Optionally, in one embodiment, the generation unit 301, is used for:
It determines corresponding initial function between the adjacent two o'clock on the screen, is successively connected based on the initial function
Connect the adjacent two o'clock on the screen;Or
The adjacent two o'clock on the screen is connected at random.
Optionally, in one embodiment, the receiving unit 302, is used for:
User is received to the moving operation of the endpoint or intermediate point, and according to after movement endpoint or intermediate point adjust institute
State the curved section where endpoint or intermediate point.
Optionally, in one embodiment, the determination unit 303, is used for:
According to the coordinate of the starting point and terminal of the every adjusted curved section in the coordinate system pre-established, with
And corresponding initial function, determine the corresponding encryption function of the every adjusted curved section;
Based on the corresponding encryption function of the every adjusted curved section, the encryption function collection is obtained.
Optionally, in one embodiment, the information to be encrypted includes clear-text passwords to be encrypted;
The encryption unit 304, is used for:
According to the encryption function collection, the clear-text passwords to be encrypted is encrypted, to generate key.
Optionally, in one embodiment, the clear-text passwords to be encrypted includes multiple numbers or text, and one adds
Close function corresponds respectively to a value range;
The encryption unit 304, is used for:
The corresponding value range of each encryption function is concentrated based on the encryption function, is concentrated from the encryption function, really
Fixed encryption function corresponding with the codomain of multiple numbers or text in the clear-text passwords to be encrypted;
It is right based on encryption function corresponding with the codomain of multiple numbers or text in the clear-text passwords to be encrypted
Multiple numbers or text in the clear-text passwords to be encrypted are encrypted.
Optionally, in one embodiment, all curved sections adjusted are dull continuous, and institute adjusted
It is also dull continuous by the curve that curved section forms.
The method that the encryption device 300 of information can be realized FIG. 1 to FIG. 2 embodiment, specifically refers to shown in FIG. 1 to FIG. 2
The encryption method of the information of embodiment, which is not described herein again.
Fig. 4 is the structural schematic diagram for the electronic equipment that one embodiment of this specification provides.Referring to FIG. 4, in hardware
Level, the electronic equipment include processor, optionally further comprising internal bus, network interface, memory.Wherein, memory can
It can include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-easy
The property lost memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible to
Including hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..Only to be indicated with a four-headed arrow in Fig. 4, it is not intended that an only bus or a type of convenient for indicating
Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer
The generating means of key are formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment
Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes
At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
The method of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section
It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption
Not, the difficulty of reverse engineered is also further improved.
The encryption method of information disclosed in the above-mentioned embodiment illustrated in fig. 1 such as this specification can be applied in processor, or
Person is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization,
Each step of the above method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.On
The processor stated can be at general processor, including central processing unit (Central Processing Unit, CPU), network
Manage device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor,
DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate
Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance
Body pipe logical device, discrete hardware components.It may be implemented or execute and is in this specification one or more embodiment disclosed
Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional
Processor etc..The step of method in conjunction with disclosed in this specification one or more embodiment, can be embodied directly in hardware decoding
Processor executes completion, or in decoding processor hardware and software module combination execute completion.Software module can position
In random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register
In the storage medium of equal this fields maturation.The storage medium is located at memory, and processor reads the information in memory, in conjunction with it
Hardware completes the step of above method.
The electronic equipment can also carry out the encryption method of the information of Fig. 1, and details are not described herein for this specification.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as
Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each
Logic unit is also possible to hardware or logical device.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one
A or multiple programs, the one or more program include instruction, and the instruction is when by the portable electronic including multiple application programs
When equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following behaviour
Make:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment
Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes
At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as
Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each
Logic unit is also possible to hardware or logical device.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification
Range.With within principle, made any modification, changes equivalent replacement all spirit in this specification one or more embodiment
Into etc., it should be included within the protection scope of this specification one or more embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
Claims (10)
1. a kind of encryption method of information characterized by comprising
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding curve of the adjustment operation adjustment
Section;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes at least
One encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
2. the method as described in claim 1, which is characterized in that generating initial curve on the screen includes:
Two endpoints are generated on the screen, and at least one intermediate point is generated between described two endpoints;
Be sequentially connected the adjacent two o'clock on the screen according to predetermined manner, obtain at least one continuous curved section, it is described extremely
A few continuous curved section forms the initial curve.
3. method according to claim 2, which is characterized in that adjacent two be sequentially connected according to predetermined manner on the screen
Point, comprising:
It determines corresponding initial function between the adjacent two o'clock on the screen, institute is sequentially connected based on the initial function
State the adjacent two o'clock on screen;Or
The adjacent two o'clock on the screen is connected at random.
4. method according to claim 2, which is characterized in that it receives user and the adjustment of the curved section is operated, and according to
Curved section described in the adjustment operation adjustment, comprising:
User is received to the moving operation of the endpoint or intermediate point, and according to after movement endpoint or intermediate point adjust the end
Curved section where point or intermediate point.
5. method as claimed in claim 3, which is characterized in that according to adjusted at least one curved section, determine and add
Close collection of functions, comprising:
According to coordinate in the coordinate system pre-established of the starting point and terminal of the every adjusted curved section and right
The initial function answered determines the corresponding encryption function of the every adjusted curved section;
Based on the corresponding encryption function of the every adjusted curved section, the encryption function collection is obtained.
6. the method as described in claim 1, which is characterized in that the information to be encrypted includes clear-text passwords to be encrypted;
According to the encryption function collection, treats encryption information and carry out encryption and include:
According to the encryption function collection, the clear-text passwords to be encrypted is encrypted, to generate key.
7. method as claimed in claim 6, which is characterized in that the clear-text passwords to be encrypted includes multiple numbers or text
Word, an encryption function correspond respectively to a value range;
According to the encryption function collection, the clear-text passwords to be encrypted is encrypted, comprising:
Concentrate the corresponding value range of each encryption function based on the encryption function, concentrated from the encryption function, determine with
The corresponding encryption function of codomain of multiple numbers or text in the clear-text passwords to be encrypted;
Based on encryption function corresponding with the codomain of multiple numbers or text in the clear-text passwords to be encrypted, to described
Multiple numbers or text in clear-text passwords to be encrypted are encrypted.
8. the method as described in claim 1, which is characterized in that all curved sections adjusted are dull continuous, and are adjusted
The curve of all curved sections composition after whole is also dull continuous.
9. a kind of encryption device of information characterized by comprising
Generation unit, for generating initial curve on the screen, the initial curve includes at least one continuous curved section;
Receiving unit operates the adjustment of at least one curved section for receiving user, and is operated and adjusted according to the adjustment
The whole corresponding curved section;
Determination unit, for determining encryption function collection, wherein the encryption according to adjusted at least one curved section
Collection of functions includes at least one encryption function, and a curved section corresponds to an encryption function;
Encryption unit, for treating encryption information and being encrypted according to the encryption function collection.
10. a kind of electronic equipment, the electronic equipment include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed
Execute following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding curve of the adjustment operation adjustment
Section;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes at least
One encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910588230.7A CN110336669B (en) | 2019-07-02 | 2019-07-02 | Information encryption method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910588230.7A CN110336669B (en) | 2019-07-02 | 2019-07-02 | Information encryption method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110336669A true CN110336669A (en) | 2019-10-15 |
CN110336669B CN110336669B (en) | 2022-09-09 |
Family
ID=68144624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910588230.7A Active CN110336669B (en) | 2019-07-02 | 2019-07-02 | Information encryption method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110336669B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995749A (en) * | 2019-12-17 | 2020-04-10 | 北京海益同展信息科技有限公司 | Block chain encryption method and device, electronic equipment and storage medium |
WO2022068358A1 (en) * | 2020-09-29 | 2022-04-07 | 深圳壹账通智能科技有限公司 | Encryption method and apparatus for generating keys on basis of attributes of information, and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020018560A1 (en) * | 2000-06-22 | 2002-02-14 | Lauter Kristin E. | Cryptosystem based on a jacobian of a curve |
CN104471892A (en) * | 2011-12-02 | 2015-03-25 | 巴克莱银行公开有限公司 | User access control based on a graphical signature |
CN107404383A (en) * | 2017-09-12 | 2017-11-28 | 四川阵风科技有限公司 | The generation method and device of digital signature |
CN108259505A (en) * | 2018-01-31 | 2018-07-06 | 大连大学 | A kind of ECC lightweight encryption methods for terminal mini-plant |
-
2019
- 2019-07-02 CN CN201910588230.7A patent/CN110336669B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020018560A1 (en) * | 2000-06-22 | 2002-02-14 | Lauter Kristin E. | Cryptosystem based on a jacobian of a curve |
CN104471892A (en) * | 2011-12-02 | 2015-03-25 | 巴克莱银行公开有限公司 | User access control based on a graphical signature |
CN107404383A (en) * | 2017-09-12 | 2017-11-28 | 四川阵风科技有限公司 | The generation method and device of digital signature |
CN108259505A (en) * | 2018-01-31 | 2018-07-06 | 大连大学 | A kind of ECC lightweight encryption methods for terminal mini-plant |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995749A (en) * | 2019-12-17 | 2020-04-10 | 北京海益同展信息科技有限公司 | Block chain encryption method and device, electronic equipment and storage medium |
WO2022068358A1 (en) * | 2020-09-29 | 2022-04-07 | 深圳壹账通智能科技有限公司 | Encryption method and apparatus for generating keys on basis of attributes of information, and device |
Also Published As
Publication number | Publication date |
---|---|
CN110336669B (en) | 2022-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3917075B1 (en) | Method and apparatus for encrypting and decrypting product information | |
CN111885024B (en) | Login information processing method and equipment | |
US9407632B2 (en) | Transformation rules for one-time passwords | |
CN109934585B (en) | Signature method, device and system based on secure multiparty calculation | |
EP2973167B1 (en) | Techniques for securing use of one-time passwords | |
US9628274B1 (en) | Hardening tokenization security and key rotation | |
CN110162551B (en) | Data processing method and device and electronic equipment | |
CN108364223A (en) | A kind of method and device of Data Audit | |
CN104573551A (en) | File processing method and mobile terminal | |
CN104463013A (en) | Mobile terminal and data encryption method thereof | |
CN109687966A (en) | Encryption method and its system | |
CN107609410A (en) | Android system data guard method, terminal device and storage medium based on HOOK | |
CN105809000A (en) | Information processing method and electronic device | |
CN105069365A (en) | Data processing method and mobile terminal | |
CN107133524A (en) | A kind of date storage method and device | |
CN109800582A (en) | Multiparty data processing method, device and the equipment that can be traced to the source | |
CN110336669A (en) | A kind of encryption method of information, device and electronic equipment | |
CN106446697A (en) | Method and device for saving private data | |
US8774400B2 (en) | Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem | |
CN110445768A (en) | A kind of login method, device and electronic equipment | |
CN107592963B (en) | Method and computing device for performing secure computations | |
CN107889102B (en) | Method and device for encrypting and decrypting information in short message | |
CN111092721B (en) | Method and device for setting access password | |
WO2020181427A1 (en) | Signing method, device, and system employing secure multi-party computation | |
WO2017215436A1 (en) | Information encryption and decryption method, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |