CN104092550A - Password protection method, system and device - Google Patents
Password protection method, system and device Download PDFInfo
- Publication number
- CN104092550A CN104092550A CN201410352498.8A CN201410352498A CN104092550A CN 104092550 A CN104092550 A CN 104092550A CN 201410352498 A CN201410352498 A CN 201410352498A CN 104092550 A CN104092550 A CN 104092550A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- password
- protection equipment
- mark
- password protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a password protection method, system and device. The method comprises the steps that a password protection apparatus receives a password report message from an intelligent apparatus, wherein the password report message contains the identification of the intelligent apparatus, the identification of an application scene and encrypted password information; after the intelligent apparatus passes verification successfully, the identification of the application scene and the corresponding encrypted password information are stored; the password protection apparatus receives a password request message from the intelligent apparatus, the password request message contains the identification of the intelligent apparatus and the identification of the application scene; after the intelligent apparatus passes verification successfully, the corresponding encrypted password information is searched for according to the identification of the application scene, and the found encrypted password information is fed back to the intelligent apparatus; the intelligent apparatus decrypts the encrypted password information, and the decrypted password information is input into the application scene. According to the password protection method, system and device, the risk that password information is stolen because the password information is photographed or recorded can be avoided.
Description
Technical field
The present invention relates to cipher application technical field, relate in particular to a kind of cipher code protection method, system and device.
Background technology
Along with getting more and more of cellphone subscriber, the functional diversities of mobile phone application, utilizes mobile phone to surf the Net, chat, shopping etc., people's life easily greatly.
Under different application scenarioss, user need to input the encrypted messages such as username and password conventionally on mobile phone screen or keyboard, for login application program (as E-mail address, Web bank, immediate communication tool etc.), therefore user need to remember a large amount of encrypted messages, no matter be input or remember these encrypted messages, all brought extremely inconvenient experience to user.More seriously, input password on mobile phone screen or keyboard time, there is the possibility of the record that is taken, therefore bring the risk that password is stolen.
Summary of the invention
The invention provides a kind of cipher code protection method, can avoid encrypted message because of the risk being taken or record is stolen.
The invention provides cipher protection system and device, can avoid encrypted message because of the risk being taken or record is stolen.
Technical scheme of the present invention is achieved in that
A kind of cipher code protection method, comprising:
Password protection equipment receives the password reporting message from smart machine, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption; After described smart machine is proved to be successful, preserve the encrypted message after the mark of described application scenarios and the encryption of correspondence;
Password protection equipment receives the password request message from smart machine, the mark that described password request message comprises smart machine and the mark of application scenarios; After described smart machine is proved to be successful, search the encrypted message after corresponding encryption according to the mark of described application scenarios, the encrypted message after the encryption finding is fed back to described smart machine;
Described smart machine is decrypted the encrypted message after encrypting, and inputs the encrypted message after described deciphering in described application scenarios.
A kind of cipher protection system, comprising: password protection equipment and more than one smart machine, wherein:
Described password protection equipment, for receiving the password reporting message from smart machine, encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, after described smart machine is proved to be successful, preserve the encrypted message after the mark of described application scenarios and the encryption of correspondence; Also for receiving the password request message from smart machine, the mark that described password request message comprises smart machine and the mark of application scenarios, after described smart machine is proved to be successful, search the encrypted message after corresponding encryption according to the mark of described application scenarios, the encrypted message after the encryption finding is fed back to described smart machine;
Described smart machine for report password reporting message and password request message to password protection equipment, also, for the encrypted message after the encryption of password protection equipment feedback is decrypted, is inputted the encrypted message after described deciphering in described application scenarios.
A kind of password protection equipment, comprising:
Interactive module, for receiving the mark of smart machine, receives password reporting message and password request message from smart machine, and feeds back the encrypted message after encrypting to smart machine; Wherein, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, the mark that described password request message comprises smart machine and the mark of application scenarios;
Smart machine identification module, for preserving the mark of smart machine; The password reporting message and the password request message that receive for interactive module, the mark that judges whether to preserve the smart machine in described password reporting message or password request message, if preserved, is proved to be successful described smart machine;
Encrypting and decrypting module, for preserving the PKI of password protection equipment and the PKI of private key and smart machine; The private key that adopts described password protection equipment is decrypted the encrypted message after encrypting in password reporting message, then the information after deciphering is encrypted with the PKI of smart machine;
Encrypted message memory module, for storing the encrypted message after the mark of application scenarios and the use public key encryption of smart machine of correspondence;
Encrypted message is selected module, searches encrypted message memory module for the mark of the application scenarios that adopts password request message, obtains correspondingly to the encrypted message after the public key encryption of smart machine, feeds back to smart machine for interactive module.
A smart machine of realizing cryptoguard, comprising:
Interactive module, for sending password reporting message and password request message to password protection equipment, and receives the encrypted message after the encryption of password protection equipment feedback; Wherein, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, the mark that described password request message comprises smart machine and the mark of application scenarios;
Smart machine mark memory module, for storing the mark of described smart machine;
Encrypting and decrypting module, for preserving the PKI of smart machine and the PKI of private key and password protection equipment; The encrypted message that needs are sent adopts the PKI of password protection equipment to be encrypted, and adopts the private key of smart machine to be decrypted the encrypted message after the encryption receiving;
Foreground application detection module, for detection of foreground application, offers interactive module by the mark of application scenarios.
Visible, cipher code protection method, system and device that the present invention proposes, preserve the encrypted message of smart machine in different application scene in advance by password protection equipment; In the time that smart machine need to be inputted encrypted message, input in application scenarios directly to password protection equipment acquisition request encrypted message, and by the encrypted message obtaining.This mode is without inputting manually encrypted message, thus can avoid encrypted message in manual input process because of be taken or record stolen.
Brief description of the drawings
Fig. 1 is the cipher code protection method realization flow figure that the present invention proposes;
Fig. 2 is the realization flow figure of embodiment mono-;
Fig. 3 is the realization flow figure of embodiment bis-;
Fig. 4 is the realization flow figure of embodiment tri-;
Fig. 5 is the cipher protection system structural representation that the present invention proposes;
Fig. 6 is the password protection equipment structural representation that the present invention proposes;
Fig. 7 is the intelligent terminal structural representation of realizing cryptoguard that the present invention proposes.
Embodiment
The present invention proposes a kind of cipher code protection method, if Fig. 1 is the method realization flow figure, comprising:
Step 101: password protection equipment receives the password reporting message from smart machine, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption;
Step 102: password protection equipment, after described smart machine is proved to be successful, is preserved the encrypted message after the mark of described application scenarios and the encryption of correspondence;
Step 103: password protection equipment receives the password request message from smart machine, the mark that described password request message comprises smart machine and the mark of application scenarios;
Step 104: password protection equipment, after described smart machine is proved to be successful, is searched the encrypted message after corresponding encryption according to the mark of described application scenarios, and the encrypted message after the encryption finding is fed back to described smart machine;
Step 105: smart machine is decrypted the encrypted message after encrypting, and inputs the encrypted message after described deciphering in described application scenarios.
The information such as user name, password that need to input when above-mentioned encrypted message can comprise login application scenarios.
Before smart machine reports encrypted message to password protection equipment, smart machine and password protection equipment can carry out initialization pairing in advance, to carry out afterwards checking each other.Particularly:
Before above-mentioned steps 101, further comprise: described password protection equipment receives and preserve the mark of smart machine, and described smart machine receives and preserves the mark of password protection equipment;
Correspondingly, in above-mentioned steps 102 or step 104, password protection equipment to the mode of smart machine checking can be: judge whether to preserve the mark of the smart machine in described password reporting message or password request message, if preserved, described smart machine is proved to be successful;
In above-mentioned steps 104, password protection equipment can be further by the identification feedback of password protection equipment to smart machine; Smart machine judges whether to preserve the mark of described password protection equipment, if preserved, judges described password protection equipment is proved to be successful, and further performs step 105.
In order to ensure the fail safe of encrypted message in transmitting procedure, after can encrypting encrypted message, transmit again.Cryptographic algorithm can adopt symmetric key encryption or asymmetric-key encryption.
If employing asymmetric-key encryption, smart machine and password protection equipment exchange PKI, and exchanging PKI process can synchronize and carry out with the initialization process of matching; In the time sending encrypted message, adopt recipient's PKI to be encrypted; In the time receiving encrypted message, adopt the private key of self to be decrypted.Particularly:
Before above-mentioned steps 101, may further include: password protection equipment is preserved PKI and the private key of password protection equipment, and the PKI of password protection equipment is sent to smart machine, smart machine is preserved the PKI of password protection equipment; And smart machine is preserved PKI and the private key of smart machine, and the PKI of smart machine is sent to password protection equipment, password protection equipment is preserved the PKI of smart machine;
Encrypted message after encryption in above-mentioned steps 101 is: the encrypted message after the public key encryption of employing password protection equipment;
In above-mentioned steps 102, password protection equipment is after being proved to be successful described smart machine, first adopt the private key of password protection equipment to be decrypted the information after encrypting, adopt again the PKI of smart machine to be encrypted the information after deciphering, obtain the encrypted message after re-encrypted, preserve the encrypted message after the mark of application scenarios and the re-encrypted of correspondence;
Encrypted message after the encryption of the feedback in above-mentioned steps 104 is: the encrypted message after the public key encryption of employing smart machine;
In above-mentioned steps 105, smart machine adopts the private key of smart machine to be decrypted the encrypted message after encrypting.
If employing symmetric key encryption, smart machine and password protection equipment can be preserved identical symmetric key in advance, in the time sending encrypted message, adopt this symmetric key to be encrypted; In the time receiving encrypted message, adopt this symmetric key to be decrypted.Particularly:
Before above-mentioned steps 101, may further include: password protection equipment and smart machine are preserved identical symmetric key;
Encrypted message after encryption in above-mentioned steps 101 is: adopt the encrypted message after described symmetric key encryption;
In above-mentioned steps 105, smart machine adopts described symmetric key to be decrypted the encrypted message after encrypting.
In addition, other information except enciphered message of transmitting in said process, as information such as the marks of the mark of the mark of smart machine, application scenarios, password protection equipment, also can adopt cryptographic algorithm encrypt after transmit again.
Smart machine can adopt the modes such as bluetooth, NFC or WIFI to communicate by letter with password protection equipment.Smart machine can be specially the equipment such as smart mobile phone, panel computer; Password protection equipment can be specially wearable smart machine etc.; In following examples, smart machine is specially to smart mobile phone, and password protection equipment is specially to wearable smart machine is introduced.
Below lifting specific embodiment introduces in detail.
Embodiment mono-:
The present embodiment is introduced initialization pairing and the exchange of public keys process of smart mobile phone and wearable smart machine.As the realization flow figure that Fig. 2 is the present embodiment, comprising:
Step 201: smart mobile phone and wearable smart machine enter respectively initialization pairing mode.
Step 202: smart mobile phone and wearable smart machine are asked respectively the other side's mark (ID) and PKI.
Step 203: smart mobile phone and wearable smart machine send respectively ID and the PKI of self to the other side.
Step 204: smart mobile phone and wearable smart machine receive respectively and preserve the other side's ID and PKI.
By said process, smart mobile phone and wearable smart machine have completed initialization pairing and exchange of public keys.Wearable smart machine can carry out initialization pairing with multiple smart mobile phones, realizes the encrypted message management to individual smart mobile phone.
After exchange of public keys, in smart mobile phone, preserve the PKI of smart mobile phone and the PKI of private key and wearable smart machine, in the time of follow-up transmission encrypted message, adopt the PKI of wearable smart machine to encrypt rear transmission to encrypted message; While receiving encrypted message, adopt the private key deciphering of smart mobile phone.In wearable smart machine, preserve the PKI of wearable smart machine and the PKI of private key and smart mobile phone, in the time of follow-up transmission encrypted message, adopt the PKI of smart mobile phone to encrypt rear transmission to encrypted message; While receiving encrypted message, adopt the private key deciphering of wearable smart machine.
Embodiment bis-:
The present embodiment is introduced smart mobile phone and reports to wearable smart machine the process of encrypted message, and in the present embodiment, encrypted message specifically comprises username and password.As the realization flow figure that Fig. 3 is the present embodiment, comprising:
Step 301: smart mobile phone is collected foreground application scene.
Step 302: smart mobile phone obtains the ID of smart mobile phone.
Step 303: smart mobile phone obtains the username and password in this application scenarios of user's input.
Step 304: smart mobile phone adopts ID, the username and password of the PKI of wearable smart machine to the ID of smart mobile phone, application scenarios to be encrypted.
Step 305: the information after encrypting is sent to wearable smart machine by smart mobile phone.
Step 306: wearable smart machine adopts the private key of wearable smart machine to be decrypted the information receiving; Obtain ID, the ID of application scenarios, the username and password of smart mobile phone.
Step 307: wearable smart machine judges whether self has preserved the ID of this smart mobile phone, if preserved, to being proved to be successful of this smart mobile phone, continues execution step 308.
Step 308: wearable smart machine adopts the PKI of smart mobile phone to be encrypted username and password, the corresponding relation of the username and password after ID and the encryption of preservation application scenarios, sets up application scenarios list index.If following table 1 is application scenarios list index example, in table 1, " * * * * * " represents by the ciphertext after the public key encryption of smart mobile phone.
Sequence number | Apply Names | User name | Password |
1 | Netease's mailbox | ***** | ***** |
2 | Alipay | ***** | ***** |
3 | Hotmail mailbox | ***** | ***** |
4 | ***** | ***** |
Table 1
Step 309: wearable smart machine is to the successful message of smart mobile phone feedback store.
By repeating said process, wearable smart machine can receive the encrypted message that more than smart mobile phone reports, and preserves the username and password that multiple application scenarioss are corresponding; Follow-up in the time of the request of receiving smart mobile phone, corresponding encrypted message is fed back to smart mobile phone.
Embodiment tri-:
The present embodiment is introduced smart mobile phone and obtains from wearable smart machine the process of encrypted message.As the realization flow figure that Fig. 4 is the present embodiment, comprising:
Step 401: smart mobile phone is collected foreground application scene.
Step 402: smart mobile phone obtains the ID of smart mobile phone.
Step 403: the ID of the PKI that smart mobile phone adopts wearable smart machine to smart mobile phone and the ID of application scenarios are encrypted.
Step 404: the information after encrypting is sent to wearable smart machine by smart mobile phone, asks the encrypted message that this application scenarios is corresponding.
Step 405: wearable smart machine adopts the private key of wearable smart machine to be decrypted the information receiving; Obtain the ID of smart mobile phone and the ID of application scenarios.
Step 406: wearable smart machine judges whether self has preserved the ID of this smart mobile phone, if preserved, to being proved to be successful of this smart mobile phone, continues execution step 407.
Step 407: wearable smart machine adopts the ID of this application scenarios to search the username and password after corresponding encryption, if found, continues execution step 408.
Step 408: wearable smart machine adopts the ID of the wearable smart machine of public key encryption of smart mobile phone, and the username and password after the ID of the wearable smart machine after encrypting, encryption is sent to smart mobile phone.
Step 409: smart mobile phone adopts the private key of smart mobile phone to be decrypted the information receiving, and obtains ID, the username and password of wearable smart machine.
Step 410: smart mobile phone judges whether self has preserved the ID of this wearable smart machine, if preserved, to being proved to be successful of this wearable smart machine, continues execution step 411.
Step 411: smart mobile phone is inputted username and password in application scenarios, login application program.
In the present embodiment, directly username and password is inputted to application scenarios by smart mobile phone, do not need to input encrypted message at screen or keyboard manually, thereby the risk of having avoided encrypted message to be stolen in manual input process.
In above-described embodiment two and embodiment tri-, the information except encrypted message has also been done encryption in the time sending; The present invention yet can not do encryption and directly send the information except encrypted message.
The present invention also proposes a kind of cipher protection system, if Fig. 5 is this system configuration schematic diagram, comprises password protection equipment 501 and more than one smart machine 502, wherein:
Password protection equipment 501, for receiving the password reporting message from smart machine 502, encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, after described smart machine is proved to be successful, preserve the encrypted message after the mark of described application scenarios and the encryption of correspondence; Also for receiving the password request message from smart machine, the mark that described password request message comprises smart machine and the mark of application scenarios, after described smart machine is proved to be successful, search the encrypted message after corresponding encryption according to the mark of described application scenarios, the encrypted message after the encryption finding is fed back to described smart machine;
Described smart machine 502 for report password reporting message and password request message to password protection equipment, also, for the encrypted message after the encryption of password protection equipment feedback is decrypted, is inputted the encrypted message after described deciphering in described application scenarios.
In said system,
Password protection equipment 501 can also be used for, and receives and preserve the mark of smart machine; Password protection equipment to the mode of smart machine checking is: judge whether to preserve the mark of the smart machine in described password reporting message or password request message, if preserved, described smart machine is proved to be successful; Password protection equipment is by the encrypted message after encrypting while feeding back to smart machine, further by the identification feedback of password protection equipment to smart machine;
Described smart machine 502 can also be used for, and receives and preserve the mark of password protection equipment; Judge whether to preserve the mark of described password protection equipment, if preserved, judge described password protection equipment is proved to be successful, further the encrypted message after the encryption of password protection equipment feedback is decrypted.
In said system,
Password protection equipment 501 can also be used for, and preserves PKI and the private key of password protection equipment, and the PKI of password protection equipment is sent to smart machine, receives and preserve the PKI of smart machine; Receiving after password reporting message, information after adopting the private key of password protection equipment to the encryption in password reporting message is decrypted, adopt again the PKI of smart machine to be encrypted the information after deciphering, obtain the encrypted message after re-encrypted, preserve the encrypted message after the mark of described application scenarios and the re-encrypted of correspondence;
Described smart machine 502 can also be used for, and preserves PKI and the private key of smart machine, and the PKI of smart machine is sent to password protection equipment, receives and preserve the PKI of password protection equipment; Before sending password reporting message, adopt the PKI of password protection equipment to be encrypted encrypted message; After encrypted message after the encryption that receives password protection equipment feedback, adopt the private key of smart machine to be decrypted the encrypted message after encrypting.
The present invention also proposes a kind of password protection equipment, as the structural scheme of mechanism that Fig. 6 is this password protection equipment, comprising:
Interactive module 601, for receiving the mark of smart machine, receives password reporting message and password request message from smart machine, and feeds back the encrypted message after encrypting to smart machine; Wherein, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, the mark that described password request message comprises smart machine and the mark of application scenarios;
Smart machine identification module 602, for preserving the mark of smart machine; The password reporting message receiving for interactive module 601 and password request message, the mark that judges whether to preserve the smart machine in described password reporting message or password request message, if preserved, is proved to be successful described smart machine;
Encrypting and decrypting module 603, for preserving the PKI of password protection equipment and the PKI of private key and smart machine; The private key that adopts described password protection equipment is decrypted the encrypted message after encrypting in password reporting message, then the information after deciphering is encrypted with the PKI of smart machine;
Encrypted message memory module 604, for storing the encrypted message after the mark of application scenarios and the use public key encryption of smart machine of correspondence;
Encrypted message is selected module 605, searches encrypted message memory module 604 for the mark of the application scenarios that adopts password request message, obtains correspondingly to the encrypted message after the public key encryption of smart machine, feeds back to smart machine for interactive module 601.
Above-mentioned password protection equipment can also comprise: password protection equipment mark memory module 606, for storing the mark of password protection equipment;
When described interactive module 601 is fed back the encrypted message after encrypting to smart machine, the further mark of feedback cipher protection equipment.
In above-mentioned password protection equipment, interactive module 601 can also be used for, and sends the PKI of password protection equipment to smart machine, and receives the PKI from the smart machine of smart machine.
Above-mentioned password protection equipment can also comprise:
Subscriber identification module 607, for preserving in advance user's identifying information; In the time receiving the identifying information of user input, judge whether to preserve this identifying information, if preserved, to being proved to be successful of this user, allow this user protection equipment that accesses to your password.
Wherein, user's identifying information can be user's fingerprint, face information etc.
The present invention also proposes a kind of smart machine of realizing cryptoguard, as the structural representation that Fig. 7 is this smart machine, comprising:
Interactive module 701, for sending password reporting message and password request message to password protection equipment, and receives the encrypted message after the encryption of password protection equipment feedback; Wherein, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, the mark that described password request message comprises smart machine and the mark of application scenarios;
Smart machine mark memory module 702, for storing the mark of described smart machine;
Encrypting and decrypting module 703, for preserving the PKI of smart machine and the PKI of private key and password protection equipment; The encrypted message that needs are sent adopts the PKI of password protection equipment to be encrypted, and adopts the private key of smart machine to be decrypted the encrypted message after the encryption receiving;
Foreground application detection module 704, for detection of foreground application, offers interactive module 701 by the mark of application scenarios.
Above-mentioned smart machine can also comprise:
Password protection equipment identification module 705, for preserving the mark of password protection equipment; Encrypted message after the encryption receiving for interactive module 701, judges whether to preserve the mark of password protection equipment, if preserved, described password protection equipment is proved to be successful.
In above-mentioned smart machine, interactive module 701 can also be used for, and sends the PKI of smart machine to password protection equipment, and receives the PKI from the password protection equipment of password protection equipment.
Above-mentioned password protection equipment can also comprise:
Subscriber identification module 706, for preserving in advance user's identifying information; In the time receiving the identifying information of user input, judge whether to preserve this identifying information, if preserved,, to being proved to be successful of this user, allow this user to use smart machine.
Wherein, user's identifying information can be user's fingerprint, face information etc.
In sum; the method, system and device of realizing cryptoguard that the present invention proposes; mode by from intelligent terminal to the wearable smart machine request username and password of user cipher protection; directly get username and password; and the username and password obtaining is input in application scenarios, hide keyboard when user uses and inputted the mode of user name and Password Input and login.The experience having great convenience for the user.Make user's user name password obtain effective protection.User is memory cipher again, need to be at loaded down with trivial details characters such as the interface input username and passwords of application, and the user's of raising experience has ensured user name simultaneously, the safety of password, can avoid being taken and the password that causes is revealed.Even if intelligent terminal is lost the leakage that also can not cause password, because intelligent terminal does not exist the storage of user and password, use safer.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of making, be equal to replacement, improvement etc., within all should being included in the scope of protection of the invention.
Claims (15)
1. a cipher code protection method, is characterized in that, described method comprises:
Password protection equipment receives the password reporting message from smart machine, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption; After described smart machine is proved to be successful, preserve the encrypted message after the mark of described application scenarios and the encryption of correspondence;
Password protection equipment receives the password request message from smart machine, the mark that described password request message comprises smart machine and the mark of application scenarios; After described smart machine is proved to be successful, search the encrypted message after corresponding encryption according to the mark of described application scenarios, the encrypted message after the encryption finding is fed back to described smart machine;
Described smart machine is decrypted the encrypted message after encrypting, and inputs the encrypted message after described deciphering in described application scenarios.
2. method according to claim 1, it is characterized in that, before described password protection equipment receives the password reporting message from smart machine, further comprise: described password protection equipment receives and preserve the mark of smart machine, and described smart machine receives and preserves the mark of password protection equipment;
Described password protection equipment to the mode of smart machine checking is: judge whether to preserve the mark of the smart machine in described password reporting message or password request message, if preserved, described smart machine is proved to be successful;
Described password protection equipment is by the encrypted message after encrypting while feeding back to smart machine, further by the identification feedback of password protection equipment to smart machine; Smart machine judges whether to preserve the mark of described password protection equipment, if preserved, judges described password protection equipment is proved to be successful, and further carries out the described step that encrypted message after encrypting is decrypted.
3. method according to claim 1 and 2, it is characterized in that, before password protection equipment receives the password reporting message from smart machine, further comprise: password protection equipment is preserved PKI and the private key of password protection equipment, the PKI of password protection equipment is sent to smart machine, and smart machine is preserved the PKI of password protection equipment; And smart machine is preserved PKI and the private key of smart machine, and the PKI of smart machine is sent to password protection equipment, password protection equipment is preserved the PKI of smart machine;
Encrypted message after encryption in described password reporting message is: the encrypted message after the public key encryption of employing password protection equipment;
The mode that described password protection equipment is preserved the encrypted message after the mark of application scenarios and the encryption of correspondence is: adopt the private key of password protection equipment to be decrypted the information after encrypting, adopt again the PKI of smart machine to be encrypted the information after deciphering, obtain the encrypted message after re-encrypted, preserve the encrypted message after the mark of described application scenarios and the re-encrypted of correspondence;
The mode that smart machine is decrypted the encrypted message after encrypting is: adopt the private key of smart machine to be decrypted the encrypted message after encrypting.
4. method according to claim 1 and 2, is characterized in that, password protection equipment further comprises: password protection equipment and smart machine are preserved identical symmetric key before receiving the password reporting message from smart machine;
Encrypted message after encryption in described password reporting message is: adopt the encrypted message after described symmetric key encryption;
The mode that smart machine is decrypted the encrypted message after encrypting is: adopt described symmetric key to be decrypted the encrypted message after encrypting.
5. a cipher protection system, is characterized in that, described system comprises: password protection equipment and more than one smart machine, wherein:
Described password protection equipment, for receiving the password reporting message from smart machine, encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, after described smart machine is proved to be successful, preserve the encrypted message after the mark of described application scenarios and the encryption of correspondence; Also for receiving the password request message from smart machine, the mark that described password request message comprises smart machine and the mark of application scenarios, after described smart machine is proved to be successful, search the encrypted message after corresponding encryption according to the mark of described application scenarios, the encrypted message after the encryption finding is fed back to described smart machine;
Described smart machine for report password reporting message and password request message to password protection equipment, also, for the encrypted message after the encryption of password protection equipment feedback is decrypted, is inputted the encrypted message after described deciphering in described application scenarios.
6. system according to claim 5, is characterized in that,
Described password protection equipment is also for, the mark that receives and preserve smart machine; Password protection equipment to the mode of smart machine checking is: judge whether to preserve the mark of the smart machine in described password reporting message or password request message, if preserved, described smart machine is proved to be successful; Password protection equipment is by the encrypted message after encrypting while feeding back to smart machine, further by the identification feedback of password protection equipment to smart machine;
Described smart machine is also for, the mark that receives and preserve password protection equipment; Judge whether to preserve the mark of described password protection equipment, if preserved, judge described password protection equipment is proved to be successful, further the encrypted message after the encryption of password protection equipment feedback is decrypted.
7. according to the system described in claim 5 or 6, it is characterized in that,
Password protection equipment also for, preserve PKI and the private key of password protection equipment, the PKI of password protection equipment is sent to smart machine, receive and preserve the PKI of smart machine; Receiving after password reporting message, information after adopting the private key of password protection equipment to the encryption in password reporting message is decrypted, adopt again the PKI of smart machine to be encrypted the information after deciphering, obtain the encrypted message after re-encrypted, preserve the encrypted message after the mark of described application scenarios and the re-encrypted of correspondence;
Described smart machine also for, preserve PKI and the private key of smart machine, the PKI of smart machine is sent to password protection equipment, receive and preserve the PKI of password protection equipment; Before sending password reporting message, adopt the PKI of password protection equipment to be encrypted encrypted message; After encrypted message after the encryption that receives password protection equipment feedback, adopt the private key of smart machine to be decrypted the encrypted message after encrypting.
8. a password protection equipment, is characterized in that, described password protection equipment comprises:
Interactive module, for receiving the mark of smart machine, receives password reporting message and password request message from smart machine, and feeds back the encrypted message after encrypting to smart machine; Wherein, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, the mark that described password request message comprises smart machine and the mark of application scenarios;
Smart machine identification module, for preserving the mark of smart machine; The password reporting message and the password request message that receive for interactive module, the mark that judges whether to preserve the smart machine in described password reporting message or password request message, if preserved, is proved to be successful described smart machine;
Encrypting and decrypting module, for preserving the PKI of password protection equipment and the PKI of private key and smart machine; The private key that adopts described password protection equipment is decrypted the encrypted message after encrypting in password reporting message, then the information after deciphering is encrypted with the PKI of smart machine;
Encrypted message memory module, for storing the encrypted message after the mark of application scenarios and the use public key encryption of smart machine of correspondence;
Encrypted message is selected module, searches encrypted message memory module for the mark of the application scenarios that adopts password request message, obtains correspondingly to the encrypted message after the public key encryption of smart machine, feeds back to smart machine for interactive module.
9. password protection equipment according to claim 8, is characterized in that, described password protection equipment also comprises: password protection equipment mark memory module, for storing the mark of password protection equipment;
When described interactive module is fed back the encrypted message after encrypting to smart machine, the further mark of feedback cipher protection equipment.
10. password protection equipment according to claim 8 or claim 9, is characterized in that, described interactive module also for, send the PKI of password protection equipment to smart machine, and receive the PKI from the smart machine of smart machine.
11. password protection equipments according to claim 8 or claim 9, is characterized in that, described password protection equipment also comprises:
Subscriber identification module, for preserving in advance user's identifying information; In the time receiving the identifying information of user input, judge whether to preserve this identifying information, if preserved, to being proved to be successful of this user, allow this user protection equipment that accesses to your password.
Realize the smart machine of cryptoguard for 12. 1 kinds, it is characterized in that, described smart machine comprises:
Interactive module, for sending password reporting message and password request message to password protection equipment, and receives the encrypted message after the encryption of password protection equipment feedback; Wherein, the encrypted message after the mark that described password reporting message comprises smart machine, the mark of application scenarios and encryption, the mark that described password request message comprises smart machine and the mark of application scenarios;
Smart machine mark memory module, for storing the mark of described smart machine;
Encrypting and decrypting module, for preserving the PKI of smart machine and the PKI of private key and password protection equipment; The encrypted message that needs are sent adopts the PKI of password protection equipment to be encrypted, and adopts the private key of smart machine to be decrypted the encrypted message after the encryption receiving;
Foreground application detection module, for detection of foreground application, offers interactive module by the mark of application scenarios.
13. smart machines according to claim 12, is characterized in that, described smart machine also comprises:
Password protection equipment identification module, for preserving the mark of password protection equipment; Encrypted message after the encryption receiving for interactive module, judges whether to preserve the mark of password protection equipment, if preserved, described password protection equipment is proved to be successful.
14. according to the smart machine described in claim 12 or 13, it is characterized in that, described interactive module also for, send the PKI of smart machine to password protection equipment, and receive the PKI from the password protection equipment of password protection equipment.
15. according to the smart machine described in claim 12 or 13, it is characterized in that, described password protection equipment also comprises:
Subscriber identification module, for preserving in advance user's identifying information; In the time receiving the identifying information of user input, judge whether to preserve this identifying information, if preserved,, to being proved to be successful of this user, allow this user to use smart machine.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410352498.8A CN104092550B (en) | 2014-07-23 | 2014-07-23 | Cipher code protection method, system and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410352498.8A CN104092550B (en) | 2014-07-23 | 2014-07-23 | Cipher code protection method, system and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104092550A true CN104092550A (en) | 2014-10-08 |
CN104092550B CN104092550B (en) | 2017-10-17 |
Family
ID=51640232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410352498.8A Active CN104092550B (en) | 2014-07-23 | 2014-07-23 | Cipher code protection method, system and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104092550B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104301886A (en) * | 2014-10-21 | 2015-01-21 | 中国联合网络通信集团有限公司 | Short message reading method and system, terminal and wearable device |
CN105591733A (en) * | 2014-10-24 | 2016-05-18 | 小米科技有限责任公司 | Encryption and decryption methods and apparatuses |
CN105592056A (en) * | 2015-09-24 | 2016-05-18 | 中国银联股份有限公司 | Password safety system for mobile device and password safety input method thereof |
CN106156549A (en) * | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Application program authorization processing method and device |
CN106357588A (en) * | 2015-07-13 | 2017-01-25 | 阿里巴巴集团控股有限公司 | Method and system for logging in to application |
CN107026737A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of system that Password Management is carried out by wearable device |
CN107026736A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of wearable device and the method that Password Input number of times is reduced by it |
WO2017185683A1 (en) * | 2016-04-27 | 2017-11-02 | 乐视控股(北京)有限公司 | Authentication method and authentication system based on biological identification information, and electronic device |
CN109547991A (en) * | 2018-12-30 | 2019-03-29 | 北京深思数盾科技股份有限公司 | Password providing method and bluetooth equipment between bluetooth equipment |
CN111147447A (en) * | 2019-12-03 | 2020-05-12 | 苏宁云计算有限公司 | Data protection method and system |
CN111159696A (en) * | 2019-12-31 | 2020-05-15 | 中国银行股份有限公司 | Password storage and checking method, system and password management system |
CN111800273A (en) * | 2020-06-30 | 2020-10-20 | 联想(北京)有限公司 | Information processing method, electronic device, and storage medium |
CN114915416A (en) * | 2022-04-20 | 2022-08-16 | 中金金融认证中心有限公司 | Method for encrypting file, method for verifying decryption and related products |
CN116401654A (en) * | 2023-06-07 | 2023-07-07 | 深圳奥联信息安全技术有限公司 | Password security management system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216867A (en) * | 2007-01-05 | 2008-07-09 | 黄承雄 | A logging-on process cipher protection method by means of background synchronization |
US20120204256A1 (en) * | 2008-01-29 | 2012-08-09 | Craine Dean A | Method for Inputting Usernames and Passwords to Access or Use Different Assets |
CN102638471A (en) * | 2012-04-25 | 2012-08-15 | 杭州晟元芯片技术有限公司 | Password protection and management method |
-
2014
- 2014-07-23 CN CN201410352498.8A patent/CN104092550B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101216867A (en) * | 2007-01-05 | 2008-07-09 | 黄承雄 | A logging-on process cipher protection method by means of background synchronization |
US20120204256A1 (en) * | 2008-01-29 | 2012-08-09 | Craine Dean A | Method for Inputting Usernames and Passwords to Access or Use Different Assets |
CN102638471A (en) * | 2012-04-25 | 2012-08-15 | 杭州晟元芯片技术有限公司 | Password protection and management method |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104301886A (en) * | 2014-10-21 | 2015-01-21 | 中国联合网络通信集团有限公司 | Short message reading method and system, terminal and wearable device |
CN105591733A (en) * | 2014-10-24 | 2016-05-18 | 小米科技有限责任公司 | Encryption and decryption methods and apparatuses |
CN106156549B (en) * | 2015-04-28 | 2019-12-06 | 阿里巴巴集团控股有限公司 | application program authorization processing method and device |
CN106156549A (en) * | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Application program authorization processing method and device |
CN106357588B (en) * | 2015-07-13 | 2019-11-26 | 阿里巴巴集团控股有限公司 | A kind of method and system logging in application |
CN106357588A (en) * | 2015-07-13 | 2017-01-25 | 阿里巴巴集团控股有限公司 | Method and system for logging in to application |
WO2017050152A1 (en) * | 2015-09-24 | 2017-03-30 | 中国银联股份有限公司 | Password security system adopted by mobile apparatus and secure password entering method thereof |
CN105592056A (en) * | 2015-09-24 | 2016-05-18 | 中国银联股份有限公司 | Password safety system for mobile device and password safety input method thereof |
CN107026737B (en) * | 2016-01-29 | 2021-02-09 | 李明 | System for managing passwords through wearable equipment |
CN107026737A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of system that Password Management is carried out by wearable device |
CN107026736A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of wearable device and the method that Password Input number of times is reduced by it |
WO2017185683A1 (en) * | 2016-04-27 | 2017-11-02 | 乐视控股(北京)有限公司 | Authentication method and authentication system based on biological identification information, and electronic device |
CN109547991A (en) * | 2018-12-30 | 2019-03-29 | 北京深思数盾科技股份有限公司 | Password providing method and bluetooth equipment between bluetooth equipment |
CN111147447A (en) * | 2019-12-03 | 2020-05-12 | 苏宁云计算有限公司 | Data protection method and system |
CN111159696A (en) * | 2019-12-31 | 2020-05-15 | 中国银行股份有限公司 | Password storage and checking method, system and password management system |
CN111800273A (en) * | 2020-06-30 | 2020-10-20 | 联想(北京)有限公司 | Information processing method, electronic device, and storage medium |
CN111800273B (en) * | 2020-06-30 | 2021-12-24 | 联想(北京)有限公司 | Information processing method, electronic device, and storage medium |
CN114915416A (en) * | 2022-04-20 | 2022-08-16 | 中金金融认证中心有限公司 | Method for encrypting file, method for verifying decryption and related products |
CN114915416B (en) * | 2022-04-20 | 2024-05-31 | 中金金融认证中心有限公司 | Method for encrypting file, method for decrypting and verifying file and related products |
CN116401654A (en) * | 2023-06-07 | 2023-07-07 | 深圳奥联信息安全技术有限公司 | Password security management system and method |
Also Published As
Publication number | Publication date |
---|---|
CN104092550B (en) | 2017-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104092550A (en) | Password protection method, system and device | |
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
CN102420821B (en) | Method and system for improving transmission security of file | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
CN105391676B (en) | Instant communication information processing method and processing device and system | |
EP3337088B1 (en) | Data encryption method, decryption method, apparatus, and system | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN105812332A (en) | Data protection method | |
WO2017202025A1 (en) | Terminal file encryption method, terminal file decryption method, and terminal | |
CN101789865A (en) | Dedicated server used for encryption and encryption method | |
CN103856640A (en) | Method and system for processing user resource information | |
CN101917710A (en) | Method, system and related device for mobile internet encryption communication | |
CN104079581A (en) | Identity authentication method and device | |
CN103812651B (en) | Method of password authentication, apparatus and system | |
CN104270517A (en) | Information encryption method and mobile terminal | |
CN107968999B (en) | Privacy protection method and related equipment | |
CN104660589A (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
CN101720071A (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
WO2016045464A1 (en) | Decryption method and mobile terminal | |
AU2013224696A1 (en) | An instant communication method and system | |
CN106506479B (en) | Method, system and the client of cipher authentication, server and smart machine | |
CN105141635A (en) | Method and system for safe communication of group sending messages | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN105142134A (en) | Parameter obtaining and transmission methods/devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |