[go: up one dir, main page]

CN113938284B - Multi-connection encryption and decryption method, device and system based on gesture displacement - Google Patents

Multi-connection encryption and decryption method, device and system based on gesture displacement Download PDF

Info

Publication number
CN113938284B
CN113938284B CN202111536459.XA CN202111536459A CN113938284B CN 113938284 B CN113938284 B CN 113938284B CN 202111536459 A CN202111536459 A CN 202111536459A CN 113938284 B CN113938284 B CN 113938284B
Authority
CN
China
Prior art keywords
password
encryption
decryption
digital
displacement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111536459.XA
Other languages
Chinese (zh)
Other versions
CN113938284A (en
Inventor
李建辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Polytechnic
Original Assignee
Foshan Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Polytechnic filed Critical Foshan Polytechnic
Priority to CN202111536459.XA priority Critical patent/CN113938284B/en
Publication of CN113938284A publication Critical patent/CN113938284A/en
Application granted granted Critical
Publication of CN113938284B publication Critical patent/CN113938284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/68Gesture-dependent or behaviour-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Animal Behavior & Ethology (AREA)
  • Human Computer Interaction (AREA)
  • Social Psychology (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a gesture displacement-based multi-connected encryption and decryption method, device and system. The method comprises the steps that a one-time combination password is set for multiple password devices, the one-time combination password comprises a digital password and gesture data, when one password device performs decryption by using the one-time combination password, a new one-time combination password is formed at the password device and is sent to other password devices and terminals, and a user can perform decryption of any password device in the multiple password devices again according to the new one-time combination password so as to circulate. Under the condition of not greatly improving the cost, the technical scheme effectively ensures the safety of the multi-link product, improves the efficiency of executing encryption and decryption by a user, and finally effectively improves the user experience of the product.

Description

Multi-connection encryption and decryption method, device and system based on gesture displacement
Technical Field
The invention relates to the technical field of multi-connection encryption and decryption, in particular to a multi-connection encryption and decryption method and system based on gesture displacement.
Background
Gesture recognition is one subject of computer science and language technology, with the aim of recognizing human gestures through mathematical algorithms, users can control interactions with devices using simple gestures without touching them. Gesture recognition techniques are generally divided into three categories, including: two-dimensional hand shape recognition, two-dimensional gesture recognition and three-dimensional gesture recognition.
The two-dimensional hand type recognition is the simplest type of gesture recognition, and after the two-dimensional information input is obtained, the technology can recognize a plurality of static gestures, such as fist making or five-finger opening, the encryption effect is poor, and the encryption effect is easy to crack.
Two-dimensional gesture recognition is slightly more difficult than two-dimensional hand type recognition, but still does not contain depth information and stays on a two-dimensional layer. The technology can identify hand types and can also identify some simple two-dimensional gesture actions, for example, swinging a hand towards a camera, but the existing two-dimensional gesture identification cannot meet the requirement on encryption depth.
Three-dimensional gesture recognition, the input that three-dimensional gesture recognition needs is the information that contains the degree of depth, can discern various hand types, gestures and actions. Compared with the first two-dimensional gesture/hand type recognition technologies, the three-dimensional gesture recognition cannot use only a single common camera any longer, and because the single common camera cannot provide depth information, the use cost is very high.
At present, a multi-connection password device is mostly adopted in a dense security area to protect important files, such as: administrative data of a large company and financial data of the large company, which are many and relate to confidentiality and are classified. The conventional method is that a secrecy person puts confidential data into a plurality of different secrecy boxes, and for the convenience of memory, the secrecy person sets a plurality of password devices to be the same password, or sets and records a plurality of passwords by the plurality of password devices, and inquires the password by a record book when in use.
The traditional technical scheme is not related to the technical scheme of gesture recognition encryption and decryption in the application field of the multi-connected password device, and is also the traditional digital password or fingerprint password.
Therefore, the following problems exist in the multiple encryption and decryption of the conventional cryptographic apparatus:
1) the multi-connection encryption and decryption of the traditional password device is realized through a preset digital password or a fingerprint password, the gesture recognition cannot be skillfully combined, the password structure is simple and unchanged, and the password is easy to crack by illegal people;
2) when a plurality of same passwords are set in a plurality of traditional password devices, the risk of divulging the secrets of the password devices is easily caused, and larger divulging loss is formed;
3) when a plurality of traditional password devices are set with a plurality of different passwords, the time and labor consumption of setting the passwords by a user is easily caused, the time and labor consumption of decrypting the password devices is caused, and the user experience of images is serious.
Based on this, there is a need for a multiple encryption and decryption scheme that can solve the existing technical problems mentioned in the background art.
Disclosure of Invention
The invention provides a multi-connected encryption and decryption method and system based on gesture displacement, aiming at overcoming the defects of simple encryption structure, complex operation process and easy disclosure of a multi-connected password device in the prior art, and the method, the device and the system have the following characteristics:
1) the multi-connected password device combines a digital password and gesture recognition to form a combined password;
2) the multiple password devices all adopt the same one-time combined password, and the one-time combined password can only unlock one multiple password device;
3) after the multi-connected cipher device is decrypted once, the multi-connected cipher device forms a combined cipher different from the last one again and sends the combined cipher to the user terminal.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
in a first aspect, a multi-connected encryption and decryption method based on gesture displacement is applied to a multi-connected encryption and decryption system, and comprises the following process steps:
step 100, executing decryption operation;
step 200, performing encryption operation;
step 300, sharing the encryption password;
the multi-connection encryption and decryption system is formed by sequentially and wirelessly connecting a plurality of password devices, and one password device is wirelessly connected with the intelligent terminal.
Further, still include:
the decryption operation refers to the decryption operation of executing the first combined password, and comprises a digital decryption operation and a gesture data decryption operation;
the first combined password comprises a first digital password and a first gesture data password;
the digital decryption operation refers to the operation of inputting preset numbers and the sequence thereof through the number keys;
the gesture data decryption operation is an operation of acquiring two-dimensional gesture recognition data after the digital decryption operation passes verification;
and if and only if the digital decryption operation and the gesture data decryption operation both pass verification, the decryption operation can be successfully decrypted.
Further, still include:
when the decryption operation is successful, triggering the encryption operation;
the encryption operation is to form a second encryption combined password which is different from the encryption operation according to the backup encryption and decryption database;
the backup encryption and decryption database comprises a digital password packet and a gesture data packet;
the digital password packet consists of a plurality of groups of digital passwords;
the gesture data packet comprises a displacement data packet and a hand waving data packet;
the displacement data packet consists of a plurality of displacement values; the displacement value is an interval value;
the hand waving data packet consists of a plurality of hand waving values; the hand waving value comprises a plurality of hand waving direction detection values and a plurality of hand waving times values;
the second encryption combined password is composed of a second digital password and a second gesture data password which are different from the second digital password and the second gesture data password during the decryption operation;
the second encryption combined password is formed by randomly combining any one group of digital passwords in the digital password packet, any one displacement value in the displacement data packet and any three groups of data of any one hand waving value in the hand waving data packet.
Further, the sharing the encryption password further includes:
the encryption password is the second encryption combined password;
the sharing of the encryption password refers to the execution of the receiving and sending of the second encryption combined password between the password devices and the transmission of the password devices and the intelligent terminal;
in the stage of executing transceiving between the cryptographic devices, the second encryption combination cipher can only be executed by 'single sending multiple sharing';
the "single sending and multiple sharing" refers to that the cryptographic apparatus can only send the second encrypted combined password to another cryptographic apparatus, and then the other cryptographic apparatus sends the second encrypted combined password to the next cryptographic apparatus, and so on until the second encrypted combined password is obtained by all the cryptographic apparatuses;
in the stage of executing the sending of the password device and the intelligent terminal, any password device can send the encrypted combined password to the intelligent terminal, or a fixed password device sends the encrypted combined password to the intelligent terminal;
the second encryption combination password is used for executing decryption of any one of the cryptographic devices again.
Further, the executing the decryption operation specifically includes the following steps:
step 110, acquiring a first digital password;
step 120, judging whether the first digital password is correct, if not, returning to the step 110;
step 130, acquiring gesture data when the first digital password is correct;
step 140, judging whether the displacement detection reaches a distance threshold value, if not, returning to the step 110;
step 150, when the displacement detection reaches the far threshold, judging whether the hand waving detection reaches the hand waving threshold, if not, returning to the step 110;
step 160, if the hand waving detection reaches the hand waving threshold, the decryption is successful, and step 200 is executed;
the displacement detection refers to distance detection executed by the password device on the palm;
the hand swing detection refers to the detection of the number and sequence of hand swing performed by the password device on the palm.
The distance threshold value is a displacement interval numerical value of the palm far away from the password device;
further, still include:
when the displacement detection reaches the far threshold value, the waving detection is carried out;
the hand waving threshold comprises a hand waving direction detection value and a hand waving number value;
the hand waving direction detection value is a detection value for detecting that the palm waves the hand leftwards or rightwards on the basis of the vertical palm state;
the hand waving number value is a hand waving value obtained by waving the hand leftwards or rightwards and returning to the vertical palm state on the basis of the vertical palm state, and the hand waving number executed by the palm is detected;
the hand swing detection is required to be at the position away from the threshold value, and the preset hand swing direction detection value and the preset hand swing number value are simultaneously reached, and then the hand swing detection is determined to reach the hand swing threshold value;
in a second aspect, a multiple encryption and decryption system based on gesture displacement includes: an intelligent terminal and a password device group;
the intelligent terminal is used for acquiring a new combined password of one password device in the password device group;
the password device group consists of a plurality of password devices which are sequentially connected in a wireless way and are used for being executed with decryption operation and encryption operation;
after the decryption operation is finished, automatically executing the encryption operation to form a new combined password;
the new combined password is sequentially transmitted to other password devices of the password device group for executing the decryption operation again;
further, still include:
any cryptographic device of the set of cryptographic devices further comprises: the device comprises a data processing module 1, a communication module 2, a key module 3, an acquisition module 4 and a prompt module 5;
the data processing module 1 further comprises a decryption unit 11 and an encryption unit 12;
the decryption unit 11 is used for executing decryption operation of the digital password and the gesture data password;
the encryption unit 12 is used for forming an encryption operation of a new combined password after the decryption unit finishes the decryption operation;
the communication module 2 is used for communication between the password device and also used for communication between the password device and the intelligent terminal;
the key module 3 is used for executing the input operation of the digital password;
the acquisition module 4 comprises an image acquisition unit and a millimeter wave unit and is used for acquiring gesture data;
the key module 3 is arranged on any surface of the password device; the acquisition module 4 is arranged on the key module 3 or any side of the key module;
the prompt module 5 comprises an LED lamp or/and a speaker, and is used for performing a prompt that the decryption step is correct or incorrect when the decryption operation is performed.
According to another aspect of the application, a storage medium stores a computer program, and the computer program is executed by a processor to implement any one of the above-mentioned multiple encryption and decryption methods based on gesture displacement.
According to another aspect of the application, a computer device comprises a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, wherein the processor implements any one of the gesture displacement based multi-connection encryption and decryption methods when executing the computer program.
In summary, according to the technical solution of the present invention, a plurality of password devices are wirelessly connected to form a multi-connected password device with data association, the same one-time combination password is set in the multi-connected password device, and the one-time combination password is a combination password of a digital password and a gesture recognition, when a user performs one-time combination password decryption and unlocking on one of the multi-connected password devices, a new one-time combination password is formed in the multi-connected password device and is sent to the other multi-connected password devices and the terminal, and the user can perform any decryption and unlocking of the multi-connected password device again according to the new one-time combination password, thereby repeating this process.
The beneficial technical effects of the invention are as follows:
1) the digital password and the two-dimensional gesture recognition of the depth form the combined password, so that the decryption difficulty of lawbreakers is improved, the cost can be greatly saved on the basis of effectively guaranteeing the safety of products, and meanwhile, the security of encryption is greatly improved by adopting a multi-password combination logic of decryption, re-encryption and sharing of a new encrypted password.
2) Through the combination of the multi-connection password device and the intelligent terminal, the same one-time encryption and decryption password is adopted, so that the safety of a plurality of products is effectively improved, and the encryption and decryption efficiency of a user is also improved. Finally, the user experience of the product is effectively improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 shows a system architecture diagram of multiple encryption and decryption provided by the present application;
FIG. 2 is a diagram illustrating the internal components of a cryptographic device provided herein;
fig. 3 is a flowchart illustrating a method for multiple encryption and decryption provided in embodiment 1 of the present application;
FIG. 4 is a flowchart of a method for gesture decryption provided in embodiment 1 of the present application;
fig. 5 is a schematic diagram illustrating multiple encryption and decryption provided in embodiment 1 of the present application;
fig. 6 is a schematic diagram illustrating a combined password sharing method provided in embodiment 1 of the present application;
FIG. 7 is a schematic diagram illustrating a gesture decryption operation provided in embodiment 1 of the present application;
fig. 8 shows a schematic diagram of a backup encryption and decryption database provided in embodiment 1 of the present application.
The various reference numbers in the figures have the meaning:
1-a data processing module; 11-a decryption unit; 12-an encryption unit;
2-a communication module; 3-a key module; 4-an image acquisition module; and 5-a prompt module.
Detailed Description
In the description of the present invention, it is to be understood that the terms "first", "second" and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1 to 8, a multiple encryption and decryption method based on gesture displacement is provided, and is applied to a multiple encryption and decryption system, specifically referring to fig. 3, the early warning method includes the following steps:
step 100, a decryption operation is performed.
In this step, the multi-connection encryption and decryption system is formed by sequentially wirelessly connecting a plurality of password devices, and one of the password devices is wirelessly connected with the terminal.
It will be appreciated that, referring to fig. 1, the cryptographic device 2 is wirelessly connected to the cryptographic device 1 and the cryptographic device 3; the password device 1 is in wireless connection with the password device 2 and is connected with the mobile phone end.
The decryption operation refers to the decryption operation of executing the combined password, and comprises a digital decryption operation and a gesture data decryption operation.
The first combined password comprises a first digital password and a first gesture data password.
The digital decryption operation refers to the operation of inputting preset numbers and the sequence thereof through the number keys;
the gesture data decryption operation refers to an operation of recognizing data through the acquired two-dimensional gesture after the digital decryption operation passes verification;
and if and only if the digital decryption operation and the gesture data decryption operation pass verification, the decryption operation can be successfully decrypted.
It should be noted that the two-dimensional gesture recognition verification method is selected because the two-dimensional gesture recognition method has a higher recognition complexity than the two-dimensional hand type recognition method, so that the security is improved, but the application cost is not increased relatively significantly, and the two-dimensional gesture recognition method has a relatively simple recognition complexity and a relatively high hardware cost and software cost compared with the three-dimensional gesture recognition method. Three-dimensional gesture recognition needs a plurality of cameras to gather data in a multi-azimuth manner, and the algorithm complexity is further improved, namely the three-dimensional gesture recognition has the problems of high cost and complex algorithm, and cannot be well popularized.
At step 200, an encryption operation is performed.
In this step, when the decryption operation is successful, the encryption operation is triggered;
and the encryption operation is to form a second encryption combined password different from the second encryption combined password before decryption according to the backup encryption and decryption database.
The backup encryption and decryption database comprises a digital password packet and a gesture data packet.
The digital cipher packet is composed of a plurality of groups of digital ciphers.
The gesture data packet comprises a displacement data packet and a hand waving data packet.
The displacement data packet consists of a plurality of displacement values; the displacement value is an interval value.
The hand waving data packet consists of a plurality of hand waving values; the hand swing value comprises a hand swing direction detection value and a hand swing number value.
The second encryption combined password is composed of a digital password and gesture data which are different from those before decryption.
The second encryption combination password is a random combination of any one set of digital password in the digital password packet, any one displacement value in the displacement data packet and any one hand waving value in the hand waving data packet.
It can be understood that, when the user successfully decrypts the password device, the password device discards the encrypted password before decryption, and randomly forms a new combined password through the encrypted and decrypted database backed up inside the password device, where the new combined password is also composed of a digital password and gesture data. As shown in fig. 8, the backup encryption/decryption database of the cryptographic device includes a digital cryptographic packet, a displacement data packet, and a waving data packet. The cryptographic device can form a new combined cipher by selecting one data in each of its three packets, for example: the new combination code is '221133 + palm is 20-30cm away + hand is swung left 1 time and hand is swung right 1 time'.
It should be noted that, by setting the combination of the digital cipher packet, the displacement data packet and the hand waving data packet, the decryption difficulty of the lawless person can be greatly increased, and even if the lawless person acquires the data of the three packets, the lawless person can crash when performing the verification of the displacement data and the hand waving data because the lawless person cannot verify each displacement data and hand waving data. Meanwhile, when the data is displaced or waved once, the input of the digital password needs to be executed again, which further increases the difficulty of cracking.
And step 300, sharing the encryption password.
In this step, the encryption password refers to the second encryption combination password.
The sharing of the encryption password refers to the execution of the receiving and sending of the second encryption combined password between the password devices and the transmission of the password devices and the intelligent terminal;
in the stage of executing transceiving between the cryptographic devices, the second encryption combination cipher can only be executed by 'single sending multiple sharing';
the "single sending and multiple sharing" means that the cryptographic apparatus can only send the second encrypted combined password to another cryptographic apparatus, and then the another cryptographic apparatus sends the second encrypted combined password to the next cryptographic apparatus, and so on until the second encrypted combined password is obtained by all the cryptographic apparatuses;
in the stage of executing the sending of the password device and the intelligent terminal, any password device can send the encrypted combined password to the intelligent terminal, or a fixed password device sends the second encrypted combined password to the intelligent terminal.
The second encryption combination password is used for executing decryption of any one of the cryptographic devices again.
It can be understood that in the step of executing the sharing of the encryption password, the decentralized idea of the block chain is used for reference, so that the cost of the server side is greatly saved for the multi-connection encryption and decryption system, and the security of the multi-connection encryption and decryption system is also greatly improved. For example, the following steps are carried out: as shown in fig. 6, after the user decrypts the open device at the cryptographic apparatus 1, the cryptographic apparatus 1 forms a new combined password at the moment of successful decryption, and sends the new combined password to the cryptographic apparatus 2, and the cryptographic apparatus 2 sends the new combined password to the cryptographic apparatus 3, and then to the last cryptographic apparatus N in sequence. The password device 1 sends the new combined password to the password device 2 and also sends the new combined password to the mobile phone terminal of the user. At this time, the user can unlock one password device including all the password devices 1 to N according to the new combined password received by the mobile phone terminal. When the user opens the cipher device by using the new combined cipher, another new combined cipher is generated, and the process is circulated.
It should be noted that, as shown in fig. 1, the new combined password may be sent to the mobile phone end by the password device 1, or may be sent to the mobile phone end by another password device. Or, the password device 1 or the password device 2 or another password device may be fixed and sent to the mobile phone terminal. Such as: the password device 2 is fixed and sent to the mobile phone terminal, and after the password device 2 obtains the new combined password, the obtained new combined password is sent to the password device 3 and the mobile phone terminal. At this time, the communication cost of other cryptographic devices can be saved.
Preferably, based on step 100, in order to make the method for executing the decryption operation clearer, as shown in fig. 4, the method specifically further includes the following steps:
step 110, a digital password is obtained.
In this step, the user inputs the digital password at the password device to obtain the digital password.
The digital cipher may be used for digital decryption operations of any of the cryptographic devices.
And step 120, judging whether the digital password is correct, and if not, returning to the step 110.
In this step, the password device determines whether the input digital password is correct;
if the digital password is wrong, the process returns to step 110 to re-acquire the digital password.
In order to facilitate the user to execute the decryption operation, a prompting module of an LED lamp or a voice unit can be arranged on the password device and used for prompting the user whether each step is correct or wrong.
It is understood that when the user inputs a wrong numeric password, the LED light of the password device is turned on to emit red light, or the voice module of the password device prompts a "wrong" voice message.
And step 130, acquiring gesture data when the digital password is correct.
In this step, after the input digital password is correct, the gesture data verification stage can be entered to obtain the gesture data.
And the gesture data verification stage comprises displacement detection and hand waving detection.
The displacement detection refers to distance detection executed by the password device for the palm.
The hand swing detection refers to the detection of the number and sequence of hand swing performed by the password device for the palm.
It can be understood that when the user inputs the correct numeric password, the LED light of the password device is turned on to be green, or the voice module of the password device prompts the "correct" voice message.
Step 140, determine whether the displacement detection reaches the departure threshold, if not, return to step 110.
In this step, the threshold refers to a displacement interval value in the combined cipher in the current decryption state, and is also a displacement value belonging to the displacement data packet.
The distance threshold value is a displacement interval value of the palm far away from the password device.
And when the input digital password is correct, carrying out displacement detection.
It can be understood that, as shown in fig. 5, when the digital password input by the user is correct in the combined password in the current decryption state, the detection module that detects that the palm is far away from the password device needs to reach a certain displacement value in an interval, so as to enter the hand waving detection stage.
It will be appreciated that, as shown in fig. 7, for example: the distance threshold of the combined password in the current decryption state is 15-25cm, that is, the palm is required to be detected to be away from any distance value between 15cm and 25cm of the password device, if the palm of the user stops after being away from the password device by 18cm, the user reaches the distance threshold, and if the palm of the user stops after being away from the password device by 13cm or 27cm, the user does not reach the distance threshold.
It should be noted that, in the technical scheme of this section, based on that after the user inputs the numeric code, the palm of the user is still located at the password device, and the user only needs to perform displacement detection from the numeric key, and no other body movement steps are needed, so that the user experience can be effectively improved.
If the displacement detection fails to reach the departure threshold, the process returns to step 110.
It can be understood that when the displacement detection does not reach the far threshold, the LED light of the password device is turned on to emit red light, or the voice module of the password device prompts an "error" voice message.
If the displacement detection reaches the departure threshold, step 150 is entered.
It is understood that when the displacement detection reaches a far threshold, the LED of the password device is turned on to be green, or the voice module of the password device prompts a "correct" voice message.
Step 150, when the displacement detection reaches the far threshold, determining whether the hand waving detection reaches the hand waving threshold, if not, returning to step 110.
In this step, when the displacement detection reaches the distance threshold, the hand waving detection is performed.
The hand waving threshold value comprises a hand waving direction detection value and a hand waving number value.
The hand swing direction detection value is a detection value for detecting that the palm swings left or right based on the vertical palm state.
The hand waving number value is a hand waving value obtained by waving the hand leftwards or rightwards and returning to the vertical palm state on the basis of the vertical palm state, and is used for detecting the hand waving number executed by the palm.
The hand waving detection is required to be at the position far away from the threshold value, and the preset hand waving direction detection value and the hand waving number value are reached at the same time, and then the hand waving detection is determined to reach the hand waving threshold value.
It can be understood that, as shown in fig. 7, the hand waving threshold is left 1 time and right 1 time, and the user waves the hand left and then waves the hand right again far away from the threshold, which indicates that the hand waving detection meets the hand waving threshold, and enters the decryption completion stage.
If the hand swing detection fails to reach the hand swing threshold, the process returns to step 110.
It can be understood that when the hand waving detection does not reach the hand waving threshold, the LED lamp of the password device is turned on to emit red light, or the voice module of the password device prompts an "error" voice message.
If the hand waving detection reaches the hand waving threshold, proceed to step 160.
It can be understood that when the hand waving detection reaches the hand waving threshold, the LED lamp of the password device is turned on to be green, or the voice module of the password device prompts the "correct" voice message.
In step 160, if the hand waving detection reaches the hand waving threshold, the decryption is successful, and step 200 is executed, i.e., the operation of forming a new second encryption combination password is executed.
In this step, the successful decryption means that the password device completes decryption and unlocking after the digital password and the gesture data are correctly verified.
The step of forming the second encryption combined password means that after the decryption is successful, the password device forms a combined password different from that before the decryption according to the backup encryption and decryption database.
The second encryption combination password is used for decrypting any one of the cryptographic devices again.
Example 2
A multi-connection encryption and decryption system based on gesture displacement is shown in figure 1 and comprises an intelligent terminal and a password device group.
And the intelligent terminal is used for acquiring a new combined password of one password device in the password device group.
The password device group consists of a plurality of password devices which are sequentially and wirelessly connected and used for being executed with decryption operation and encryption operation.
And after the decryption operation is finished, automatically executing the encryption operation to form a new combined password.
The new combined password is transmitted to the other cryptographic devices of the cryptographic device group in sequence for performing a further decryption operation.
Example 3
Referring to fig. 2, any one cryptographic device of the set of cryptographic devices further comprises: the device comprises a data processing module 1, a communication module 2, a key module 3, an acquisition module 4 and a prompt module 5.
The data processing module 1 comprises a decryption unit 11 and an encryption unit 12;
the decryption unit 11 is used for executing decryption operation of the digital password and the gesture data password;
the encryption unit 12 is used for forming an encryption operation of a new combined password after the decryption unit finishes the decryption operation;
the communication module 2 is used for communication between the password device and also used for communication between the password device and the intelligent terminal;
the key module 3 is used for executing the input operation of the digital password;
the acquisition module 4 comprises an image acquisition unit and a millimeter wave unit and is used for acquiring gesture data;
the key module 3 is arranged on any surface of the password device; the acquisition module 4 is arranged on the key module 3 or any side of the key module;
the prompt module 5 is used for performing prompt of correctness or mistake of the decryption step during decryption operation, and the prompt module 5 comprises an LED lamp or/and a loudspeaker.
The input of the digital password is performed through the key module 3 of any one of the password devices in the password device group.
The key module 3 acquires a digital password and transmits the digital password to the decryption unit 11.
The decryption unit 11 judges the correctness of the digital password, if the digital password is correct, the prompt module gives a correct prompt, the acquisition module 4 acquires gesture data and sends the gesture data to the decryption unit 11; if the password is wrong, the prompting module gives a wrong prompt and returns to the key module 3 to obtain the digital password again.
On the basis that the digital password is judged to be correct, the decryption unit 11 judges the correctness of the gesture data, if the gesture data is correct, a prompt module gives a correct prompt and unlocks the password device; if the password is wrong, the prompting module gives a wrong prompt and returns to the key module 3 to obtain the digital password again.
On the basis that the gesture data are judged to be correct, the decryption unit 11 sends an encryption instruction to the encryption unit 12, and the encryption unit 12 forms a new combined password.
And the password device for forming the new combined password sends the new combined password to another password device, and the other password device sends the next password device again, so that the new combined password is sent successively until all password devices obtain the new combined password.
And the password device sends the new combined password to the intelligent terminal to form backup data.
The new combined cipher is used to execute the next decryption operation of any one cipher device, so as to form a new combined cipher in a loop.
Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the implementation scenarios of the present application.
In an embodiment of the present invention, there is provided a computer device including a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, wherein the processor implements any one of the above when executing the computer program.
Optionally, the computer device may also include a user interface, a network interface, a camera, Radio Frequency (RF) circuitry, sensors, audio circuitry, a WI-FI module, and so forth. The user interface may include a Display screen (Display), an input unit such as a keypad (Keyboard), etc., and the optional user interface may also include a USB interface, a card reader interface, etc. The network interface may optionally include a standard wired interface, a wireless interface (e.g., a bluetooth interface, WI-FI interface), etc.
It will be appreciated by those skilled in the art that the present embodiment provides a computer device architecture that is not limiting of the computer device, and that may include more or fewer components, or some components in combination, or a different arrangement of components.
The storage medium may further include an operating system and a network communication module. An operating system is a program that manages and maintains the hardware and software resources of a computer device, supporting the operation of information handling programs, as well as other software and/or programs. The network communication module is used for realizing communication among components in the storage medium and other hardware and software in the entity device.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present application can be implemented by software plus a necessary general hardware platform, and can also implement its corresponding software by a hardware platform.
Those skilled in the art will appreciate that the figures are merely schematic representations of one preferred implementation scenario and that the blocks or flow diagrams in the figures are not necessarily required to practice the present application. Those skilled in the art will appreciate that the modules in the devices in the implementation scenario may be distributed in the devices in the implementation scenario according to the description of the implementation scenario, or may be located in one or more devices different from the present implementation scenario with corresponding changes. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above application serial numbers are for description purposes only and do not represent the superiority or inferiority of the implementation scenarios. The above disclosure is only a few specific implementation scenarios of the present application, but the present application is not limited thereto, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present application.

Claims (8)

1. A multi-connected encryption and decryption method based on gesture displacement is applied to any password device of a multi-connected encryption and decryption system, and is characterized by comprising the following process steps:
step S100, executing decryption operation;
step S200, performing encryption operation;
step S300, sharing the encryption password;
the multi-connected encryption and decryption system is formed by sequentially and wirelessly connecting a plurality of password devices, and at least one password device is wirelessly connected with the intelligent terminal;
the decryption operation refers to the decryption operation of executing the first combined password, and comprises a digital decryption operation and a gesture data decryption operation;
the first combined password comprises a first digital password and a first gesture data password;
the digital decryption operation refers to the operation of inputting preset numbers and the sequence thereof through the number keys;
the gesture data decryption operation is an operation of acquiring two-dimensional gesture recognition data after the digital decryption operation passes verification;
if and only if the digital decryption operation and the gesture data decryption operation both pass verification, the decryption operation can be decrypted successfully;
when the decryption operation is successful, triggering the encryption operation to form and share the encryption password;
the executing the decryption operation specifically includes the following steps:
step S110, acquiring the first digital password;
step S120, judging whether the first digital password is correct, if not, returning to the step S110;
step S130, if the first digital password is correct, the first gesture data password is obtained;
step S140, judging whether the displacement detection reaches a distance threshold value, if not, returning to the step S110;
step S150, judging whether the hand waving detection reaches a hand waving threshold value when the displacement detection reaches the far threshold value, and returning to the step S110 if the displacement detection does not reach the hand waving threshold value;
step S160, if the hand waving detection reaches the hand waving threshold, the decryption is successful, and step S200 is executed;
the displacement detection refers to distance detection executed by the password device on the palm;
the hand waving detection refers to the detection of the hand waving times and sequence executed by the password device on the palm;
the distance threshold value is a displacement interval numerical value of the palm far away from the password device;
when the input digital password is correct, the detection palm is required to be far away from the detection module of the password device to reach the far threshold value, and then the hand waving detection stage can be started.
2. The multi-connection encryption and decryption method based on gesture displacement as claimed in claim 1, further comprising:
when the displacement detection reaches the far threshold value, the waving detection is carried out;
the hand waving threshold comprises a hand waving direction detection value and a hand waving number value;
the hand waving direction detection value is a detection value for detecting that the palm waves the hand leftwards or rightwards on the basis of the vertical palm state;
the hand waving number value is a hand waving value obtained by waving the hand leftwards or rightwards and returning to the vertical palm state on the basis of the vertical palm state, and the hand waving number executed by the palm is detected;
the hand waving detection is required to be at the position far away from the threshold value, and the preset hand waving direction detection value and the hand waving number value are reached at the same time, and then the hand waving detection is determined to reach the hand waving threshold value.
3. The multi-connection encryption and decryption method based on gesture displacement as claimed in claim 2, further comprising:
the encryption operation is to form a second encryption combined password which is different from the encryption operation according to the backup encryption and decryption database;
the backup encryption and decryption database comprises a digital password packet and a gesture data packet;
the digital password packet consists of a plurality of groups of digital passwords;
the gesture data packet comprises a displacement data packet and a waving data packet;
the displacement data packet consists of a plurality of displacement values; the displacement value is an interval value;
the hand waving data packet consists of a plurality of hand waving values; the hand waving value comprises a plurality of hand waving direction detection values and a plurality of hand waving times values;
the second encryption combined password is composed of a second digital password and a second gesture data password which are different from the second digital password and the second gesture data password during the decryption operation;
the second encryption combined password is formed by randomly combining any one group of digital passwords in the digital password packet, any one displacement value in the displacement data packet and any three groups of data of any one hand waving value in the hand waving data packet.
4. The multi-connection encryption and decryption method based on gesture displacement as claimed in claim 3, wherein the sharing of the encryption password further comprises:
the encryption password is the second encryption combined password;
the sharing of the encryption password refers to executing the receiving and sending of the second encryption combined password between the password devices and executing the sending of the second encryption combined password between the password devices and the intelligent terminal;
in the stage of executing the transceiving between the password devices, the second encryption combination password can only be executed to be sent singly for multiple times of sharing;
the single sending and multiple sharing means that the password device can only send the second encrypted combined password to another password device, and then the password device sends the second encrypted combined password to the next password device, and so on until all the password devices obtain the second encrypted combined password;
in the stage of executing the transmission between the cryptographic device and the intelligent terminal, any cryptographic device can transmit the second encryption combined password to the intelligent terminal, or one cryptographic device is fixed to transmit the second encryption combined password to the intelligent terminal;
the second encryption combination password is used for executing decryption of any one of the cryptographic devices again.
5. A multi-connection encryption and decryption system based on gesture displacement is characterized by comprising: an intelligent terminal and a password device group;
the intelligent terminal is used for acquiring a new combined password of at least one password device in the password device group;
the password device group consists of a plurality of password devices which are sequentially connected in a wireless way and are used for being executed with decryption operation and encryption operation;
after the decryption operation is finished, automatically executing the encryption operation to form a new combined password;
the new combined password is sequentially transmitted to other password devices of the password device group for executing the decryption operation again;
the decryption operation refers to the decryption operation of executing the first combined password, and comprises a digital decryption operation and a gesture data decryption operation;
the first combined password comprises a first digital password and a first gesture data password;
the digital decryption operation refers to the operation of inputting preset numbers and the sequence thereof through the number keys;
the gesture data decryption operation is an operation of acquiring two-dimensional gesture recognition data after the digital decryption operation passes verification;
and if and only if the digital decryption operation and the gesture data decryption operation are verified, the decryption operation can be successfully decrypted.
6. The multi-gang encryption and decryption system based on gesture displacement as claimed in claim 5, further comprising:
any cryptographic device of the set of cryptographic devices further comprises: the device comprises a data processing module (1), a communication module (2), a key module (3), an acquisition module (4) and a prompt module (5);
the data processing module (1) comprises a decryption unit (11) and an encryption unit (12);
the decryption unit (11) is used for executing decryption operation of the digital password and the gesture data password;
the encryption unit (12) is used for forming encryption operation of a new combined password after the decryption unit finishes decryption operation;
the communication module (2) is used for communication between the password device and also used for communication between the password device and the intelligent terminal;
the key module (3) is used for executing the input operation of a digital password;
the acquisition module (4) comprises an image acquisition unit and a millimeter wave unit and is used for acquiring gesture data;
the key module (3) is arranged on any surface of the password device; the acquisition module (4) is arranged on the key module (3);
and the prompting module (5) comprises an LED lamp or/and a loudspeaker and is used for prompting whether the decryption step is correct or wrong when the decryption operation is carried out.
7. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the method for multiple encryption and decryption based on gesture displacement according to any one of claims 1 to 4.
8. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, wherein the processor implements the method for gesture displacement based multiple encryption and decryption according to any one of claims 1 to 4 when executing the computer program.
CN202111536459.XA 2021-12-16 2021-12-16 Multi-connection encryption and decryption method, device and system based on gesture displacement Active CN113938284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111536459.XA CN113938284B (en) 2021-12-16 2021-12-16 Multi-connection encryption and decryption method, device and system based on gesture displacement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111536459.XA CN113938284B (en) 2021-12-16 2021-12-16 Multi-connection encryption and decryption method, device and system based on gesture displacement

Publications (2)

Publication Number Publication Date
CN113938284A CN113938284A (en) 2022-01-14
CN113938284B true CN113938284B (en) 2022-03-25

Family

ID=79288999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111536459.XA Active CN113938284B (en) 2021-12-16 2021-12-16 Multi-connection encryption and decryption method, device and system based on gesture displacement

Country Status (1)

Country Link
CN (1) CN113938284B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116842544A (en) * 2023-07-07 2023-10-03 山东普惠共享经济技术开发有限公司 Data security management method, data security management device and data security management system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9576285B2 (en) * 2002-10-01 2017-02-21 Dylan T X Zhou One gesture, one blink, and one-touch payment and buying using haptic control via messaging and calling multimedia system on mobile and wearable device, currency token interface, point of sale device, and electronic payment card
CN104951693A (en) * 2015-06-12 2015-09-30 惠州Tcl移动通信有限公司 Method and system for password input detection based on mobile terminal
CN106778135A (en) * 2016-12-15 2017-05-31 余仁植 A kind of image processing equipment unlocking method, image processing equipment and system
CN109241718A (en) * 2018-08-23 2019-01-18 百度在线网络技术(北京)有限公司 Cipher processing method and equipment
CN111831986B (en) * 2020-06-05 2024-05-28 阿波罗智联(北京)科技有限公司 Unlocking method and device based on gesture password
CN111814124B (en) * 2020-07-20 2024-03-29 南京云柜网络科技有限公司 Intelligent terminal gesture encryption code safe login system and method

Also Published As

Publication number Publication date
CN113938284A (en) 2022-01-14

Similar Documents

Publication Publication Date Title
KR101727660B1 (en) Method of using one device to unlock another device
JP6444500B2 (en) User authentication method and system using variable keypad and biometric authentication
US20170063827A1 (en) Data obfuscation method and service using unique seeds
US20210398134A1 (en) Biocrypt Digital Wallet
EP3121991B1 (en) System and method of user authentication using digital signatures
CN113748691A (en) System and method for authenticating a connection between a user device and a vehicle
JP2004536384A (en) Method, system, and computer program for remote authentication of fingerprint via network
US20190260589A1 (en) Identity validity verification method, apparatus and system
CN105227537A (en) Method for authenticating user identity, terminal and service end
WO2017020426A1 (en) Communication method, apparatus and system based on biological feature identification
CN112636914B (en) Identity verification method, identity verification device and smart card
EP3876495A1 (en) Method and system for operating internet of things device
CN113141340B (en) Multi-node authentication method and device
CN106650373A (en) SIM card information protection method and device
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
JP2022533979A (en) User authentication and signature device using user biometrics, and method thereof
KR101052294B1 (en) Content Security Devices and Content Security Methods
CN113938284B (en) Multi-connection encryption and decryption method, device and system based on gesture displacement
US20230108664A1 (en) Method for verifying liveness, and server using the same
US12019719B2 (en) Method and electronic device for authenticating a user
US9949122B2 (en) Challenge-response-test image to phone for secure pairing
KR20110029107A (en) Device detection of secure identity authentication
CN105208045A (en) Identity authentication method, equipment and system
CN110651268B (en) Method for authenticating user and electronic equipment
CN105072084B (en) Method for establishing data connection between mobile terminal and external device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant