CN105138876A - Encryption and decryption method, encryption and decryption device and terminal - Google Patents
Encryption and decryption method, encryption and decryption device and terminal Download PDFInfo
- Publication number
- CN105138876A CN105138876A CN201510643702.6A CN201510643702A CN105138876A CN 105138876 A CN105138876 A CN 105138876A CN 201510643702 A CN201510643702 A CN 201510643702A CN 105138876 A CN105138876 A CN 105138876A
- Authority
- CN
- China
- Prior art keywords
- touch
- control
- screen
- terminal
- repeatedly
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides an encryption and decryption method, an encryption and decryption device and a terminal. The encryption and decryption method comprises the following steps: receiving instructions of a touch screen of a touch terminal for a plurality of times and detecting touch parameters when the touch screen is touched each time; selecting a plurality of characters corresponding to the plurality of touch parameters from pre-set characters when the touch screen is touched for a plurality of times; and carrying out encryption or decryption according to the plurality of characters. According to the technical scheme provided by the invention, the encryption and decryption security of the terminal can be improved; and meanwhile, a biological identification module is not additionally arranged in the terminal so that the production cost of the terminal is reduced and an available space of the terminal is guaranteed.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of encipher-decipher method, a kind of ciphering and deciphering device and a kind of terminal.
Background technology
At present, be encrypted by word, figure or biometric information or decipher, but, easily stolen by others to password in the process by word and figure terminal is encrypted or decipher, cause the method confidentiality poor, dangerous, and be encrypted by biometric information or decipher, because bio-identification module installed in the terminal by needs, which not only adds the production cost of terminal, also limit the free space of terminal.
Therefore, how to improve the security of the encryption and decryption of terminal, avoid increasing bio-identification module in the terminal to reduce the production cost of terminal and to ensure that the free space of terminal becomes problem demanding prompt solution simultaneously.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can improve the security of the encryption and decryption of terminal, and avoid increases bio-identification module to reduce the production cost of terminal and to ensure the free space of terminal simultaneously in the terminal.
In view of this, a first aspect of the present invention proposes a kind of encipher-decipher method, comprising: the instruction receiving repeatedly the touch-screen of touch control terminal, and touch parameter when detecting touch-screen described in each touch-control; The multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen are selected in preset characters; Be encrypted according to described multiple character or decipher.
In this technical scheme, by the touch parameter during touch-screen that detects repeatedly touch control terminal, wherein, repeatedly the touch-screen of touch control terminal can be within the time of presetting, then the character that the touch parameter during touch-screen with each touch control terminal is corresponding can be selected in preset characters, such as, preset characters is 1 and 0, then can touch-screen by repeatedly touch control terminal time touch parameter be converted into the multiple characters be made up of 1 and 0, then the character string consisted of multiple character is encrypted terminal or deciphers, avoid in prior art and terminal is encrypted by adding bio-identification module or deciphers, this not only reduces the cost of terminal, also save the space shared by bio-identification module in terminal.Meanwhile, avoid other users and get easily and how to be encrypted or to decipher, make technical scheme of the present invention be encrypted or decipher also safer, reliable in prior art by word and figure.
In technique scheme, preferably, described touch parameter comprises: touch-control duration and/or touch-control force value.
In this technical scheme, touch parameter includes but not limited to: touch-control duration and/or touch-control force value, namely when touch parameter is touch-control duration, multiple characters that multiple touch-control durations during touch-screen according to repeatedly touch control terminal are corresponding are encrypted or decipher, such as, touch-control duration is 1 (certainly at 1 second character to the correspondence in 3 seconds, also can is-symbol *, etc.), and touch-control duration is 0 at 3 seconds characters to the correspondence in 5 seconds, then when detecting that the repeatedly touch-control duration of user's touch-control touch-screen is respectively 2 seconds, 3 seconds, 5 seconds, 5 seconds, 6 seconds and 2 seconds time, namely corresponding multiple characters are 110001, the character string 110001 that also just can form according to multiple character is encrypted or deciphers.On the other hand, when touch parameter is touch-control force value, multiple characters corresponding to multiple touch-control force value during touch-screen according to repeatedly touch control terminal are encrypted or decipher.Such as, the character of the correspondence of touch-control force value in X1 to X2 is 1, and the character of the correspondence of touch-control force value in X3 to X4 is 0, then when the repeatedly touch-control force value of user's touch-control touch-screen is respectively Y1, Y2, Y3, and Y1 and Y2 is all in the scope of X1 to X2, Y3 is in the scope of X3 to X4, and namely multiple character is 110.So, make user to terminal be encrypted and/deciphering time safer, reliable.
In above-mentioned arbitrary technical scheme, preferably, the described step selecting the multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen in preset characters, specifically comprise: if described touch parameter is described touch-control force value, the described touch-control force value according to each touch-control during touch-screen determines the touch type of touch-screen described in each touch-control; The described multiple character corresponding with the described touch type repeatedly described in touch-control during touch-screen is selected in described preset characters.
In this technical scheme, when touch parameter is touch-control force value, the touch type of touch-control force value determination touch-control touch-screen during touch-screen according to each touch control terminal, such as, if touch-control force value determines that within X1 to X2 touch type is touch operation (i.e. pressure during the touch-screen of touch control terminal is lighter), and character corresponding to touch operation is 0, if touch-control force value determines that within X3 to X4 touch type is pressing operation (i.e. pressure during the touch-screen of touch control terminal is heavier), and character corresponding to pressing operation is 1, the character of the correspondence of touch type during touch-screen then according to touch control terminal is encrypted or deciphers, thus ensure that the security of encryption and decryption.
In above-mentioned arbitrary technical scheme, preferably, before the step of the described reception repeatedly instruction of the touch-screen of touch control terminal, comprising: receive and instruction is set, the corresponding relation of described preset characters and multiple touch type is set.
In this technical scheme, by arranging the corresponding relation of preset characters and multiple touch type, making it possible to be encrypted by the character of the correspondence of multiple touch type or decipher, ensure that the reliability of encryption or deciphering.
In above-mentioned arbitrary technical scheme, preferably, before the described step being encrypted according to described multiple character or deciphering, comprising: judge that the position of touch-screen described in each touch-control is whether in the predeterminable area of described touch-screen; If judge, the position of touch-screen described in each touch-control is in described predeterminable area, performs the described step being encrypted according to described multiple character or deciphering; Otherwise, point out the user encryption of described terminal or decipher unsuccessfully.
In this technical scheme, if receive the instruction of touch-control touch-screen in the predeterminable area of touch-screen, can be encrypted according to multiple character or decipher further, but, if the instruction of the touch-control touch-screen received is not in predeterminable area, then illustrate that the user using this terminal to carry out encryption and decryption may not be the validated user of this terminal, then point out user encryption or decipher unsuccessfully, ensure that the security of encryption and decryption further.
Second aspect present invention proposes a kind of ciphering and deciphering device, comprising: detecting unit, for repeatedly receiving the instruction of the touch-screen of touch control terminal, and touch parameter when detecting touch-screen described in each touch-control; Selection unit, for selecting the multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen in preset characters; Encryption/decryption element, for being encrypted according to described multiple character or deciphering.
In this technical scheme, by the touch parameter during touch-screen that detects repeatedly touch control terminal, wherein, repeatedly the touch-screen of touch control terminal can be within the time of presetting, then the character that the touch parameter during touch-screen with each touch control terminal is corresponding can be selected in preset characters, such as, preset characters is 1 and 0, then can touch-screen by repeatedly touch control terminal time touch parameter be converted into the multiple characters be made up of 1 and 0, then the character string consisted of multiple character is encrypted terminal or deciphers, avoid in prior art and terminal is encrypted by adding bio-identification module or deciphers, this not only reduces the cost of terminal, also save the space shared by bio-identification module in terminal.Meanwhile, avoid other users and get easily and how to be encrypted or to decipher, make technical scheme of the present invention be encrypted or decipher also safer, reliable in prior art by word and figure.
In above-mentioned arbitrary technical scheme, preferably, described touch parameter comprises: touch-control duration and/or touch-control force value.
In this technical scheme, touch parameter includes but not limited to: touch-control duration and/or touch-control force value, namely when touch parameter is touch-control duration, multiple characters that multiple touch-control durations during touch-screen according to repeatedly touch control terminal are corresponding are encrypted or decipher, such as, touch-control duration is 1 (certainly at 1 second character to the correspondence in 3 seconds, also can is-symbol *, etc.), and touch-control duration is 0 at 3 seconds characters to the correspondence in 5 seconds, then when detecting that the repeatedly touch-control duration of user's touch-control touch-screen is respectively 2 seconds, 3 seconds, 5 seconds, 5 seconds, 6 seconds and 2 seconds time, namely corresponding multiple characters are 110001, the character string 110001 that also just can form according to multiple character is encrypted or deciphers.On the other hand, when touch parameter is touch-control force value, multiple characters corresponding to multiple touch-control force value during touch-screen according to repeatedly touch control terminal are encrypted or decipher.Such as, the character of the correspondence of touch-control force value in X1 to X2 is 1, and the character of the correspondence of touch-control force value in X3 to X4 is 0, then when the repeatedly touch-control force value of user's touch-control touch-screen is respectively Y1, Y2, Y3, and Y1 and Y2 is all in the scope of X1 to X2, Y3 is in the scope of X3 to X4, and namely multiple character is 110.So, make user to terminal be encrypted and/deciphering time safer, reliable.
In above-mentioned arbitrary technical scheme, preferably, described selection unit comprises: determining unit, if be described touch-control force value for described touch parameter, the described touch-control force value according to each touch-control during touch-screen determines the touch type of touch-screen described in each touch-control; Described selection unit specifically for, in described preset characters, select the described multiple character corresponding with the described touch type repeatedly described in touch-control during touch-screen.
In this technical scheme, when touch parameter is touch-control force value, the touch type of touch-control force value determination touch-control touch-screen during touch-screen according to each touch control terminal, such as, if touch-control force value determines that within X1 to X2 touch type is touch operation (i.e. pressure during the touch-screen of touch control terminal is lighter), and character corresponding to touch operation is 0, if touch-control force value determines that within X3 to X4 touch type is pressing operation (i.e. pressure during the touch-screen of touch control terminal is heavier), and character corresponding to pressing operation is 1, the character of the correspondence of touch type during touch-screen then according to touch control terminal is encrypted or deciphers, thus ensure that the security of encryption and decryption.
In above-mentioned arbitrary technical scheme, preferably, also comprise: setting unit, instruction is set for receiving, the corresponding relation of described preset characters and multiple touch type is set.
In this technical scheme, by arranging the corresponding relation of preset characters and multiple touch type, making it possible to be encrypted by the character of the correspondence of multiple touch type or decipher, ensure that the reliability of encryption or deciphering.
In above-mentioned arbitrary technical scheme, preferably, also comprise: judging unit, for judging that the position of touch-screen described in each touch-control is whether in the predeterminable area of described touch-screen; Described encryption/decryption element specifically for, if judge, the position of touch-screen described in each touch-control is in described predeterminable area, performs the described step being encrypted according to described multiple character or deciphering; Tip element, for when judging that the position of touch-screen described in arbitrary touch-control is not in described predeterminable area, pointing out the failure of the user encryption of described terminal or deciphering unsuccessfully.
In this technical scheme, if receive the instruction of touch-control touch-screen in the predeterminable area of touch-screen, can be encrypted according to multiple character or decipher further, but, if the instruction of the touch-control touch-screen received is not in predeterminable area, then illustrate that the user using this terminal to carry out encryption and decryption may not be the validated user of this terminal, then point out user encryption or decipher unsuccessfully, ensure that the security of encryption and decryption further.
A third aspect of the present invention proposes a kind of terminal, comprising: the ciphering and deciphering device according to any one of technique scheme, and therefore, this terminal has the technique effect identical with the ciphering and deciphering device according to any one of technique scheme, does not repeat them here.
By technical scheme of the present invention, the security of the encryption and decryption of terminal can be improved, avoid increasing bio-identification module in the terminal to reduce the production cost of terminal and to ensure the free space of terminal simultaneously.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of encipher-decipher method according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of encipher-decipher method according to another embodiment of the invention;
Fig. 3 shows the structural representation of ciphering and deciphering device according to an embodiment of the invention;
Fig. 4 shows the structural representation of terminal according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of encipher-decipher method according to an embodiment of the invention.
As shown in Figure 1, encipher-decipher method according to an embodiment of the invention, comprising:
Step 102, receives repeatedly the instruction of the touch-screen of touch control terminal, and touch parameter when detecting touch-screen described in each touch-control;
Step 104, selects the multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen in preset characters;
Step 106, is encrypted according to described multiple character or deciphers.
In this technical scheme, by the touch parameter during touch-screen that detects repeatedly touch control terminal, wherein, repeatedly the touch-screen of touch control terminal can be within the time of presetting, then the character that the touch parameter during touch-screen with each touch control terminal is corresponding can be selected in preset characters, such as, preset characters is 1 and 0, then can touch-screen by repeatedly touch control terminal time touch parameter be converted into the multiple characters be made up of 1 and 0, then the character string consisted of multiple character is encrypted terminal or deciphers, avoid in prior art and terminal is encrypted by adding bio-identification module or deciphers, this not only reduces the cost of terminal, also save the space shared by bio-identification module in terminal.Meanwhile, avoid other users and get easily and how to be encrypted or to decipher, make technical scheme of the present invention be encrypted or decipher also safer, reliable in prior art by word and figure.
In technique scheme, preferably, described touch parameter comprises: touch-control duration and/or touch-control force value.
In this technical scheme, touch parameter includes but not limited to: touch-control duration and/or touch-control force value, namely when touch parameter is touch-control duration, multiple characters that multiple touch-control durations during touch-screen according to repeatedly touch control terminal are corresponding are encrypted or decipher, such as, touch-control duration is 1 (certainly at 1 second character to the correspondence in 3 seconds, also can is-symbol *, etc.), and touch-control duration is 0 at 3 seconds characters to the correspondence in 5 seconds, then when detecting that the repeatedly touch-control duration of user's touch-control touch-screen is respectively 2 seconds, 3 seconds, 5 seconds, 5 seconds, 6 seconds and 2 seconds time, namely corresponding multiple characters are 110001, the character string 110001 that also just can form according to multiple character is encrypted or deciphers.On the other hand, when touch parameter is touch-control force value, multiple characters corresponding to multiple touch-control force value during touch-screen according to repeatedly touch control terminal are encrypted or decipher.Such as, the character of the correspondence of touch-control force value in X1 to X2 is 1, and the character of the correspondence of touch-control force value in X3 to X4 is 0, then when the repeatedly touch-control force value of user's touch-control touch-screen is respectively Y1, Y2, Y3, and Y1 and Y2 is all in the scope of X1 to X2, Y3 is in the scope of X3 to X4, and namely multiple character is 110.So, make user to terminal be encrypted and/deciphering time safer, reliable.
In above-mentioned arbitrary technical scheme, preferably, described step 104 specifically comprises: if described touch parameter is described touch-control force value, and the described touch-control force value according to each touch-control during touch-screen determines the touch type of touch-screen described in each touch-control; The described multiple character corresponding with the described touch type repeatedly described in touch-control during touch-screen is selected in described preset characters.
In this technical scheme, when touch parameter is touch-control force value, the touch type of touch-control force value determination touch-control touch-screen during touch-screen according to each touch control terminal, such as, if touch-control force value determines that within X1 to X2 touch type is touch operation (i.e. pressure during the touch-screen of touch control terminal is lighter), and character corresponding to touch operation is 0, if touch-control force value determines that within X3 to X4 touch type is pressing operation (i.e. pressure during the touch-screen of touch control terminal is heavier), and character corresponding to pressing operation is 1, the character of the correspondence of touch type during touch-screen then according to touch control terminal is encrypted or deciphers, thus ensure that the security of encryption and decryption.
In above-mentioned arbitrary technical scheme, preferably, before described step 102, comprising: receive and instruction is set, the corresponding relation of described preset characters and multiple touch type is set.
In this technical scheme, by arranging the corresponding relation of preset characters and multiple touch type, making it possible to be encrypted by the character of the correspondence of multiple touch type or decipher, ensure that the reliability of encryption or deciphering.
In above-mentioned arbitrary technical scheme, preferably, before described step 106, comprising: judge that the position of touch-screen described in each touch-control is whether in the predeterminable area of described touch-screen; If judge, the position of touch-screen described in each touch-control is in described predeterminable area, performs the described step being encrypted according to described multiple character or deciphering; Otherwise, point out the user encryption of described terminal or decipher unsuccessfully.
In this technical scheme, if receive the instruction of touch-control touch-screen in the predeterminable area of touch-screen, can be encrypted according to multiple character or decipher further, but, if the instruction of the touch-control touch-screen received is not in predeterminable area, then illustrate that the user using this terminal to carry out encryption and decryption may not be the validated user of this terminal, then point out user encryption or decipher unsuccessfully, ensure that the security of encryption and decryption further.
Fig. 2 shows the schematic flow sheet of encipher-decipher method according to another embodiment of the invention.
As shown in Figure 2, encipher-decipher method according to another embodiment of the invention, comprising:
Step 202, when receiving the operational order to terminal (i.e. the instruction of the touch-screen of touch control terminal), detecting and being operating as pressing operation or touch operation to terminal.Particularly, the force value of the operation to terminal can be detected, determine to be operating as pressing operation (i.e. pressure during the touch-screen of touch control terminal is heavier) or touch operation (pressure during touch-screen of touch control terminal is lighter) to terminal according to the size of force value.
Step 204, when pressing operation being carried out to terminal if detect, output character 0 (certainly, can be other numeral or symbol, the such as symbol such as " * ", ""), when touch operation being carried out to terminal if detect, output character 1.
Step 206, according to the operational order to terminal repeatedly received, obtains multiple character string be made up of 0 and 1.
Step 208, is encrypted according to character string or deciphers.
Fig. 3 shows the structural representation of ciphering and deciphering device according to an embodiment of the invention.
As shown in Figure 3, ciphering and deciphering device 300 according to an embodiment of the invention, comprise: detecting unit 302, selection unit 304 and encryption/decryption element 306, wherein, described detecting unit 302 is for repeatedly receiving the instruction of the touch-screen of touch control terminal, and touch parameter when detecting touch-screen described in each touch-control; Described selection unit 304, for selecting the multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen in preset characters; Described encryption/decryption element 306, for being encrypted according to described multiple character or deciphering.
In this technical scheme, by the touch parameter during touch-screen that detects repeatedly touch control terminal, wherein, repeatedly the touch-screen of touch control terminal can be within the time of presetting, then the character that the touch parameter during touch-screen with each touch control terminal is corresponding can be selected in preset characters, such as, preset characters is 1 and 0, then can touch-screen by repeatedly touch control terminal time touch parameter be converted into the multiple characters be made up of 1 and 0, then the character string consisted of multiple character is encrypted terminal or deciphers, avoid in prior art and terminal is encrypted by adding bio-identification module or deciphers, this not only reduces the cost of terminal, also save the space shared by bio-identification module in terminal.Meanwhile, avoid other users and get easily and how to be encrypted or to decipher, make technical scheme of the present invention be encrypted or decipher also safer, reliable in prior art by word and figure.
In above-mentioned arbitrary technical scheme, preferably, described touch parameter comprises: touch-control duration and/or touch-control force value.
In this technical scheme, touch parameter includes but not limited to: touch-control duration and/or touch-control force value, namely when touch parameter is touch-control duration, multiple characters that multiple touch-control durations during touch-screen according to repeatedly touch control terminal are corresponding are encrypted or decipher, such as, touch-control duration is 1 (certainly at 1 second character to the correspondence in 3 seconds, also can is-symbol *, etc.), and touch-control duration is 0 at 3 seconds characters to the correspondence in 5 seconds, then when detecting that the repeatedly touch-control duration of user's touch-control touch-screen is respectively 2 seconds, 3 seconds, 5 seconds, 5 seconds, 6 seconds and 2 seconds time, namely corresponding multiple characters are 110001, the character string 110001 that also just can form according to multiple character is encrypted or deciphers.On the other hand, when touch parameter is touch-control force value, multiple characters corresponding to multiple touch-control force value during touch-screen according to repeatedly touch control terminal are encrypted or decipher.Such as, the character of the correspondence of touch-control force value in X1 to X2 is 1, and the character of the correspondence of touch-control force value in X3 to X4 is 0, then when the repeatedly touch-control force value of user's touch-control touch-screen is respectively Y1, Y2, Y3, and Y1 and Y2 is all in the scope of X1 to X2, Y3 is in the scope of X3 to X4, and namely multiple character is 110.So, make user to terminal be encrypted and/deciphering time safer, reliable.
In above-mentioned arbitrary technical scheme, preferably, described selection unit 304 comprises: determining unit 3042, if be described touch-control force value for described touch parameter, the described touch-control force value according to each touch-control during touch-screen determines the touch type of touch-screen described in each touch-control; Described selection unit 304 specifically for, in described preset characters, select the described multiple character corresponding with the described touch type repeatedly described in touch-control during touch-screen.
In this technical scheme, when touch parameter is touch-control force value, the touch type of touch-control force value determination touch-control touch-screen during touch-screen according to each touch control terminal, such as, if touch-control force value determines that within X1 to X2 touch type is touch operation (i.e. pressure during the touch-screen of touch control terminal is lighter), and character corresponding to touch operation is 0, if touch-control force value determines that within X3 to X4 touch type is pressing operation (i.e. pressure during the touch-screen of touch control terminal is heavier), and character corresponding to pressing operation is 1, the character of the correspondence of touch type during touch-screen then according to touch control terminal is encrypted or deciphers, thus ensure that the security of encryption and decryption.
In above-mentioned arbitrary technical scheme, preferably, also comprise: setting unit 308, instruction is set for receiving, the corresponding relation of described preset characters and multiple touch type is set.
In this technical scheme, by arranging the corresponding relation of preset characters and multiple touch type, making it possible to be encrypted by the character of the correspondence of multiple touch type or decipher, ensure that the reliability of encryption or deciphering.
In above-mentioned arbitrary technical scheme, preferably, also comprise: judging unit 310, for judging that the position of touch-screen described in each touch-control is whether in the predeterminable area of described touch-screen; Described encryption/decryption element 306 specifically for, if judge, the position of touch-screen described in each touch-control is in described predeterminable area, performs the described step being encrypted according to described multiple character or deciphering; Tip element 312, for when judging that the position of touch-screen described in arbitrary touch-control is not in described predeterminable area, pointing out the failure of the user encryption of described terminal or deciphering unsuccessfully.
In this technical scheme, if receive the instruction of touch-control touch-screen in the predeterminable area of touch-screen, can be encrypted according to multiple character or decipher further, but, if the instruction of the touch-control touch-screen received is not in predeterminable area, then illustrate that the user using this terminal to carry out encryption and decryption may not be the validated user of this terminal, then point out user encryption or decipher unsuccessfully, ensure that the security of encryption and decryption further.
Fig. 4 shows the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 4, terminal 400 according to an embodiment of the invention, comprising: the ciphering and deciphering device 300 according to any one of technique scheme, therefore, this terminal 400 has the technique effect identical with the ciphering and deciphering device 300 according to any one of technique scheme, does not repeat them here.
More than be described with reference to the accompanying drawings technical scheme of the present invention, avoid and by bio-identification module of the prior art terminal to be encrypted or to decipher, thus effectively reduce the cost of terminal, also save the space shared by bio-identification module in terminal simultaneously.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (11)
1. an encipher-decipher method, is characterized in that, comprising:
Repeatedly receive the instruction of the touch-screen of touch control terminal, and touch parameter when detecting touch-screen described in each touch-control;
The multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen are selected in preset characters;
Be encrypted according to described multiple character or decipher.
2. encipher-decipher method according to claim 1, is characterized in that, described touch parameter comprises: touch-control duration and/or touch-control force value.
3. encipher-decipher method according to claim 2, is characterized in that, the described step selecting the multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen in preset characters, specifically comprises:
If described touch parameter is described touch-control force value, the described touch-control force value according to each touch-control during touch-screen determines the touch type of touch-screen described in each touch-control;
The described multiple character corresponding with the described touch type repeatedly described in touch-control during touch-screen is selected in described preset characters.
4. encipher-decipher method according to claim 3, is characterized in that, described repeatedly receive the step of the instruction of the touch-screen of touch control terminal before, comprising:
Reception arranges instruction, arranges the corresponding relation of described preset characters and multiple touch type.
5. encipher-decipher method according to any one of claim 1 to 4, is characterized in that, before the described step being encrypted according to described multiple character or deciphering, comprising:
Judge that the position of touch-screen described in each touch-control is whether in the predeterminable area of described touch-screen;
If judge, the position of touch-screen described in each touch-control is in described predeterminable area, performs the described step being encrypted according to described multiple character or deciphering;
Otherwise, point out the failure of the user encryption of described terminal or decipher unsuccessfully.
6. a ciphering and deciphering device, is characterized in that, comprising:
Detecting unit, for repeatedly receiving the instruction of the touch-screen of touch control terminal, and touch parameter when detecting touch-screen described in each touch-control;
Selection unit, for selecting the multiple characters corresponding with the multiple described touch parameter repeatedly described in touch-control during touch-screen in preset characters;
Encryption/decryption element, for being encrypted according to described multiple character or deciphering.
7. ciphering and deciphering device according to claim 6, is characterized in that, described touch parameter comprises: touch-control duration and/or touch-control force value.
8. ciphering and deciphering device according to claim 7, is characterized in that, described selection unit comprises:
Determining unit, if be described touch-control force value for described touch parameter, the described touch-control force value according to each touch-control during touch-screen determines the touch type of touch-screen described in each touch-control;
Described selection unit specifically for, in described preset characters, select the described multiple character corresponding with the described touch type repeatedly described in touch-control during touch-screen.
9. ciphering and deciphering device according to claim 8, is characterized in that, also comprises:
Setting unit, arranging instruction for receiving, arranging the corresponding relation of described preset characters and multiple touch type.
10. the ciphering and deciphering device according to any one of claim 6 to 9, is characterized in that, also comprises:
Judging unit, for judging that the position of touch-screen described in each touch-control is whether in the predeterminable area of described touch-screen;
Described encryption/decryption element specifically for, if judge, the position of touch-screen described in each touch-control is in described predeterminable area, performs the described step being encrypted according to described multiple character or deciphering;
Tip element, for when judging that the position of touch-screen described in arbitrary touch-control is not in described predeterminable area, pointing out the failure of the user encryption of described terminal or deciphering unsuccessfully.
11. 1 kinds of terminals, is characterized in that, comprising: the ciphering and deciphering device according to any one of claim 6 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510643702.6A CN105138876A (en) | 2015-09-30 | 2015-09-30 | Encryption and decryption method, encryption and decryption device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510643702.6A CN105138876A (en) | 2015-09-30 | 2015-09-30 | Encryption and decryption method, encryption and decryption device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105138876A true CN105138876A (en) | 2015-12-09 |
Family
ID=54724221
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510643702.6A Pending CN105138876A (en) | 2015-09-30 | 2015-09-30 | Encryption and decryption method, encryption and decryption device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105138876A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105809795A (en) * | 2016-03-23 | 2016-07-27 | 麦重伟 | Anti-theft device and system and method of anti-theft system |
CN105844745A (en) * | 2016-03-23 | 2016-08-10 | 麦重伟 | Anti-theft device, system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101853362A (en) * | 2009-04-02 | 2010-10-06 | 鸿富锦精密工业(深圳)有限公司 | Encryption/decryption system and method |
CN102203794A (en) * | 2011-06-01 | 2011-09-28 | 华为终端有限公司 | A terminal authentication method and a device thereof |
US20120265980A1 (en) * | 2011-04-18 | 2012-10-18 | Pantech Co., Ltd. | Apparatus and method for securing user input data |
CN102841696A (en) * | 2011-06-24 | 2012-12-26 | 国基电子(上海)有限公司 | Electronic equipment and password input method thereof |
CN104063638A (en) * | 2014-02-12 | 2014-09-24 | 苏州天鸣信息科技有限公司 | Unlocking method based on touch screen |
-
2015
- 2015-09-30 CN CN201510643702.6A patent/CN105138876A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101853362A (en) * | 2009-04-02 | 2010-10-06 | 鸿富锦精密工业(深圳)有限公司 | Encryption/decryption system and method |
US20120265980A1 (en) * | 2011-04-18 | 2012-10-18 | Pantech Co., Ltd. | Apparatus and method for securing user input data |
CN102203794A (en) * | 2011-06-01 | 2011-09-28 | 华为终端有限公司 | A terminal authentication method and a device thereof |
CN102841696A (en) * | 2011-06-24 | 2012-12-26 | 国基电子(上海)有限公司 | Electronic equipment and password input method thereof |
CN104063638A (en) * | 2014-02-12 | 2014-09-24 | 苏州天鸣信息科技有限公司 | Unlocking method based on touch screen |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105809795A (en) * | 2016-03-23 | 2016-07-27 | 麦重伟 | Anti-theft device and system and method of anti-theft system |
CN105844745A (en) * | 2016-03-23 | 2016-08-10 | 麦重伟 | Anti-theft device, system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103092484B (en) | The method of unlock screen, device and terminal | |
KR101340746B1 (en) | Electronic device, method and apparatus for securing of user input data of electric device, and communication system using thereof | |
US20130347101A1 (en) | Terminal Authentication Method and Device | |
KR101900841B1 (en) | Method and apparatus for protecting application program password of mobile terminal | |
CN105227439B (en) | A kind of sharing method and user terminal of associated person information | |
CN104065621A (en) | Identify verification method for third-party service, client and system | |
CN105159531A (en) | Application starting method and mobile terminal | |
CN101813992A (en) | Touch screen and password-inputting method thereof | |
KR101340770B1 (en) | Electronic device, method and apparatus for securing of user input data of electric device | |
US20150121510A1 (en) | Method, device and system for entering data | |
CN104049897A (en) | Touch screen device unlocking method and device | |
CN105512576A (en) | Method for secure storage of data and electronic equipment | |
CN105141429A (en) | User verifying method, user verifying device and server | |
CN103425944A (en) | Information safety input method and information safety device | |
CN105373737A (en) | Application encryption method and mobile terminal | |
CN105574379A (en) | Private mode starting method and device as well as terminal | |
CN105354458B (en) | Password Input verification method and system | |
CN104951366A (en) | Mobile terminal application program login method and equipment | |
CN105426727A (en) | Fingerprint decryption method and mobile terminal | |
CN105138876A (en) | Encryption and decryption method, encryption and decryption device and terminal | |
CN105450402A (en) | Method, device and system for inputting combined-type image verification code | |
CN107895268A (en) | A kind of method that safety input PIN is realized on intelligent payment terminal | |
CN109560918B (en) | Method for generating NTRU key and terminal equipment | |
KR101318668B1 (en) | Portable memory card having information security function | |
CN105700814A (en) | Method and device for protecting application information and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151209 |
|
RJ01 | Rejection of invention patent application after publication |