CN110336669A - A kind of encryption method of information, device and electronic equipment - Google Patents

A kind of encryption method of information, device and electronic equipment Download PDF

Info

Publication number
CN110336669A
CN110336669A CN201910588230.7A CN201910588230A CN110336669A CN 110336669 A CN110336669 A CN 110336669A CN 201910588230 A CN201910588230 A CN 201910588230A CN 110336669 A CN110336669 A CN 110336669A
Authority
CN
China
Prior art keywords
encryption function
curved section
encryption
encrypted
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910588230.7A
Other languages
Chinese (zh)
Other versions
CN110336669B (en
Inventor
张�诚
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Brilliant Hi Tech Development Co Ltd
Original Assignee
Beijing Brilliant Hi Tech Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Brilliant Hi Tech Development Co Ltd filed Critical Beijing Brilliant Hi Tech Development Co Ltd
Priority to CN201910588230.7A priority Critical patent/CN110336669B/en
Publication of CN110336669A publication Critical patent/CN110336669A/en
Application granted granted Critical
Publication of CN110336669B publication Critical patent/CN110336669B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of encryption method of information, device and electronic equipment, it is easy to be stolen by other people or reverse engineered for solving the problem of that existing cipher mode security level is lower.The described method includes: generating initial curve on the screen, the initial curve includes at least one continuous curved section;It receives user to operate the adjustment of at least one curved section, and according to the corresponding curved section of the adjustment operation adjustment;According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes at least one encryption function, and a curved section corresponds to an encryption function;According to the encryption function collection, treats encryption information and encrypted.

Description

A kind of encryption method of information, device and electronic equipment
Technical field
This application involves field of computer technology more particularly to a kind of encryption methods of information, device and electronic equipment.
Background technique
It is the Core Superiority of block chain technology that anonymity is traceable.In the environment of complete open source, pipe that user can trust The account for managing oneself executes the intelligent contract of oneself trust, anonymous information can also be re-encrypted, while guaranteeing to encrypt Information still can operate.
In the application of reality, the place of block chain and user's generation interaction is wallet, especially operation circle in mobile terminal Face, user only have limited several possible methods for generating encryption parameter: 1) keyboard typing;2) gesture is slided;3) voice is defeated Enter;4) recognition of face.
The user interface of existing security product, usually in a manner of typing password, typing fingerprint or other contacts Key is inputted, this scene is commonly available to not need the scene of user's Custom Encryption function.But in this scene, There is the risk for the leakage keys such as spied upon, record is shielded by other people in user's typing cryptographic processes, there is very big security risk.
And intelligent contract is encrypted if necessary to user's Custom Encryption function, such as with the mode that isomorphism encrypts, then System can only recommended user's default encryption function, this information for largely increasing user encryption, which is reversed, to be cracked Possibility.
Therefore, the security level for how improving user encryption information avoids password leakage and reverse engineered, becomes urgently The technical issues of solution.
Summary of the invention
The embodiment of the present application provides encryption method, device and the electronic equipment of a kind of information, to solve existing encryption The problem of mode security level is lower, is easy by other people stealing passwords or reverse engineered.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, proposing a kind of encryption method of information, comprising:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Second aspect proposes a kind of encryption device of information characterized by comprising
Generation unit, for generating initial curve on the screen, the initial curve includes at least one continuous curve Section;
Receiving unit operates the adjustment of at least one curved section for receiving user, and is grasped according to the adjustment Adjust the corresponding curved section;
Determination unit, for determining encryption function collection, wherein described according to adjusted at least one curved section Encryption function collection includes at least one encryption function, and a curved section corresponds to an encryption function;
Encryption unit, for treating encryption information and being encrypted according to the encryption function collection.
The third aspect proposes a kind of electronic equipment, which includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Fourth aspect proposes a kind of computer readable storage medium, the computer-readable recording medium storage one Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity Sub- equipment executes following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
The embodiment of the present application at least can achieve following technical effects by adopting the above technical scheme:
The method of this specification embodiment can generate initial curve on the screen, which includes at least one Continuous curved section, and user can be received, the adjustment of curved section is operated, further according to adjustment operation adjustment curved section, then root According to curved section adjusted, encryption function collection is determined, wherein encryption function collection includes at least one encryption function, and a song Line segment corresponds to an encryption function to be treated encryption information and is encrypted finally according to encryption function collection.So pass through curved section Shape backstage determine encryption function, encryption function is not shown on the screen, even if being spied upon or being recorded screen, can not also be restored Specific parameter out improves the security level of encryption, and encryption function is determined by user's curved section adjusted, tool There is very big randomness, further improves the difficulty of reverse engineered.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of implementation process schematic diagram of the encryption method for information that this specification one embodiment provides;
Fig. 2 (a) is the schematic diagram for the initial curve that this specification one embodiment provides;
Fig. 2 (b) is that the user that this specification one embodiment provides adjusts the schematic diagram after curved section;
Fig. 3 is a kind of structural schematic diagram of the encryption device for information that this specification one embodiment provides;
Fig. 4 is the structural schematic diagram for a kind of electronic equipment that this specification one embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
It is lower to solve existing cipher mode security level, it is easy asking by other people stealing passwords or reverse engineered Topic, this specification embodiment provide a kind of encryption method of information, and the executing subject of this method can be, but not limited to mobile phone, put down Plate computer etc. can be configured as executing at least one of the user terminal of this method that this specification embodiment supplies.Alternatively, The executing subject of this method can also be client.
For ease of description, hereafter executing subject in this way is to be able to carry out for the terminal device of this method, to this The embodiment of method is introduced.It is appreciated that it is that one kind is illustratively said that the executing subject of this method, which is terminal device, It is bright, it is not construed as the restriction to this method.
Specifically, key generation method of the invention includes: the initial curve firstly, generate initial curve on the screen Including at least one continuous curved section;Then, user can be received to operate the adjustment of at least one curved section, and according to Adjust operation adjustment homologous thread section;Again, according at least one curved section adjusted, encryption function collection is determined, wherein encryption Collection of functions includes at least one encryption function, and a curved section corresponds to an encryption function;Finally, according to encryption function Collection, treats encryption information and is encrypted.
The method of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption Not, and encryption function is determined by user's curved section adjusted, has very big randomness, is further improved reversed The difficulty cracked.
Implementation for implementation process schematic diagram below with reference to the encryption method of information shown in FIG. 1, to this method Journey describes in detail, comprising:
Step 110, initial curve is generated on the screen, which includes at least one continuous curved section;
Optionally, in order to improve the complexity that information encrypts, the security level of encrypted information, this specification one are improved The initial curve that a or multiple embodiments generate on the screen may include one or more intermediate points, these intermediate points are supported to use Its position is moved at family by predetermined registration operation, to change the shape of initial curve, and then the corresponding encryption of customized initial curve Collection of functions.So, initial curve is generated on the screen, comprising:
Two endpoints are generated on the screen, and generate at least one intermediate point between two endpoints;
It is sequentially connected the adjacent two o'clock on screen according to predetermined manner, obtains at least one continuous curved section, this is at least One continuous curved section forms initial curve.
As shown in Fig. 2 (a), for the schematic diagram for the initial curve that this specification embodiment generates on the screen.In Fig. 2 (a) in, which includes two endpoints (i.e. point A and point B) and 3 intermediate points (i.e. point M1, point M2 and point M3).
It should be understood that for the ease of the adjacent two o'clock on connection screen, that is, be sequentially connected in Fig. 2 AM1, M1M2, M2M3 and M3B, with forming curves section AM1, M1M2, M2M3 and M3B, there are corresponding first between the adjacent two o'clock in this specification embodiment Beginning function, the initial function are derived from preset function library, which determines the shape of curved section;Alternatively, adjacent two o'clock Between can also be connected at random.So, the adjacent two o'clock being sequentially connected according to predetermined manner on screen, comprising:
It determines corresponding initial function between the adjacent two o'clock on screen, is sequentially connected on screen based on initial function Adjacent two o'clock;Or
Adjacent two o'clock on random connection screen.
As shown in Fig. 2 (a), it is assumed that point A between this adjacent two o'clock of point M1 correspond to an encryption function E1 (X), then It can be based on encryption function E1 (X) tie point A and point M1;Postulated point M1 adds between this adjacent two o'clock of point M2 corresponding to one Close function E2 (X), then encryption function E2 (X) tie point M1 to point M2 can be based on;Postulated point M2 to point M3 this adjacent two Correspond to an encryption function E3 (X) between point, then can be based on encryption function E3 (X) tie point M2 and point M3;Assuming that Correspond to an encryption function E4 (X) between point M3 and point B this adjacent two o'clock, then can be based on encryption function E4 (X) even Contact M3 and point B.
Step 120, it receives user to operate the adjustment of at least one curved section, and according to the corresponding song of adjustment operation adjustment Line segment.
As shown in Fig. 2 (a), user sees the initial curve of displaying on the screen (between point A and point B shown in Fig. 2 (a) Curve) and intermediate point M1, M2 and M3 of the initial curve after, the position of intermediate point M1, M2 and M3 can be moved, such as It can position that is upward, downward, being moved to the left or right intermediate point M1, M2 and M3.Receive user to the intermediate point M1 of curve, After the position adjustment operation of M2 and M3, it can be operated according to the adjustment of user to adjust the curved section between point A and point B.
Assuming that shown in curve such as Fig. 2 (b) that user generates after being adjusted.The curve is by the song point A to point M1 ' Curved section, point M2 ' between line segment, point M1 ' to point M2 ' arrive the curved section between point M3 ' and point M3 ' to the song between point B Line segment composition.
Step 130, according at least one curved section adjusted, encryption function collection is determined, wherein encryption function collection includes At least one encryption function, and a curved section corresponds to an encryption function;
It should be understood that since the shape of curved section adjusted is changed, then in curved section between each adjacent two o'clock Corresponding change can also occur for corresponding function, then determining encryption function collection according at least one curved section adjusted, wrap It includes:
According to coordinate in the coordinate system pre-established of the starting point and terminal of every curved section adjusted and right The initial function answered determines the corresponding encryption function of every curved section adjusted;
