CN107148016A - Terminal connection method, device and electronic equipment - Google Patents
Terminal connection method, device and electronic equipment Download PDFInfo
- Publication number
- CN107148016A CN107148016A CN201710262439.5A CN201710262439A CN107148016A CN 107148016 A CN107148016 A CN 107148016A CN 201710262439 A CN201710262439 A CN 201710262439A CN 107148016 A CN107148016 A CN 107148016A
- Authority
- CN
- China
- Prior art keywords
- terminal
- password
- biometric keys
- ciphertext
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of terminal connection method, device and electronic equipment, wherein methods described includes:Obtain connectable terminal;Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate biometric keys;Obtain the biometric keys prestored;Judge whether generated biometric keys are identical with the biometric keys prestored;When the biometric keys generated are identical with the biometric keys prestored, the terminal password ciphertext is decrypted;Corresponding terminal is connected using the terminal password after decryption.
Description
Technical field
The present invention relates to information security field, and in particular to terminal connection method and device and electronic equipment.
Background technology
There is huge demand in the interconnection between Internet era, terminal device, user needs to set the terminal of oneself
It is standby to be connected to by wired or wireless mode on other-end, for example, needing the mobile phone of oneself being connected into WiFi nets in user
, it is necessary to which by oneself mobile phone and WiFi terminal, i.e. wireless router is attached during network.User when being connected with different terminals,
For security concerns, be generally required for input password, password authentification by when just allow access.Due to needing what is connected
Terminal device is more and more, and user is difficult to remember all access pins, and these usual access pins are all stored in user terminal
On, easily it is cracked, security is not high, and encrypt and decrypt operation is complicated, user experience is poor.
The content of the invention
In view of this, the embodiments of the invention provide a kind of terminal connection method and device and electronic equipment, to solve
The problem of connection password is easily cracked and encrypt and decrypt operation is complicated.
First aspect present invention provides a kind of terminal connection method, including:
Obtain connectable terminal;
Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;
When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate life
Thing feature key;
Obtain the biometric keys prestored;
Judge whether generated biometric keys are identical with the biometric keys prestored;
It is close to the terminal password when the biometric keys generated are identical with the biometric keys prestored
Text is decrypted;
Corresponding terminal is connected using the terminal password after decryption.
In the case of the terminal password ciphertext corresponding with terminal name that is stored with, user biological characteristic information is obtained, and
The biometric keys that acquired user biological characteristic information is generated are compared with the biometric keys prestored, when than
Decryption oprerations are just performed when more identical, terminal password ciphertext are decrypted so as to connect corresponding terminal, due to terminal
Password has ensured the safety of terminal password to be stored in the form of ciphertext in mobile terminal, and user can easily connect
It is connected to terminal network
With reference to first aspect present invention, in first aspect present invention first embodiment, in addition to:
When in the absence of terminal password ciphertext corresponding with the terminal name, the terminal password of user's input is obtained;
Judge whether the terminal password of user's input matches with the terminal name;
When the terminal password that user inputs is matched with the terminal name, the terminal password connection pair inputted using user
The terminal answered;
Obtain the biometric keys generated according to user biological characteristic information;
The terminal password inputted by the biometric keys to user is encrypted to obtain terminal password ciphertext.
In the case of the terminal password ciphertext corresponding with terminal name that is not stored with, if user have input correct end
Password is held, then the terminal password inputted using user biological characteristic information to user is encrypted to obtain terminal password ciphertext,
To ensure the safety of terminal password.
With reference to first aspect present invention, in first aspect present invention second embodiment, to the terminal password ciphertext
It is decrypted with before connecting corresponding terminal, in addition to:
At least one ciphertext of the terminal password ciphertext is decomposed file reduction to obtain the terminal password ciphertext.
Terminal password ciphertext is broken down at least one and decomposes file and be stored in mobile terminal, and the terminal after decomposition is close
The possibility that code ciphertext is cracked by attacker will be reduced a lot, further ensure the security of terminal password.
With reference to first aspect present invention, in the embodiment of first aspect present invention the 3rd, described to obtain the biology prestored special
Key is levied, including:
At least one key decomposition file of the biometric keys prestored described in obtaining;
At least one described key decomposition file is reduced to obtain the biometric keys prestored.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password
More it is difficult to be cracked, enhances the security of terminal password.
With reference to one or three aspect first embodiment of the invention, in the embodiment of first aspect present invention the 4th, passing through
The terminal password that the biometric keys are inputted to user is encrypted with after obtaining terminal password ciphertext, in addition to:
The terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext.
The possibility that terminal password ciphertext after decomposition is cracked by attacker will be reduced a lot, further ensure terminal
The security of password.
It is described to obtain in the embodiment of first aspect present invention the 5th with reference to first aspect present invention first embodiment
The biometric keys generated according to user biological characteristic information, including:
Obtain at least one key decomposition file of the biometric keys;
At least one described key decomposition file is reduced to obtain the biometric keys.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password
More it is difficult to be cracked, enhances the security of terminal password.
With reference to any one of first aspect present invention, first aspect first embodiment into the 5th embodiment, this hair
In the bright embodiment of first aspect the 6th, the connectable terminal is WiFi terminal.
Second aspect of the present invention provides a kind of terminal connection device, including:
Terminal acquisition module, for obtaining connectable terminal;
Searching modul, for searching terminal password corresponding with the terminal name according to the terminal name of connectable terminal
Ciphertext;
Key production module, for when there is terminal password ciphertext corresponding with the terminal name, obtaining user's life
Thing characteristic information is to generate biometric keys;
First key acquisition module, for obtaining the biometric keys prestored;
First judge module, for judge generated biometric keys whether with the biometric keys prestored
It is identical;
Deciphering module, it is right for when the biometric keys generated are identical with the biometric keys prestored
The terminal password ciphertext is decrypted;
First link block, for connecting corresponding terminal using the terminal password after decryption.
In the case of the terminal password ciphertext corresponding with terminal name that is stored with, user biological characteristic information is obtained, and
The biometric keys that acquired user biological characteristic information is generated are compared with the biometric keys prestored, when than
Decryption oprerations are just performed when more identical, terminal password ciphertext are decrypted so as to connect corresponding terminal, due to terminal
Password has ensured the safety of terminal password to be stored in the form of ciphertext in mobile terminal, and user can easily connect
It is connected to terminal network
With reference to second aspect of the present invention, in second aspect of the present invention first embodiment, in addition to:
Password Input module, for when in the absence of terminal password ciphertext corresponding with the terminal name, obtaining user
The terminal password of input;
Second judge module, for judging whether the terminal password of user's input matches with the terminal name;
Second link block, it is defeated using user for when the terminal password that user inputs is matched with the terminal name
The terminal password entered connects corresponding terminal;
Second Key Acquisition Module, for obtaining the biometric keys generated according to user biological characteristic information;
Encrypting module, the terminal password for being inputted by the biometric keys to user is encrypted to obtain end
Hold cryptographic secret.
In the case of the terminal password ciphertext corresponding with terminal name that is not stored with, if user have input correct end
Password is held, then the terminal password inputted using user biological characteristic information to user is encrypted to obtain terminal password ciphertext,
To ensure the safety of terminal password.
With reference to second aspect of the present invention, in second aspect of the present invention second embodiment, in addition to:
Recovery module, is reduced to obtain the end at least one ciphertext of the terminal password ciphertext to be decomposed into file
Hold cryptographic secret.
Terminal password ciphertext is broken down at least one and decomposes file and be stored in mobile terminal, and the terminal after decomposition is close
The possibility that code ciphertext is cracked by attacker will be reduced a lot, further ensure the security of terminal password.
With reference to second aspect of the present invention, in the embodiment of second aspect of the present invention the 3rd, the first key acquisition module
Including:
First decomposes file obtaining unit, at least one key decomposition for obtaining the biometric keys prestored
File;
First key reduction unit, for the reduction of at least one described key decomposition file to be obtained to the life prestored
Thing feature key.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password
More it is difficult to be cracked, enhances the security of terminal password.
With reference to second aspect of the present invention first embodiment, in the embodiment of second aspect of the present invention the 4th, in addition to:
Decomposing module, is decomposed for being decomposed to the terminal password ciphertext with obtaining at least one terminal password ciphertext
File.
The possibility that terminal password ciphertext after decomposition is cracked by attacker will be reduced a lot, further ensure terminal
The security of password.
With reference to second aspect of the present invention first embodiment, in the embodiment of second aspect of the present invention the 5th, described second
Key Acquisition Module includes:
Second decomposes file obtaining unit, at least one key decomposition file for obtaining the biometric keys;
Second key recovery unit, for the reduction of at least one described key decomposition file to be obtained into the biological characteristic
Key.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password
More it is difficult to be cracked, enhances the security of terminal password.
With reference to any one of second aspect of the present invention, second aspect first embodiment into the 5th embodiment, this hair
In the bright embodiment of second aspect the 6th, the connectable terminal is WiFi terminal.
Third aspect present invention provides a kind of electronic equipment, and it includes second aspect of the present invention and second party of the present invention
Device described in any one in any embodiment in face.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood from by reference to accompanying drawing, accompanying drawing is schematical without that should manage
Solve to carry out any limitation to the present invention, in the accompanying drawings:
Fig. 1 shows a flow chart of the terminal connection method of the embodiment of the present invention;
Fig. 2 shows another flow chart of the terminal connection method of the embodiment of the present invention;
Fig. 3 shows another flow chart of the terminal connection method of the embodiment of the present invention;
Fig. 4 shows a schematic diagram of the terminal connection device of the embodiment of the present invention;
Fig. 5 shows a schematic diagram of the electronic equipment of the embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having
There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
Fig. 1 shows a flow chart of the terminal connection method of the embodiment of the present invention, and this method goes for such as
The mobile terminals such as mobile phone, as shown in figure 1, this method may include steps of:
S101. connectable terminal is obtained.Herein, connectable terminal for example can be WiFi terminal or bluetooth
Terminal, infrared terminal, NFC (Near Field Communication, near-field communication) terminal etc., certainly, pass through wired connection
Connectable terminal be also feasible.By taking mobile terminal connection WiFi terminal as an example, when mobile terminal opens WiFi, it can obtain
Take listed in the list of attachable WiFi around it, list the WiFi titles that can connect WiFi (service set, SSID,
Service Set Identifier)。
S102. terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal, when
During in the presence of terminal password ciphertext corresponding with the terminal name, perform step S103, when in the absence of with the terminal name pair
During the terminal password ciphertext answered, then step S108 is performed.For example, mobile terminal is looked into one by one according to the WiFi titles that can connect WiFi
Look for the WiFi cryptographic secrets corresponding with the WiFi titles that whether are stored with, it is preferable that mobile terminal is according to can connect WiFi letter
Number intensity, searches whether the WiFi cryptographic secrets corresponding with the WiFi titles that are stored with one by one from big to small.WiFi passwords with
The form of ciphertext is stored in mobile terminal, to ensure the safety of WiFi passwords.
S103. user biological characteristic information is obtained to generate biometric keys.Herein, user biological characteristic information can
With including face characteristic information, fingerprint feature information, vocal print feature information and iris feature information etc., face characteristic information and rainbow
Film characteristic information can for example be obtained by camera, and fingerprint feature information can for example be obtained by fingerprint sensor, vocal print
Characteristic information can for example be obtained by microphone.After user biological characteristic information is obtained, it is possible to pass through various lifes
Thing feature key generating algorithm generates user-defined specific key.
S104. the biometric keys prestored are obtained.
S105. judge whether generated biometric keys are identical with the biometric keys prestored, when identical
Shi Zhihang step S106, do not perform any operation then when differing.
S106. terminal password ciphertext is decrypted.For example, WiFi cryptographic secrets are decrypted.
S107. corresponding terminal is connected using the terminal password after decryption.Completed for example, being decrypted to WiFi cryptographic secrets
Afterwards, you can to connect corresponding WiFi by WiFi passwords.
S108. the terminal password of user's input is obtained.In this case, it is not present in mobile terminal corresponding with terminal name
Terminal password ciphertext, terminal password can only be manually entered by user.
S109. judge whether the terminal password of user's input matches with the terminal name, mobile terminal is inputted in user
Terminal password when being matched with the terminal name, perform step S110, the terminal password and the terminal name inputted in user
When claiming to mismatch, then terminal can not be connected, then be back to the terminal password that step S107 obtains user's input again.
S110. the terminal password inputted using user connects corresponding terminal.
S111. the biometric keys generated according to user biological characteristic information are obtained.Herein, user biological feature is believed
Breath is prestored, as described in step S103, and it is special that user biological characteristic information can include face characteristic information, fingerprint
Reference breath, vocal print feature information and iris feature information etc..
S112. the terminal password inputted by biometric keys to user is encrypted to obtain terminal password ciphertext.
It is encrypted for example, encryption information can be treated by the symmetric cryptosystem based on biometric keys.It is alternatively possible to adopt
AES symmetric cryptosystems are used, are taken with improving encryption efficiency and reducing system resource.
By above method step, mobile terminal is in the situation of terminal password ciphertext corresponding with terminal name that is stored with
Under, user biological characteristic information is obtained, and the biometric keys that acquired user biological characteristic information is generated are with prestoring
Biometric keys be compared, when relatively it is identical when just perform decryption oprerations, terminal password ciphertext is decrypted so that
Corresponding terminal can be connected, because terminal password in the form of ciphertext to be stored in mobile terminal, terminal password has been ensured
Safety, and user can easily be connected to terminal;Mobile terminal is close in the terminal corresponding with terminal name that is not stored with
In the case of code ciphertext, if user have input correct terminal password, user is inputted using user biological characteristic information
Terminal password be encrypted to obtain terminal password ciphertext, to ensure the safety of terminal password.
Fig. 2 shows another flow chart of the terminal connection method of the embodiment of the present invention, and this method can include as follows
Step:
S201. connectable terminal is obtained, particular content is with reference to described in step S101;
S202. terminal password ciphertext corresponding with the terminal name, tool are searched according to the terminal name of connectable terminal
Hold in vivo with reference to described in step S102;
S203. user biological characteristic information is obtained to generate biometric keys, and particular content is with reference to described in step S103;
S204. the biometric keys prestored are obtained, particular content is with reference to described in step S104;
S205. judge whether generated biometric keys are identical with the biometric keys prestored, it is specific interior
Hold with reference to described in step S105;
S206. at least one ciphertext of terminal password ciphertext is decomposed file reduction to obtain terminal password ciphertext;At this
In, terminal password ciphertext is broken down into multiple ciphertexts and decomposes file and be stored in mobile terminal, it is necessary to first by multiple ciphertexts point
Solution file reduction obtains terminal password ciphertext, operation it could be decrypted, so, the terminal password ciphertext after decomposition is attacked
The possibility that the person of hitting cracks will be reduced a lot, further ensure the security of terminal password;Various decomposition sides can be used
Method decomposes file to obtain ciphertext, for example, according to a random number terminal password ciphertext can be resolved into multiple files, should be with
Machine numerical example such as can be the number in 5 to 9;For example, first of the file after decomposition can be random number, afterwards
Digit is using random number as loop cycle, if encryption information is abcdefg123456, random number is 5, point after so decomposing
Solution file is 5af4,5bg5,5c16,5d2,5e3;Certainly, a kind of decomposition method simply is listed herein, other decomposition methods
It is also equally applicable, restoring method herein is the inverse process of above-mentioned decomposition method;
S207. terminal password ciphertext is decrypted, particular content is with reference to described in step S106;
S208. corresponding terminal is connected using the terminal password after decryption, particular content is with reference to described in step S107;
S209. the terminal password of user's input is obtained, particular content is with reference to described in step S108;
S210. judge whether the terminal password of user's input matches with the terminal name, particular content refers to step
Described in S109;
S211. the terminal password inputted using user connects corresponding terminal, and particular content is with reference to described in step S110;
S212. the biometric keys generated according to user biological characteristic information are obtained, particular content refers to step S111
It is described;
S213. the terminal password inputted by biometric keys to user is encrypted to obtain terminal password ciphertext,
Particular content is with reference to described in step S112;.
S214. terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext, similarly,
For example terminal password ciphertext can be decomposed into by multiple terminal password ciphertexts using the decomposition method described in step S206
File is decomposed, multiple ciphertexts first must be decomposed file reduction and obtain terminal password ciphertext, it could be carried out by such attacker
Decryption oprerations, reduce the possibility that terminal password ciphertext is cracked by attacker, have further ensured the security of terminal password.
Compared with the embodiment shown in Fig. 1, the terminal connection method of the present embodiment is by the way that terminal password ciphertext is decomposed into
Multiple terminal password ciphertexts decompose file, so when connecting terminal, and multiple ciphertexts will first be decomposed to file reduction and obtain terminal
Cryptographic secret, then terminal password ciphertext is decrypted, and connects corresponding terminal, attack using the terminal password after decryption
Person may be not aware that encryption information was decomposed, in this case, and various crack methods can all fail, so as to reduce end
The possibility that end cryptographic secret is cracked by attacker, has further ensured the security of terminal password.
Fig. 3 shows another flow chart of the terminal connection method of the embodiment of the present invention, and this method can include as follows
Step:
S301. connectable terminal is obtained, particular content is with reference to described in step S201;
S302. terminal password ciphertext corresponding with the terminal name, tool are searched according to the terminal name of connectable terminal
Hold in vivo with reference to described in step S202;
S303. user biological characteristic information is obtained to generate biometric keys, and particular content is with reference to described in step S203;
S304. at least one key decomposition file of the biometric keys prestored, herein, biometric keys are obtained
It is also to resolve into multiple key decomposition files by key decomposition algorithm, for example, can uses the decomposition in above-mentioned steps S206
Method is decomposed to biometric keys;
S305. at least one key decomposition file is reduced into the biometric keys to be prestored, reduction herein
Method is the inverse process of the decomposition method in above-mentioned steps S206;
S306. judge whether generated biometric keys are identical with the biometric keys prestored, it is specific interior
Hold with reference to described in step S205;
S307. at least one ciphertext of terminal password ciphertext is decomposed into file to reduce to obtain terminal password ciphertext, specifically
Content is with reference to described in step S206;
S308. terminal password ciphertext is decrypted, particular content is with reference to described in step S207;
S309. corresponding terminal is connected using the terminal password after decryption, particular content is with reference to described in step S208;
S310. the terminal password of user's input is obtained, particular content is with reference to described in step S209;
S311. judge whether the terminal password of user's input matches with the terminal name, particular content refers to step
Described in S210;
S312. the terminal password inputted using user connects corresponding terminal, and particular content is with reference to described in step S211;
S313. at least one key decomposition text of the biometric keys generated according to user biological characteristic information is obtained
Part, similarly, herein, biometric keys are also to resolve into multiple key decomposition files by key decomposition algorithm;
S314. at least one key decomposition file is reduced to obtain biometric keys;
S315. the terminal password inputted by biometric keys to user is encrypted to obtain terminal password ciphertext,
Particular content is with reference to described in step S213;
S316 is decomposed to terminal password ciphertext decomposes file, particular content to obtain at least one terminal password ciphertext
With reference to described in step S214.
Compared with the embodiment shown in Fig. 2, the terminal connection method of the present embodiment decomposes crucial biometric keys
Storage, has ensured biometric keys, so that terminal password ciphertext is more difficult to be cracked, has enhanced terminal password ciphertext
Security.
Ground is corresponded, the embodiment of the present invention additionally provides a kind of terminal connection device, as shown in figure 4, the terminal connects
Connection device can include:
Terminal acquisition module 401, for obtaining connectable terminal, particular content is with reference to described in step S101;
Searching modul 402, for searching terminal corresponding with the terminal name according to the terminal name of connectable terminal
Cryptographic secret, particular content is with reference to described in step S102;
Key production module 403, for when there is terminal password ciphertext corresponding with the terminal name, obtaining user
Biological information is to generate biometric keys, and particular content is with reference to described in step S103;
First key acquisition module 404, for obtaining the biometric keys prestored, particular content refers to step S104 institutes
State;
First judge module 405, for judge generated biometric keys whether with the biological characteristic prestored
Key is identical, and particular content is with reference to described in step S105;
Deciphering module 406, for when the biometric keys generated are identical with the biometric keys prestored,
The terminal password ciphertext is decrypted, particular content is with reference to described in step S106;
First link block 407, for connecting corresponding terminal using the terminal password after decryption, particular content is with reference to step
Described in rapid S107;
Password Input module 408, for when in the absence of terminal password ciphertext corresponding with the terminal name, obtaining and using
The terminal password of family input, particular content is with reference to described in step S108;
Second judge module 409, for judging whether the terminal password of user's input matches with the terminal name, specifically
Content is with reference to described in step S109;
Second link block 410, for when the terminal password that user inputs is matched with the terminal name, utilizing user
The terminal password of input connects corresponding terminal, and particular content is with reference to described in step S110;
Second Key Acquisition Module 411, for obtaining the biometric keys generated according to user biological characteristic information, tool
Hold in vivo with reference to described in step S111;
Encrypting module 412, the terminal password for being inputted by the biometric keys to user is encrypted to obtain
To terminal password ciphertext, particular content is with reference to described in step S112.
By above-mentioned terminal connection device, mobile terminal is in the feelings of terminal password ciphertext corresponding with terminal name that are stored with
Under condition, user biological characteristic information is obtained, and by the biometric keys of acquired user biological characteristic information generation and in advance
The biometric keys deposited are compared, when relatively it is identical when just execution decryption oprerations, terminal password ciphertext is decrypted from
And corresponding terminal can be connected, because terminal password in the form of ciphertext to be stored in mobile terminal, ensure terminal password
Safety, and user can easily be connected to terminal network;Mobile terminal be not stored with it is corresponding with terminal name
In the case of terminal password ciphertext, if user have input correct terminal password, using user biological characteristic information to
The terminal password of family input is encrypted to obtain terminal password ciphertext, to ensure the safety of terminal password.
Alternatively, in some embodiments of the invention, the terminal connection device can also include:
Recovery module, it is close to obtain terminal password at least one ciphertext of terminal password ciphertext to be decomposed into file reduction
Text.
So, terminal password ciphertext is broken down at least one and decomposes file and be stored in mobile terminal, after decomposition
The possibility that terminal password ciphertext is cracked by attacker will be reduced a lot, further ensure the security of terminal password.
Alternatively, in some embodiments of the invention, above-mentioned first key acquisition module 404 can include:
First decomposes file obtaining unit, at least one key decomposition text for obtaining the biometric keys prestored
Part;
First key reduction unit, it is close with the biological characteristic prestored at least one key decomposition file to be reduced
Key.
Thus, crucial biometric keys are decomposed and stored, biometric keys safety has been ensured, so that terminal
Password is more difficult to be cracked, and enhances the security of terminal password.
Alternatively, in some embodiments of the invention, the terminal connection device can also include:
Decomposing module, text is decomposed for being decomposed to terminal password ciphertext to obtain at least one terminal password ciphertext
Part.
The possibility that terminal password ciphertext after decomposition is cracked by attacker will be reduced a lot, further ensure terminal
The security of password.
Alternatively, in some embodiments of the invention, above-mentioned second Key Acquisition Module 411 can include:
Second decomposes file obtaining unit, at least one key decomposition file for obtaining biometric keys;
Second key recovery unit, for the reduction of at least one key decomposition file to be obtained into biometric keys.
So, crucial biometric keys are decomposed and stored, biometric keys safety has been ensured, so that terminal
Password is more difficult to be cracked, and enhances the security of terminal password.
Fig. 5 shows the schematic diagram of electronic equipment according to embodiments of the present invention, and it includes collecting biological feature information device
501st, memory 502 and processor 503, wherein:
Collecting biological feature information device 501 can for example include being used to obtain face characteristic information and iris feature information
In camera, the fingerprint sensor for obtaining fingerprint feature information, the microphone for obtaining vocal print feature information at least
One.Certainly, collecting biological feature information device 501 is also not necessarily limited to camera, fingerprint sensor or microphone, and other can be gathered
The module of biological information is also feasible.
Memory 502 can be used for storage software program and module, and processor 503 is stored in memory 502 by operation
Software program and module, so as to perform various function application and the data processing of electronic equipment.Memory 502 can be main
Including storing program area and storage data field, wherein, what storing program area can be needed for storage program area, at least one function should
With program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use according to electronic equipment
Data (such as voice data, phone directory etc.) created etc..In addition, memory 502 can include high random access storage
Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid
State memory device.
Processor 503 is the control centre of electronic equipment, utilizes each of various interfaces and the whole electronic equipment of connection
Individual part, by operation or performs and is stored in software program and/or module in memory 502, and calls and be stored in storage
Data in device 502, perform the various functions and processing data of electronic equipment.Optionally, processor 503 may include one or many
Individual processing unit;It is preferred that, processor 503 can integrated application processor and modem processor, wherein, application processor master
Operating system, user interface and application program etc. are handled, modem processor mainly handles radio communication.It may be appreciated
It is that above-mentioned modem processor can not also be integrated into processor 503.
As shown in figure 5, in the electronic equipment of the embodiment of the present invention, collecting biological feature information device 501, memory 502
Interconnected between processor 503 by bus 504, be stored with computer instruction in memory 502, processor 503 passes through
Computer instructions, so as to realize following methods:
Obtain connectable terminal;
Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;
When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate life
Thing feature key;
Obtain the biometric keys prestored;
Judge whether generated biometric keys are identical with the biometric keys prestored;
It is close to the terminal password when the biometric keys generated are identical with the biometric keys prestored
Text is decrypted;
Corresponding terminal is connected using the terminal password after decryption.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions
Following methods:
When in the absence of terminal password ciphertext corresponding with the terminal name, the terminal password of user's input is obtained;
Judge whether the terminal password of user's input matches with the terminal name;
When the terminal password that user inputs is matched with the terminal name, the terminal password connection pair inputted using user
The terminal answered;
Obtain the biometric keys generated according to user biological characteristic information;
The terminal password inputted by the biometric keys to user is encrypted to obtain terminal password ciphertext.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions
Following methods:
At least one ciphertext of the terminal password ciphertext is decomposed file reduction to obtain the terminal password ciphertext.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions
Following methods:
At least one key decomposition file of the biometric keys prestored described in obtaining;
At least one described key decomposition file is reduced to obtain the biometric keys prestored.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions
Following methods:
The terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions
Following methods:
Obtain at least one key decomposition file of the biometric keys;
At least one described key decomposition file is reduced to obtain the biometric keys.
Related description can correspond to the step of referring to the flow chart shown in Fig. 1 to Fig. 3 corresponding associated description and effect
Understood, here is omitted.
It is to lead to it will be understood by those skilled in the art that realizing all or part of flow in above-described embodiment method
Cross computer program to instruct the hardware of correlation to complete, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (ROM) or random access memory (RAM) etc..
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention
Spirit and scope in the case of various modification can be adapted and modification, such modifications and variations are each fallen within by appended claims institute
Within the scope of restriction.
Claims (15)
1. a kind of terminal connection method, it is characterised in that including:
Obtain connectable terminal;
Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;
When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate biological spy
Levy key;
Obtain the biometric keys prestored;
Judge whether generated biometric keys are identical with the biometric keys prestored;
When the biometric keys generated are identical with the biometric keys prestored, the terminal password ciphertext is entered
Row decryption;
Corresponding terminal is connected using the terminal password after decryption.
2. according to the method described in claim 1, it is characterised in that also include:
When in the absence of terminal password ciphertext corresponding with the terminal name, the terminal password of user's input is obtained;
Judge whether the terminal password of user's input matches with the terminal name;
When the terminal password that user inputs is matched with the terminal name, the terminal password connection inputted using user is corresponding
Terminal;
Obtain the biometric keys generated according to user biological characteristic information;
The terminal password inputted by the biometric keys to user is encrypted to obtain terminal password ciphertext.
3. according to the method described in claim 1, it is characterised in that the terminal password ciphertext is being decrypted with connection pair
Before the terminal answered, in addition to:
At least one ciphertext of the terminal password ciphertext is decomposed file reduction to obtain the terminal password ciphertext.
4. according to the method described in claim 1, it is characterised in that described to obtain the biometric keys prestored, including:
At least one key decomposition file of the biometric keys prestored described in obtaining;
At least one described key decomposition file is reduced to obtain the biometric keys prestored.
5. method according to claim 2, it is characterised in that at the end inputted by the biometric keys to user
End password is encrypted with after obtaining terminal password ciphertext, in addition to:
The terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext.
6. method according to claim 2, it is characterised in that the life that the acquisition is generated according to user biological characteristic information
Thing feature key, including:
Obtain at least one key decomposition file of the biometric keys;
At least one described key decomposition file is reduced to obtain the biometric keys.
7. the method according to any one of claim 1-6, it is characterised in that the connectable terminal is WiFi terminal.
8. a kind of terminal connection device, it is characterised in that including:
Terminal acquisition module, for obtaining connectable terminal;
Searching modul, it is close for searching terminal password corresponding with the terminal name according to the terminal name of connectable terminal
Text;
Key production module, for when there is terminal password ciphertext corresponding with the terminal name, obtaining user biological special
Reference ceases to generate biometric keys;
First key acquisition module, for obtaining the biometric keys prestored;
First judge module, for judge generated biometric keys whether with the biometric keys phase prestored
Together;
Deciphering module, for when the biometric keys generated are identical with the biometric keys prestored, to described
Terminal password ciphertext is decrypted;
First link block, for connecting corresponding terminal using the terminal password after decryption.
9. device according to claim 8, it is characterised in that also include:
Password Input module, for when in the absence of terminal password ciphertext corresponding with the terminal name, obtaining user's input
Terminal password;
Second judge module, for judging whether the terminal password of user's input matches with the terminal name;
Second link block, for when the terminal password that user inputs is matched with the terminal name, being inputted using user
Terminal password connects corresponding terminal;
Second Key Acquisition Module, for obtaining the biometric keys generated according to user biological characteristic information;
Encrypting module, the terminal password for being inputted by the biometric keys to user is encrypted close to obtain terminal
Code ciphertext.
10. device according to claim 8, it is characterised in that also include:
Recovery module, it is close to obtain the terminal at least one ciphertext of the terminal password ciphertext to be decomposed into file reduction
Code ciphertext.
11. device according to claim 8, it is characterised in that the first key acquisition module includes:
First decomposes file obtaining unit, at least one key decomposition text for obtaining the biometric keys prestored
Part;
First key reduction unit, it is special to obtain the biology prestored at least one described key decomposition file to be reduced
Levy key.
12. device according to claim 9, it is characterised in that also include:
Decomposing module, text is decomposed for being decomposed to the terminal password ciphertext to obtain at least one terminal password ciphertext
Part.
13. device according to claim 9, it is characterised in that second Key Acquisition Module includes:
Second decomposes file obtaining unit, at least one key decomposition file for obtaining the biometric keys;
Second key recovery unit, it is close to obtain the biological characteristic at least one described key decomposition file to be reduced
Key.
14. the device according to any one of claim 8-13, it is characterised in that the connectable terminal is WiFi whole
End.
15. a kind of electronic equipment, it is characterised in that including the device any one of claim 8-14.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710262439.5A CN107148016A (en) | 2017-04-20 | 2017-04-20 | Terminal connection method, device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710262439.5A CN107148016A (en) | 2017-04-20 | 2017-04-20 | Terminal connection method, device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107148016A true CN107148016A (en) | 2017-09-08 |
Family
ID=59774115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710262439.5A Pending CN107148016A (en) | 2017-04-20 | 2017-04-20 | Terminal connection method, device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107148016A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021160084A1 (en) * | 2020-02-14 | 2021-08-19 | 深圳市万普拉斯科技有限公司 | File transmission method and apparatus, electronic device, and readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458409A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
CN104144424A (en) * | 2013-05-07 | 2014-11-12 | 华为终端有限公司 | Method for establishing connection between devices, configuration device and wireless devices |
CN105099669A (en) * | 2015-05-28 | 2015-11-25 | 努比亚技术有限公司 | Recording encryption and decryption method and device |
CN105429761A (en) * | 2015-12-29 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Key generation method and device |
WO2016086739A1 (en) * | 2014-12-03 | 2016-06-09 | 西安西电捷通无线网络通信股份有限公司 | Method for device having wlan function to access network and device for implementing method |
CN105978683A (en) * | 2005-11-18 | 2016-09-28 | 安全第公司 | Secure data parser method and system |
CN106131834A (en) * | 2016-06-30 | 2016-11-16 | 宇龙计算机通信科技(深圳)有限公司 | Method for connecting network, network connection device and terminal |
-
2017
- 2017-04-20 CN CN201710262439.5A patent/CN107148016A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105978683A (en) * | 2005-11-18 | 2016-09-28 | 安全第公司 | Secure data parser method and system |
CN104144424A (en) * | 2013-05-07 | 2014-11-12 | 华为终端有限公司 | Method for establishing connection between devices, configuration device and wireless devices |
CN103458409A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
WO2016086739A1 (en) * | 2014-12-03 | 2016-06-09 | 西安西电捷通无线网络通信股份有限公司 | Method for device having wlan function to access network and device for implementing method |
CN105099669A (en) * | 2015-05-28 | 2015-11-25 | 努比亚技术有限公司 | Recording encryption and decryption method and device |
CN105429761A (en) * | 2015-12-29 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Key generation method and device |
CN106131834A (en) * | 2016-06-30 | 2016-11-16 | 宇龙计算机通信科技(深圳)有限公司 | Method for connecting network, network connection device and terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021160084A1 (en) * | 2020-02-14 | 2021-08-19 | 深圳市万普拉斯科技有限公司 | File transmission method and apparatus, electronic device, and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104125055B (en) | Encryption and decryption method and electronic equipment | |
US9262618B2 (en) | Secure and usable protection of a roamable credentials store | |
CN102682506B (en) | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique | |
JP4866863B2 (en) | Security code generation method and user device | |
CN105429761B (en) | A kind of key generation method and device | |
US20070039042A1 (en) | Information-security systems and methods | |
CN102819702B (en) | File encryption operation method and file encryption operational system | |
CN108615154B (en) | Block chain digital signature system based on hardware encryption protection and using process | |
JP2001320768A (en) | Portable telephone set and secrecy method of data | |
CN101965723A (en) | Image-based man-in-the-middle protection in numeric comparison association models | |
CN106850220A (en) | Data ciphering method, data decryption method and device | |
CN103763091B (en) | A kind of application program encryption and decryption method and encryption, decryption device | |
CN111563251B (en) | Encryption method and related device for private information in terminal equipment | |
CN102419805A (en) | Terminal equipment and method for encrypting user information | |
CN109561056B (en) | Secret communication method, system, mobile terminal and wearable device | |
WO2014169610A1 (en) | Data encryption and decryption method and device, and protection system of mobile terminal | |
CN110771190A (en) | Controlling access to data | |
Jeong et al. | Utilizing a Bluetooth remote lock system for a smartphone | |
CN112182624A (en) | Encryption method, encryption device, storage medium and electronic equipment | |
CN105022965B (en) | A kind of data ciphering method and device | |
CN105162592B (en) | A kind of method and system of certification wearable device | |
CN114501431A (en) | Message transmission method and device, storage medium and electronic equipment | |
CN107148016A (en) | Terminal connection method, device and electronic equipment | |
EP1725939A1 (en) | Storing of encrypted data in the memory of a portable electronic device | |
CN108073820A (en) | Security processing, device and the mobile terminal of data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |
|
RJ01 | Rejection of invention patent application after publication |