Based on the corresponding encryption function of every curved section adjusted, encryption function collection is obtained.
It optionally, is to realize isomorphism encryption, all curved sections adjusted are dull continuous in this specification embodiment , and the curve of all curved section compositions adjusted is also dull continuous.
Isomorphism encryption is a kind of mathe-matical map method, it is assumed that encryption function is expressed as E, meets condition below:
E (A op B)=E (A) op E (B);
That is, after the result decryption operated in ciphertext, as the operating result on plaintext:
E-1(E (A op B))=A op B.
Wherein, op indicates the operations mode such as addition subtraction multiplication and division or string-concatenation.
Here, since all curved sections adjusted are dull continuous, and all curved section compositions adjusted Curve is also dull continuous, therefore is also dull continuous according to the encryption function collection that curved section adjusted determines.Input Any set of number combination (X1, X2 ...) calculates ciphertext (E (X1), E (X2) ...) from encryption function collection, it is subsequent can be Ciphertext is exported to application.Since E is dull, so ciphertext is also to protect to continue.Ciphertext, which protects to continue, refers to that ciphertext is kept and in plain text one The sequence of sample, if X1 < X2 < X3 < ..., E (X1) < E (X2) < E (X3) < ....
Step 140, it according to encryption function collection, treats encryption information and is encrypted.
Optionally, the password of setting is caused to reveal to avoid user from peeping screen or record screen etc. by other people in setting cryptographic processes The problems such as, the confidential information to be added in this specification embodiment may include clear-text passwords to be encrypted;
According to encryption function collection, treats encryption information and carry out encryption and include:
According to encryption function collection, clear-text passwords to be encrypted is encrypted, to generate key.
At this point, the encryption function collection generated due to that can not spy upon backstage will not cause key even if clear-text passwords is revealed Leakage, improves safety.
Certainly, the encryption application scenarios of the embodiment of the present invention are not limited to encrypt clear-text passwords, apply also for appointing It what is the need for the scene to be encrypted, such as using encryption function collection to confidential data encryption etc..
Optionally, above-mentioned clear-text passwords to be encrypted includes that multiple numbers or text, an encryption function correspond respectively to One value range;
According to encryption function collection, clear-text passwords to be encrypted is encrypted, comprising:
Concentrate the corresponding value range of each encryption function based on encryption function, concentrated from encryption function, it is determining with it is to be added The corresponding encryption function of codomain of multiple numbers or text in close clear-text passwords;
Based on encryption function corresponding with the codomain of multiple numbers or text in clear-text passwords to be encrypted, to be added Multiple numbers or text in close clear-text passwords are encrypted.
Optionally, clear-text passwords to be encrypted can be the clear-text passwords being made of multiple numbers, and the clear-text passwords is such as Six clear-text passwords " 312645 " that can be made of number 1,2,3,4,5,6;The plaintext that can also be made of multiple letters is close Code, six passwords " bacedf " which can such as be made of alphabetical a, b, c, d, e, f;It can also be by alphabetical sum number The clear-text passwords of word composition, six passwords which can such as be made of number 1,2,3 and letter a, b, c "a2c1b3";Can also by letter, number and the clear-text passwords that form of underscore, the clear-text passwords such as can by number 1,2, Alphabetical a, b, c and six passwords " 12_cba " of underscore _ composition.
It should be understood that since the value range of the corresponding one or more encryption functions of curved section adjusted is often number Value range, for the ease of user setting include letter or underscore clear-text passwords, this specification embodiment can be preparatory The mapping table of letter and underscore and number is set, for example underscore can be set and correspond to number 10, alphabetical a corresponds to Number 11, alphabetical b correspond to number 12, etc..
It should be understood that the composition and digit of the above-mentioned clear-text passwords to be encrypted enumerated are a kind of illustrative explanation, The digit and particular content of letter included in clear-text passwords to be encrypted, number and underscore can be in practical applications Specifically it is arranged according to the memory habit of user and operation behavior habit, this specification one or more embodiment does not make this to have Body limits.
Assuming that it is " 312645 " that clear-text passwords to be encrypted, which includes multiple numbers, for the curved section shown in Fig. 2 (b), The curved section includes four sections, the value range of the corresponding encryption function of curved section between midpoint A to point M1 ' for [x0, X1 '], the value range of point M1 ' to the corresponding encryption function of curved section between point M2 ' is [x1 ', x2 '], point M2 ' to point M3 ' Between the value range of the corresponding encryption function of curved section be [x2 ', x3 '], the curved section that point M3 ' is arrived between point B is corresponding The value range of encryption function is [x3 ', x4].
So for clear-text passwords " 312645 " to be encrypted, it is first determined " 3 " belong to [x0, x1 '], [x1 ', x2 '], Which of [x2 ', x3 '] and [x3 ', x4] range, it is assumed that " 3 " belong to [x1 ', x2 '], then can determine " 3 " it is corresponding plus Close function is the corresponding encryption function E2 ' (X) of curved section between point M1 ' to point M2 ', is carried out based on the encryption function to " 3 " Encryption obtains E2 ' (3);
Determine that " 1 " belongs to which of [x0, x1 '], [x1 ', x2 '], [x2 ', x3 '] and [x3 ', x4] range, vacation again If " 1 " belongs to [x0, x1 '], then can determine curved section of " 1 " the corresponding encryption function between point A to point M1 ' it is corresponding plus Close function E1 ' (X) is encrypted " 1 " to obtain E1 ' (1) based on the encryption function;
Then determine that " 2 " belong to which of [x0, x1 '], [x1 ', x2 '], [x2 ', x3 '] and [x3 ', x4] range, Assuming that " 2 " belong to [x1 ', x2 '], then it can determine that " 2 " corresponding encryption function is the curved section pair that point M1 ' is arrived between point M2 ' The encryption function E2 ' (X) answered is encrypted " 1 " to obtain E2 ' (2) based on the encryption function;
And so on, successively determine " 6 ", " 4 ", " 5 " corresponding encryption function, and based at corresponding encryption function Manage obtained key, it is assumed that be E4 ' (6), E3 ' (4), E3 ' (5);It can so determine the clear-text passwords " 312645 " via right The key that the encryption function encryption answered obtains is the group of E2 ' (3), E1 ' (1), E2 ' (2), E4 ' (6), E3 ' (4), E3 ' (5) It closes.
Optionally, in one embodiment, it can be used as using the component for the method encapsulation that this specification embodiment provides One plug-in unit of target application, the plug-in unit can be used for the setting of the passwords such as the login password of target application, payment cipher, Yi Jideng The input of the passwords such as password and payment cipher is recorded, then after being encrypted to information, this method further include:
Based on encrypted information, the operation of at least one of register, delivery operation and transfer operation is executed.
By taking the scene set of the passwords such as the login password of target application, payment cipher as an example, it is assumed that user is downloading mesh Mark application after, register the account of the target application, generally require at this time user's manual setting target application login password and The passwords such as payment cipher.In this case, in the set interface of the passwords such as the login password of target application or payment cipher, The shape of the curve for the default that can be provided first for user's display systems, as shown in Fig. 2 (a), which is risen Point is point A, and terminal is point B, and there are several points between point A and point B, slide up and down for user.User can lead to Cross and slide up and down carried out to the several points between point A and point B, come change the default curve shape, in turn Realize the customized setting to the corresponding encryption function of curved section.
Confirmation operation, such as the curved section can be carried out to the curved section when user adjusts the shape of curved section after It may include " confirmation " and " cancellation " two buttons in display interface.When detecting that user clicks " confirmation " button, then show User has confirmed that the shape of the curved section, and completes the setting to the shape of the curved section.At this point it is possible to be carried out to the curved section It saves, so that user logs in next time or when delivery operation calls the curved section to input user clear-text passwords adds Close operation.
After the shape of the good curved section of user setting, the bright of setting can be inputted in the input frame that password is arranged Literary password, it should be appreciated that the clear-text passwords is not the actual login password of the target application or payment cipher, then, even if The clear-text passwords spies upon perhaps record screen by other people and also can not log in target application based on the clear-text passwords or pass through target application It carries out the operation such as paying.
The method of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption Not, and encryption function is determined by user's curved section adjusted, has very big randomness, is further improved reversed The difficulty cracked.
Fig. 3 is the structural schematic diagram of the encryption device 300 for the information that this specification embodiment provides.Referring to FIG. 3, one In kind embodiment, the encryption device 300 of information can include:
Generation unit 301, for generating initial curve on the screen, the initial curve includes at least one continuous bent Line segment;
Receiving unit 302 operates the adjustment of at least one section curved section for receiving user, and according to the adjustment Curved section described in operation adjustment;
Determination unit 303, for determining encryption function collection, wherein institute according at least one section of curved section adjusted Stating encryption function collection includes at least one encryption function, and a curved section corresponds to an encryption function;
Encryption unit 304, for treating encryption information and being encrypted according to the encryption function collection.
The device of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption Not, and encryption function is determined by user's curved section adjusted, has very big randomness, is further improved reversed The difficulty cracked.
Optionally, in one embodiment, it in the generation unit 301, is used for:
Two endpoints are generated on the screen, and at least one intermediate point is generated between described two endpoints;
It is sequentially connected the adjacent two o'clock on the screen according to predetermined manner, obtains at least one continuous curved section, institute It states at least one continuous curved section and forms the initial curve.
Optionally, in one embodiment, the generation unit 301, is used for:
It determines corresponding initial function between the adjacent two o'clock on the screen, is successively connected based on the initial function Connect the adjacent two o'clock on the screen;Or
The adjacent two o'clock on the screen is connected at random.
Optionally, in one embodiment, the receiving unit 302, is used for:
User is received to the moving operation of the endpoint or intermediate point, and according to after movement endpoint or intermediate point adjust institute State the curved section where endpoint or intermediate point.
Optionally, in one embodiment, the determination unit 303, is used for:
According to the coordinate of the starting point and terminal of the every adjusted curved section in the coordinate system pre-established, with And corresponding initial function, determine the corresponding encryption function of the every adjusted curved section;
Based on the corresponding encryption function of the every adjusted curved section, the encryption function collection is obtained.
Optionally, in one embodiment, the information to be encrypted includes clear-text passwords to be encrypted;
The encryption unit 304, is used for:
According to the encryption function collection, the clear-text passwords to be encrypted is encrypted, to generate key.
Optionally, in one embodiment, the clear-text passwords to be encrypted includes multiple numbers or text, and one adds Close function corresponds respectively to a value range;
The encryption unit 304, is used for:
The corresponding value range of each encryption function is concentrated based on the encryption function, is concentrated from the encryption function, really Fixed encryption function corresponding with the codomain of multiple numbers or text in the clear-text passwords to be encrypted;
It is right based on encryption function corresponding with the codomain of multiple numbers or text in the clear-text passwords to be encrypted Multiple numbers or text in the clear-text passwords to be encrypted are encrypted.
Optionally, in one embodiment, all curved sections adjusted are dull continuous, and institute adjusted It is also dull continuous by the curve that curved section forms.
The method that the encryption device 300 of information can be realized FIG. 1 to FIG. 2 embodiment, specifically refers to shown in FIG. 1 to FIG. 2 The encryption method of the information of embodiment, which is not described herein again.
Fig. 4 is the structural schematic diagram for the electronic equipment that one embodiment of this specification provides.Referring to FIG. 4, in hardware Level, the electronic equipment include processor, optionally further comprising internal bus, network interface, memory.Wherein, memory can It can include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-easy The property lost memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible to Including hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 4, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer The generating means of key are formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
The method of this specification embodiment can determine encryption function, encryption function on backstage by the shape of curved section It does not show on the screen, even if being spied upon or being recorded screen, can not also recover specific parameter, improve the safety level of encryption Not, the difficulty of reverse engineered is also further improved.
The encryption method of information disclosed in the above-mentioned embodiment illustrated in fig. 1 such as this specification can be applied in processor, or Person is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization, Each step of the above method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.On The processor stated can be at general processor, including central processing unit (Central Processing Unit, CPU), network Manage device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance Body pipe logical device, discrete hardware components.It may be implemented or execute and is in this specification one or more embodiment disclosed Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional Processor etc..The step of method in conjunction with disclosed in this specification one or more embodiment, can be embodied directly in hardware decoding Processor executes completion, or in decoding processor hardware and software module combination execute completion.Software module can position In random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register In the storage medium of equal this fields maturation.The storage medium is located at memory, and processor reads the information in memory, in conjunction with it Hardware completes the step of above method.
The electronic equipment can also carry out the encryption method of the information of Fig. 1, and details are not described herein for this specification.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each Logic unit is also possible to hardware or logical device.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, and the instruction is when by the portable electronic including multiple application programs When equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following behaviour Make:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding song of the adjustment operation adjustment Line segment;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes At least one encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each Logic unit is also possible to hardware or logical device.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification Range.With within principle, made any modification, changes equivalent replacement all spirit in this specification one or more embodiment Into etc., it should be included within the protection scope of this specification one or more embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.

Claims (10)

1. a kind of encryption method of information characterized by comprising
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding curve of the adjustment operation adjustment Section;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes at least One encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
2. the method as described in claim 1, which is characterized in that generating initial curve on the screen includes:
Two endpoints are generated on the screen, and at least one intermediate point is generated between described two endpoints;
Be sequentially connected the adjacent two o'clock on the screen according to predetermined manner, obtain at least one continuous curved section, it is described extremely A few continuous curved section forms the initial curve.
3. method according to claim 2, which is characterized in that adjacent two be sequentially connected according to predetermined manner on the screen Point, comprising:
It determines corresponding initial function between the adjacent two o'clock on the screen, institute is sequentially connected based on the initial function State the adjacent two o'clock on screen;Or
The adjacent two o'clock on the screen is connected at random.
4. method according to claim 2, which is characterized in that it receives user and the adjustment of the curved section is operated, and according to Curved section described in the adjustment operation adjustment, comprising:
User is received to the moving operation of the endpoint or intermediate point, and according to after movement endpoint or intermediate point adjust the end Curved section where point or intermediate point.
5. method as claimed in claim 3, which is characterized in that according to adjusted at least one curved section, determine and add Close collection of functions, comprising:
According to coordinate in the coordinate system pre-established of the starting point and terminal of the every adjusted curved section and right The initial function answered determines the corresponding encryption function of the every adjusted curved section;
Based on the corresponding encryption function of the every adjusted curved section, the encryption function collection is obtained.
6. the method as described in claim 1, which is characterized in that the information to be encrypted includes clear-text passwords to be encrypted;
According to the encryption function collection, treats encryption information and carry out encryption and include:
According to the encryption function collection, the clear-text passwords to be encrypted is encrypted, to generate key.
7. method as claimed in claim 6, which is characterized in that the clear-text passwords to be encrypted includes multiple numbers or text Word, an encryption function correspond respectively to a value range;
According to the encryption function collection, the clear-text passwords to be encrypted is encrypted, comprising:
Concentrate the corresponding value range of each encryption function based on the encryption function, concentrated from the encryption function, determine with The corresponding encryption function of codomain of multiple numbers or text in the clear-text passwords to be encrypted;
Based on encryption function corresponding with the codomain of multiple numbers or text in the clear-text passwords to be encrypted, to described Multiple numbers or text in clear-text passwords to be encrypted are encrypted.
8. the method as described in claim 1, which is characterized in that all curved sections adjusted are dull continuous, and are adjusted The curve of all curved sections composition after whole is also dull continuous.
9. a kind of encryption device of information characterized by comprising
Generation unit, for generating initial curve on the screen, the initial curve includes at least one continuous curved section;
Receiving unit operates the adjustment of at least one curved section for receiving user, and is operated and adjusted according to the adjustment The whole corresponding curved section;
Determination unit, for determining encryption function collection, wherein the encryption according to adjusted at least one curved section Collection of functions includes at least one encryption function, and a curved section corresponds to an encryption function;
Encryption unit, for treating encryption information and being encrypted according to the encryption function collection.
10. a kind of electronic equipment, the electronic equipment include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Initial curve is generated on the screen, and the initial curve includes at least one continuous curved section;
It receives user to operate the adjustment of at least one curved section, and according to the corresponding curve of the adjustment operation adjustment Section;
According to adjusted at least one curved section, encryption function collection is determined, wherein the encryption function collection includes at least One encryption function, and a curved section corresponds to an encryption function;
According to the encryption function collection, treats encryption information and encrypted.
CN201910588230.7A 2019-07-02 2019-07-02 Information encryption method and device and electronic equipment Active CN110336669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910588230.7A CN110336669B (en) 2019-07-02 2019-07-02 Information encryption method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910588230.7A CN110336669B (en) 2019-07-02 2019-07-02 Information encryption method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN110336669A true CN110336669A (en) 2019-10-15
CN110336669B CN110336669B (en) 2022-09-09

Family

ID=68144624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910588230.7A Active CN110336669B (en) 2019-07-02 2019-07-02 Information encryption method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110336669B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995749A (en) * 2019-12-17 2020-04-10 北京海益同展信息科技有限公司 Block chain encryption method and device, electronic equipment and storage medium
WO2022068358A1 (en) * 2020-09-29 2022-04-07 深圳壹账通智能科技有限公司 Encryption method and apparatus for generating keys on basis of attributes of information, and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020018560A1 (en) * 2000-06-22 2002-02-14 Lauter Kristin E. Cryptosystem based on a jacobian of a curve
CN104471892A (en) * 2011-12-02 2015-03-25 巴克莱银行公开有限公司 User access control based on a graphical signature
CN107404383A (en) * 2017-09-12 2017-11-28 四川阵风科技有限公司 The generation method and device of digital signature
CN108259505A (en) * 2018-01-31 2018-07-06 大连大学 A kind of ECC lightweight encryption methods for terminal mini-plant

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020018560A1 (en) * 2000-06-22 2002-02-14 Lauter Kristin E. Cryptosystem based on a jacobian of a curve
CN104471892A (en) * 2011-12-02 2015-03-25 巴克莱银行公开有限公司 User access control based on a graphical signature
CN107404383A (en) * 2017-09-12 2017-11-28 四川阵风科技有限公司 The generation method and device of digital signature
CN108259505A (en) * 2018-01-31 2018-07-06 大连大学 A kind of ECC lightweight encryption methods for terminal mini-plant

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995749A (en) * 2019-12-17 2020-04-10 北京海益同展信息科技有限公司 Block chain encryption method and device, electronic equipment and storage medium
WO2022068358A1 (en) * 2020-09-29 2022-04-07 深圳壹账通智能科技有限公司 Encryption method and apparatus for generating keys on basis of attributes of information, and device

Also Published As

Publication number Publication date
CN110336669B (en) 2022-09-09

Similar Documents

Publication Publication Date Title
EP3917075B1 (en) Method and apparatus for encrypting and decrypting product information
CN111885024B (en) Login information processing method and equipment
US9407632B2 (en) Transformation rules for one-time passwords
CN109934585B (en) Signature method, device and system based on secure multiparty calculation
EP2973167B1 (en) Techniques for securing use of one-time passwords
US9628274B1 (en) Hardening tokenization security and key rotation
CN110162551B (en) Data processing method and device and electronic equipment
CN108364223A (en) A kind of method and device of Data Audit
CN104573551A (en) File processing method and mobile terminal
CN104463013A (en) Mobile terminal and data encryption method thereof
CN109687966A (en) Encryption method and its system
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN105809000A (en) Information processing method and electronic device
CN105069365A (en) Data processing method and mobile terminal
CN107133524A (en) A kind of date storage method and device
CN109800582A (en) Multiparty data processing method, device and the equipment that can be traced to the source
CN110336669A (en) A kind of encryption method of information, device and electronic equipment
CN106446697A (en) Method and device for saving private data
US8774400B2 (en) Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem
CN110445768A (en) A kind of login method, device and electronic equipment
CN107592963B (en) Method and computing device for performing secure computations
CN107889102B (en) Method and device for encrypting and decrypting information in short message
CN111092721B (en) Method and device for setting access password
WO2020181427A1 (en) Signing method, device, and system employing secure multi-party computation
WO2017215436A1 (en) Information encryption and decryption method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant