CN107148016A - Terminal connection method, device and electronic equipment - Google Patents

Terminal connection method, device and electronic equipment Download PDF

Info

Publication number
CN107148016A
CN107148016A CN201710262439.5A CN201710262439A CN107148016A CN 107148016 A CN107148016 A CN 107148016A CN 201710262439 A CN201710262439 A CN 201710262439A CN 107148016 A CN107148016 A CN 107148016A
Authority
CN
China
Prior art keywords
terminal
password
biometric keys
ciphertext
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710262439.5A
Other languages
Chinese (zh)
Inventor
汤镇辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201710262439.5A priority Critical patent/CN107148016A/en
Publication of CN107148016A publication Critical patent/CN107148016A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of terminal connection method, device and electronic equipment, wherein methods described includes:Obtain connectable terminal;Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate biometric keys;Obtain the biometric keys prestored;Judge whether generated biometric keys are identical with the biometric keys prestored;When the biometric keys generated are identical with the biometric keys prestored, the terminal password ciphertext is decrypted;Corresponding terminal is connected using the terminal password after decryption.

Description

Terminal connection method, device and electronic equipment
Technical field
The present invention relates to information security field, and in particular to terminal connection method and device and electronic equipment.
Background technology
There is huge demand in the interconnection between Internet era, terminal device, user needs to set the terminal of oneself It is standby to be connected to by wired or wireless mode on other-end, for example, needing the mobile phone of oneself being connected into WiFi nets in user , it is necessary to which by oneself mobile phone and WiFi terminal, i.e. wireless router is attached during network.User when being connected with different terminals, For security concerns, be generally required for input password, password authentification by when just allow access.Due to needing what is connected Terminal device is more and more, and user is difficult to remember all access pins, and these usual access pins are all stored in user terminal On, easily it is cracked, security is not high, and encrypt and decrypt operation is complicated, user experience is poor.
The content of the invention
In view of this, the embodiments of the invention provide a kind of terminal connection method and device and electronic equipment, to solve The problem of connection password is easily cracked and encrypt and decrypt operation is complicated.
First aspect present invention provides a kind of terminal connection method, including:
Obtain connectable terminal;
Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;
When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate life Thing feature key;
Obtain the biometric keys prestored;
Judge whether generated biometric keys are identical with the biometric keys prestored;
It is close to the terminal password when the biometric keys generated are identical with the biometric keys prestored Text is decrypted;
Corresponding terminal is connected using the terminal password after decryption.
In the case of the terminal password ciphertext corresponding with terminal name that is stored with, user biological characteristic information is obtained, and The biometric keys that acquired user biological characteristic information is generated are compared with the biometric keys prestored, when than Decryption oprerations are just performed when more identical, terminal password ciphertext are decrypted so as to connect corresponding terminal, due to terminal Password has ensured the safety of terminal password to be stored in the form of ciphertext in mobile terminal, and user can easily connect It is connected to terminal network
With reference to first aspect present invention, in first aspect present invention first embodiment, in addition to:
When in the absence of terminal password ciphertext corresponding with the terminal name, the terminal password of user's input is obtained;
Judge whether the terminal password of user's input matches with the terminal name;
When the terminal password that user inputs is matched with the terminal name, the terminal password connection pair inputted using user The terminal answered;
Obtain the biometric keys generated according to user biological characteristic information;
The terminal password inputted by the biometric keys to user is encrypted to obtain terminal password ciphertext.
In the case of the terminal password ciphertext corresponding with terminal name that is not stored with, if user have input correct end Password is held, then the terminal password inputted using user biological characteristic information to user is encrypted to obtain terminal password ciphertext, To ensure the safety of terminal password.
With reference to first aspect present invention, in first aspect present invention second embodiment, to the terminal password ciphertext It is decrypted with before connecting corresponding terminal, in addition to:
At least one ciphertext of the terminal password ciphertext is decomposed file reduction to obtain the terminal password ciphertext.
Terminal password ciphertext is broken down at least one and decomposes file and be stored in mobile terminal, and the terminal after decomposition is close The possibility that code ciphertext is cracked by attacker will be reduced a lot, further ensure the security of terminal password.
With reference to first aspect present invention, in the embodiment of first aspect present invention the 3rd, described to obtain the biology prestored special Key is levied, including:
At least one key decomposition file of the biometric keys prestored described in obtaining;
At least one described key decomposition file is reduced to obtain the biometric keys prestored.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password More it is difficult to be cracked, enhances the security of terminal password.
With reference to one or three aspect first embodiment of the invention, in the embodiment of first aspect present invention the 4th, passing through The terminal password that the biometric keys are inputted to user is encrypted with after obtaining terminal password ciphertext, in addition to:
The terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext.
The possibility that terminal password ciphertext after decomposition is cracked by attacker will be reduced a lot, further ensure terminal The security of password.
It is described to obtain in the embodiment of first aspect present invention the 5th with reference to first aspect present invention first embodiment The biometric keys generated according to user biological characteristic information, including:
Obtain at least one key decomposition file of the biometric keys;
At least one described key decomposition file is reduced to obtain the biometric keys.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password More it is difficult to be cracked, enhances the security of terminal password.
With reference to any one of first aspect present invention, first aspect first embodiment into the 5th embodiment, this hair In the bright embodiment of first aspect the 6th, the connectable terminal is WiFi terminal.
Second aspect of the present invention provides a kind of terminal connection device, including:
Terminal acquisition module, for obtaining connectable terminal;
Searching modul, for searching terminal password corresponding with the terminal name according to the terminal name of connectable terminal Ciphertext;
Key production module, for when there is terminal password ciphertext corresponding with the terminal name, obtaining user's life Thing characteristic information is to generate biometric keys;
First key acquisition module, for obtaining the biometric keys prestored;
First judge module, for judge generated biometric keys whether with the biometric keys prestored It is identical;
Deciphering module, it is right for when the biometric keys generated are identical with the biometric keys prestored The terminal password ciphertext is decrypted;
First link block, for connecting corresponding terminal using the terminal password after decryption.
In the case of the terminal password ciphertext corresponding with terminal name that is stored with, user biological characteristic information is obtained, and The biometric keys that acquired user biological characteristic information is generated are compared with the biometric keys prestored, when than Decryption oprerations are just performed when more identical, terminal password ciphertext are decrypted so as to connect corresponding terminal, due to terminal Password has ensured the safety of terminal password to be stored in the form of ciphertext in mobile terminal, and user can easily connect It is connected to terminal network
With reference to second aspect of the present invention, in second aspect of the present invention first embodiment, in addition to:
Password Input module, for when in the absence of terminal password ciphertext corresponding with the terminal name, obtaining user The terminal password of input;
Second judge module, for judging whether the terminal password of user's input matches with the terminal name;
Second link block, it is defeated using user for when the terminal password that user inputs is matched with the terminal name The terminal password entered connects corresponding terminal;
Second Key Acquisition Module, for obtaining the biometric keys generated according to user biological characteristic information;
Encrypting module, the terminal password for being inputted by the biometric keys to user is encrypted to obtain end Hold cryptographic secret.
In the case of the terminal password ciphertext corresponding with terminal name that is not stored with, if user have input correct end Password is held, then the terminal password inputted using user biological characteristic information to user is encrypted to obtain terminal password ciphertext, To ensure the safety of terminal password.
With reference to second aspect of the present invention, in second aspect of the present invention second embodiment, in addition to:
Recovery module, is reduced to obtain the end at least one ciphertext of the terminal password ciphertext to be decomposed into file Hold cryptographic secret.
Terminal password ciphertext is broken down at least one and decomposes file and be stored in mobile terminal, and the terminal after decomposition is close The possibility that code ciphertext is cracked by attacker will be reduced a lot, further ensure the security of terminal password.
With reference to second aspect of the present invention, in the embodiment of second aspect of the present invention the 3rd, the first key acquisition module Including:
First decomposes file obtaining unit, at least one key decomposition for obtaining the biometric keys prestored File;
First key reduction unit, for the reduction of at least one described key decomposition file to be obtained to the life prestored Thing feature key.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password More it is difficult to be cracked, enhances the security of terminal password.
With reference to second aspect of the present invention first embodiment, in the embodiment of second aspect of the present invention the 4th, in addition to:
Decomposing module, is decomposed for being decomposed to the terminal password ciphertext with obtaining at least one terminal password ciphertext File.
The possibility that terminal password ciphertext after decomposition is cracked by attacker will be reduced a lot, further ensure terminal The security of password.
With reference to second aspect of the present invention first embodiment, in the embodiment of second aspect of the present invention the 5th, described second Key Acquisition Module includes:
Second decomposes file obtaining unit, at least one key decomposition file for obtaining the biometric keys;
Second key recovery unit, for the reduction of at least one described key decomposition file to be obtained into the biological characteristic Key.
Crucial biometric keys are decomposed into storage, biometric keys safety have been ensured, so that terminal password More it is difficult to be cracked, enhances the security of terminal password.
With reference to any one of second aspect of the present invention, second aspect first embodiment into the 5th embodiment, this hair In the bright embodiment of second aspect the 6th, the connectable terminal is WiFi terminal.
Third aspect present invention provides a kind of electronic equipment, and it includes second aspect of the present invention and second party of the present invention Device described in any one in any embodiment in face.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood from by reference to accompanying drawing, accompanying drawing is schematical without that should manage Solve to carry out any limitation to the present invention, in the accompanying drawings:
Fig. 1 shows a flow chart of the terminal connection method of the embodiment of the present invention;
Fig. 2 shows another flow chart of the terminal connection method of the embodiment of the present invention;
Fig. 3 shows another flow chart of the terminal connection method of the embodiment of the present invention;
Fig. 4 shows a schematic diagram of the terminal connection device of the embodiment of the present invention;
Fig. 5 shows a schematic diagram of the electronic equipment of the embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
Fig. 1 shows a flow chart of the terminal connection method of the embodiment of the present invention, and this method goes for such as The mobile terminals such as mobile phone, as shown in figure 1, this method may include steps of:
S101. connectable terminal is obtained.Herein, connectable terminal for example can be WiFi terminal or bluetooth Terminal, infrared terminal, NFC (Near Field Communication, near-field communication) terminal etc., certainly, pass through wired connection Connectable terminal be also feasible.By taking mobile terminal connection WiFi terminal as an example, when mobile terminal opens WiFi, it can obtain Take listed in the list of attachable WiFi around it, list the WiFi titles that can connect WiFi (service set, SSID, Service Set Identifier)。
S102. terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal, when During in the presence of terminal password ciphertext corresponding with the terminal name, perform step S103, when in the absence of with the terminal name pair During the terminal password ciphertext answered, then step S108 is performed.For example, mobile terminal is looked into one by one according to the WiFi titles that can connect WiFi Look for the WiFi cryptographic secrets corresponding with the WiFi titles that whether are stored with, it is preferable that mobile terminal is according to can connect WiFi letter Number intensity, searches whether the WiFi cryptographic secrets corresponding with the WiFi titles that are stored with one by one from big to small.WiFi passwords with The form of ciphertext is stored in mobile terminal, to ensure the safety of WiFi passwords.
S103. user biological characteristic information is obtained to generate biometric keys.Herein, user biological characteristic information can With including face characteristic information, fingerprint feature information, vocal print feature information and iris feature information etc., face characteristic information and rainbow Film characteristic information can for example be obtained by camera, and fingerprint feature information can for example be obtained by fingerprint sensor, vocal print Characteristic information can for example be obtained by microphone.After user biological characteristic information is obtained, it is possible to pass through various lifes Thing feature key generating algorithm generates user-defined specific key.
S104. the biometric keys prestored are obtained.
S105. judge whether generated biometric keys are identical with the biometric keys prestored, when identical Shi Zhihang step S106, do not perform any operation then when differing.
S106. terminal password ciphertext is decrypted.For example, WiFi cryptographic secrets are decrypted.
S107. corresponding terminal is connected using the terminal password after decryption.Completed for example, being decrypted to WiFi cryptographic secrets Afterwards, you can to connect corresponding WiFi by WiFi passwords.
S108. the terminal password of user's input is obtained.In this case, it is not present in mobile terminal corresponding with terminal name Terminal password ciphertext, terminal password can only be manually entered by user.
S109. judge whether the terminal password of user's input matches with the terminal name, mobile terminal is inputted in user Terminal password when being matched with the terminal name, perform step S110, the terminal password and the terminal name inputted in user When claiming to mismatch, then terminal can not be connected, then be back to the terminal password that step S107 obtains user's input again.
S110. the terminal password inputted using user connects corresponding terminal.
S111. the biometric keys generated according to user biological characteristic information are obtained.Herein, user biological feature is believed Breath is prestored, as described in step S103, and it is special that user biological characteristic information can include face characteristic information, fingerprint Reference breath, vocal print feature information and iris feature information etc..
S112. the terminal password inputted by biometric keys to user is encrypted to obtain terminal password ciphertext. It is encrypted for example, encryption information can be treated by the symmetric cryptosystem based on biometric keys.It is alternatively possible to adopt AES symmetric cryptosystems are used, are taken with improving encryption efficiency and reducing system resource.
By above method step, mobile terminal is in the situation of terminal password ciphertext corresponding with terminal name that is stored with Under, user biological characteristic information is obtained, and the biometric keys that acquired user biological characteristic information is generated are with prestoring Biometric keys be compared, when relatively it is identical when just perform decryption oprerations, terminal password ciphertext is decrypted so that Corresponding terminal can be connected, because terminal password in the form of ciphertext to be stored in mobile terminal, terminal password has been ensured Safety, and user can easily be connected to terminal;Mobile terminal is close in the terminal corresponding with terminal name that is not stored with In the case of code ciphertext, if user have input correct terminal password, user is inputted using user biological characteristic information Terminal password be encrypted to obtain terminal password ciphertext, to ensure the safety of terminal password.
Fig. 2 shows another flow chart of the terminal connection method of the embodiment of the present invention, and this method can include as follows Step:
S201. connectable terminal is obtained, particular content is with reference to described in step S101;
S202. terminal password ciphertext corresponding with the terminal name, tool are searched according to the terminal name of connectable terminal Hold in vivo with reference to described in step S102;
S203. user biological characteristic information is obtained to generate biometric keys, and particular content is with reference to described in step S103;
S204. the biometric keys prestored are obtained, particular content is with reference to described in step S104;
S205. judge whether generated biometric keys are identical with the biometric keys prestored, it is specific interior Hold with reference to described in step S105;
S206. at least one ciphertext of terminal password ciphertext is decomposed file reduction to obtain terminal password ciphertext;At this In, terminal password ciphertext is broken down into multiple ciphertexts and decomposes file and be stored in mobile terminal, it is necessary to first by multiple ciphertexts point Solution file reduction obtains terminal password ciphertext, operation it could be decrypted, so, the terminal password ciphertext after decomposition is attacked The possibility that the person of hitting cracks will be reduced a lot, further ensure the security of terminal password;Various decomposition sides can be used Method decomposes file to obtain ciphertext, for example, according to a random number terminal password ciphertext can be resolved into multiple files, should be with Machine numerical example such as can be the number in 5 to 9;For example, first of the file after decomposition can be random number, afterwards Digit is using random number as loop cycle, if encryption information is abcdefg123456, random number is 5, point after so decomposing Solution file is 5af4,5bg5,5c16,5d2,5e3;Certainly, a kind of decomposition method simply is listed herein, other decomposition methods It is also equally applicable, restoring method herein is the inverse process of above-mentioned decomposition method;
S207. terminal password ciphertext is decrypted, particular content is with reference to described in step S106;
S208. corresponding terminal is connected using the terminal password after decryption, particular content is with reference to described in step S107;
S209. the terminal password of user's input is obtained, particular content is with reference to described in step S108;
S210. judge whether the terminal password of user's input matches with the terminal name, particular content refers to step Described in S109;
S211. the terminal password inputted using user connects corresponding terminal, and particular content is with reference to described in step S110;
S212. the biometric keys generated according to user biological characteristic information are obtained, particular content refers to step S111 It is described;
S213. the terminal password inputted by biometric keys to user is encrypted to obtain terminal password ciphertext, Particular content is with reference to described in step S112;.
S214. terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext, similarly, For example terminal password ciphertext can be decomposed into by multiple terminal password ciphertexts using the decomposition method described in step S206 File is decomposed, multiple ciphertexts first must be decomposed file reduction and obtain terminal password ciphertext, it could be carried out by such attacker Decryption oprerations, reduce the possibility that terminal password ciphertext is cracked by attacker, have further ensured the security of terminal password.
Compared with the embodiment shown in Fig. 1, the terminal connection method of the present embodiment is by the way that terminal password ciphertext is decomposed into Multiple terminal password ciphertexts decompose file, so when connecting terminal, and multiple ciphertexts will first be decomposed to file reduction and obtain terminal Cryptographic secret, then terminal password ciphertext is decrypted, and connects corresponding terminal, attack using the terminal password after decryption Person may be not aware that encryption information was decomposed, in this case, and various crack methods can all fail, so as to reduce end The possibility that end cryptographic secret is cracked by attacker, has further ensured the security of terminal password.
Fig. 3 shows another flow chart of the terminal connection method of the embodiment of the present invention, and this method can include as follows Step:
S301. connectable terminal is obtained, particular content is with reference to described in step S201;
S302. terminal password ciphertext corresponding with the terminal name, tool are searched according to the terminal name of connectable terminal Hold in vivo with reference to described in step S202;
S303. user biological characteristic information is obtained to generate biometric keys, and particular content is with reference to described in step S203;
S304. at least one key decomposition file of the biometric keys prestored, herein, biometric keys are obtained It is also to resolve into multiple key decomposition files by key decomposition algorithm, for example, can uses the decomposition in above-mentioned steps S206 Method is decomposed to biometric keys;
S305. at least one key decomposition file is reduced into the biometric keys to be prestored, reduction herein Method is the inverse process of the decomposition method in above-mentioned steps S206;
S306. judge whether generated biometric keys are identical with the biometric keys prestored, it is specific interior Hold with reference to described in step S205;
S307. at least one ciphertext of terminal password ciphertext is decomposed into file to reduce to obtain terminal password ciphertext, specifically Content is with reference to described in step S206;
S308. terminal password ciphertext is decrypted, particular content is with reference to described in step S207;
S309. corresponding terminal is connected using the terminal password after decryption, particular content is with reference to described in step S208;
S310. the terminal password of user's input is obtained, particular content is with reference to described in step S209;
S311. judge whether the terminal password of user's input matches with the terminal name, particular content refers to step Described in S210;
S312. the terminal password inputted using user connects corresponding terminal, and particular content is with reference to described in step S211;
S313. at least one key decomposition text of the biometric keys generated according to user biological characteristic information is obtained Part, similarly, herein, biometric keys are also to resolve into multiple key decomposition files by key decomposition algorithm;
S314. at least one key decomposition file is reduced to obtain biometric keys;
S315. the terminal password inputted by biometric keys to user is encrypted to obtain terminal password ciphertext, Particular content is with reference to described in step S213;
S316 is decomposed to terminal password ciphertext decomposes file, particular content to obtain at least one terminal password ciphertext With reference to described in step S214.
Compared with the embodiment shown in Fig. 2, the terminal connection method of the present embodiment decomposes crucial biometric keys Storage, has ensured biometric keys, so that terminal password ciphertext is more difficult to be cracked, has enhanced terminal password ciphertext Security.
Ground is corresponded, the embodiment of the present invention additionally provides a kind of terminal connection device, as shown in figure 4, the terminal connects Connection device can include:
Terminal acquisition module 401, for obtaining connectable terminal, particular content is with reference to described in step S101;
Searching modul 402, for searching terminal corresponding with the terminal name according to the terminal name of connectable terminal Cryptographic secret, particular content is with reference to described in step S102;
Key production module 403, for when there is terminal password ciphertext corresponding with the terminal name, obtaining user Biological information is to generate biometric keys, and particular content is with reference to described in step S103;
First key acquisition module 404, for obtaining the biometric keys prestored, particular content refers to step S104 institutes State;
First judge module 405, for judge generated biometric keys whether with the biological characteristic prestored Key is identical, and particular content is with reference to described in step S105;
Deciphering module 406, for when the biometric keys generated are identical with the biometric keys prestored, The terminal password ciphertext is decrypted, particular content is with reference to described in step S106;
First link block 407, for connecting corresponding terminal using the terminal password after decryption, particular content is with reference to step Described in rapid S107;
Password Input module 408, for when in the absence of terminal password ciphertext corresponding with the terminal name, obtaining and using The terminal password of family input, particular content is with reference to described in step S108;
Second judge module 409, for judging whether the terminal password of user's input matches with the terminal name, specifically Content is with reference to described in step S109;
Second link block 410, for when the terminal password that user inputs is matched with the terminal name, utilizing user The terminal password of input connects corresponding terminal, and particular content is with reference to described in step S110;
Second Key Acquisition Module 411, for obtaining the biometric keys generated according to user biological characteristic information, tool Hold in vivo with reference to described in step S111;
Encrypting module 412, the terminal password for being inputted by the biometric keys to user is encrypted to obtain To terminal password ciphertext, particular content is with reference to described in step S112.
By above-mentioned terminal connection device, mobile terminal is in the feelings of terminal password ciphertext corresponding with terminal name that are stored with Under condition, user biological characteristic information is obtained, and by the biometric keys of acquired user biological characteristic information generation and in advance The biometric keys deposited are compared, when relatively it is identical when just execution decryption oprerations, terminal password ciphertext is decrypted from And corresponding terminal can be connected, because terminal password in the form of ciphertext to be stored in mobile terminal, ensure terminal password Safety, and user can easily be connected to terminal network;Mobile terminal be not stored with it is corresponding with terminal name In the case of terminal password ciphertext, if user have input correct terminal password, using user biological characteristic information to The terminal password of family input is encrypted to obtain terminal password ciphertext, to ensure the safety of terminal password.
Alternatively, in some embodiments of the invention, the terminal connection device can also include:
Recovery module, it is close to obtain terminal password at least one ciphertext of terminal password ciphertext to be decomposed into file reduction Text.
So, terminal password ciphertext is broken down at least one and decomposes file and be stored in mobile terminal, after decomposition The possibility that terminal password ciphertext is cracked by attacker will be reduced a lot, further ensure the security of terminal password.
Alternatively, in some embodiments of the invention, above-mentioned first key acquisition module 404 can include:
First decomposes file obtaining unit, at least one key decomposition text for obtaining the biometric keys prestored Part;
First key reduction unit, it is close with the biological characteristic prestored at least one key decomposition file to be reduced Key.
Thus, crucial biometric keys are decomposed and stored, biometric keys safety has been ensured, so that terminal Password is more difficult to be cracked, and enhances the security of terminal password.
Alternatively, in some embodiments of the invention, the terminal connection device can also include:
Decomposing module, text is decomposed for being decomposed to terminal password ciphertext to obtain at least one terminal password ciphertext Part.
The possibility that terminal password ciphertext after decomposition is cracked by attacker will be reduced a lot, further ensure terminal The security of password.
Alternatively, in some embodiments of the invention, above-mentioned second Key Acquisition Module 411 can include:
Second decomposes file obtaining unit, at least one key decomposition file for obtaining biometric keys;
Second key recovery unit, for the reduction of at least one key decomposition file to be obtained into biometric keys.
So, crucial biometric keys are decomposed and stored, biometric keys safety has been ensured, so that terminal Password is more difficult to be cracked, and enhances the security of terminal password.
Fig. 5 shows the schematic diagram of electronic equipment according to embodiments of the present invention, and it includes collecting biological feature information device 501st, memory 502 and processor 503, wherein:
Collecting biological feature information device 501 can for example include being used to obtain face characteristic information and iris feature information In camera, the fingerprint sensor for obtaining fingerprint feature information, the microphone for obtaining vocal print feature information at least One.Certainly, collecting biological feature information device 501 is also not necessarily limited to camera, fingerprint sensor or microphone, and other can be gathered The module of biological information is also feasible.
Memory 502 can be used for storage software program and module, and processor 503 is stored in memory 502 by operation Software program and module, so as to perform various function application and the data processing of electronic equipment.Memory 502 can be main Including storing program area and storage data field, wherein, what storing program area can be needed for storage program area, at least one function should With program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use according to electronic equipment Data (such as voice data, phone directory etc.) created etc..In addition, memory 502 can include high random access storage Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid State memory device.
Processor 503 is the control centre of electronic equipment, utilizes each of various interfaces and the whole electronic equipment of connection Individual part, by operation or performs and is stored in software program and/or module in memory 502, and calls and be stored in storage Data in device 502, perform the various functions and processing data of electronic equipment.Optionally, processor 503 may include one or many Individual processing unit;It is preferred that, processor 503 can integrated application processor and modem processor, wherein, application processor master Operating system, user interface and application program etc. are handled, modem processor mainly handles radio communication.It may be appreciated It is that above-mentioned modem processor can not also be integrated into processor 503.
As shown in figure 5, in the electronic equipment of the embodiment of the present invention, collecting biological feature information device 501, memory 502 Interconnected between processor 503 by bus 504, be stored with computer instruction in memory 502, processor 503 passes through Computer instructions, so as to realize following methods:
Obtain connectable terminal;
Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;
When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate life Thing feature key;
Obtain the biometric keys prestored;
Judge whether generated biometric keys are identical with the biometric keys prestored;
It is close to the terminal password when the biometric keys generated are identical with the biometric keys prestored Text is decrypted;
Corresponding terminal is connected using the terminal password after decryption.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions Following methods:
When in the absence of terminal password ciphertext corresponding with the terminal name, the terminal password of user's input is obtained;
Judge whether the terminal password of user's input matches with the terminal name;
When the terminal password that user inputs is matched with the terminal name, the terminal password connection pair inputted using user The terminal answered;
Obtain the biometric keys generated according to user biological characteristic information;
The terminal password inputted by the biometric keys to user is encrypted to obtain terminal password ciphertext.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions Following methods:
At least one ciphertext of the terminal password ciphertext is decomposed file reduction to obtain the terminal password ciphertext.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions Following methods:
At least one key decomposition file of the biometric keys prestored described in obtaining;
At least one described key decomposition file is reduced to obtain the biometric keys prestored.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions Following methods:
The terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext.
Alternatively, in some embodiments of the invention, processor 503 can also be realized by computer instructions Following methods:
Obtain at least one key decomposition file of the biometric keys;
At least one described key decomposition file is reduced to obtain the biometric keys.
Related description can correspond to the step of referring to the flow chart shown in Fig. 1 to Fig. 3 corresponding associated description and effect Understood, here is omitted.
It is to lead to it will be understood by those skilled in the art that realizing all or part of flow in above-described embodiment method Cross computer program to instruct the hardware of correlation to complete, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (ROM) or random access memory (RAM) etc..
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention Spirit and scope in the case of various modification can be adapted and modification, such modifications and variations are each fallen within by appended claims institute Within the scope of restriction.

Claims (15)

1. a kind of terminal connection method, it is characterised in that including:
Obtain connectable terminal;
Terminal password ciphertext corresponding with the terminal name is searched according to the terminal name of connectable terminal;
When there is terminal password ciphertext corresponding with the terminal name, obtain user biological characteristic information to generate biological spy Levy key;
Obtain the biometric keys prestored;
Judge whether generated biometric keys are identical with the biometric keys prestored;
When the biometric keys generated are identical with the biometric keys prestored, the terminal password ciphertext is entered Row decryption;
Corresponding terminal is connected using the terminal password after decryption.
2. according to the method described in claim 1, it is characterised in that also include:
When in the absence of terminal password ciphertext corresponding with the terminal name, the terminal password of user's input is obtained;
Judge whether the terminal password of user's input matches with the terminal name;
When the terminal password that user inputs is matched with the terminal name, the terminal password connection inputted using user is corresponding Terminal;
Obtain the biometric keys generated according to user biological characteristic information;
The terminal password inputted by the biometric keys to user is encrypted to obtain terminal password ciphertext.
3. according to the method described in claim 1, it is characterised in that the terminal password ciphertext is being decrypted with connection pair Before the terminal answered, in addition to:
At least one ciphertext of the terminal password ciphertext is decomposed file reduction to obtain the terminal password ciphertext.
4. according to the method described in claim 1, it is characterised in that described to obtain the biometric keys prestored, including:
At least one key decomposition file of the biometric keys prestored described in obtaining;
At least one described key decomposition file is reduced to obtain the biometric keys prestored.
5. method according to claim 2, it is characterised in that at the end inputted by the biometric keys to user End password is encrypted with after obtaining terminal password ciphertext, in addition to:
The terminal password ciphertext is decomposed and decomposes file to obtain at least one terminal password ciphertext.
6. method according to claim 2, it is characterised in that the life that the acquisition is generated according to user biological characteristic information Thing feature key, including:
Obtain at least one key decomposition file of the biometric keys;
At least one described key decomposition file is reduced to obtain the biometric keys.
7. the method according to any one of claim 1-6, it is characterised in that the connectable terminal is WiFi terminal.
8. a kind of terminal connection device, it is characterised in that including:
Terminal acquisition module, for obtaining connectable terminal;
Searching modul, it is close for searching terminal password corresponding with the terminal name according to the terminal name of connectable terminal Text;
Key production module, for when there is terminal password ciphertext corresponding with the terminal name, obtaining user biological special Reference ceases to generate biometric keys;
First key acquisition module, for obtaining the biometric keys prestored;
First judge module, for judge generated biometric keys whether with the biometric keys phase prestored Together;
Deciphering module, for when the biometric keys generated are identical with the biometric keys prestored, to described Terminal password ciphertext is decrypted;
First link block, for connecting corresponding terminal using the terminal password after decryption.
9. device according to claim 8, it is characterised in that also include:
Password Input module, for when in the absence of terminal password ciphertext corresponding with the terminal name, obtaining user's input Terminal password;
Second judge module, for judging whether the terminal password of user's input matches with the terminal name;
Second link block, for when the terminal password that user inputs is matched with the terminal name, being inputted using user Terminal password connects corresponding terminal;
Second Key Acquisition Module, for obtaining the biometric keys generated according to user biological characteristic information;
Encrypting module, the terminal password for being inputted by the biometric keys to user is encrypted close to obtain terminal Code ciphertext.
10. device according to claim 8, it is characterised in that also include:
Recovery module, it is close to obtain the terminal at least one ciphertext of the terminal password ciphertext to be decomposed into file reduction Code ciphertext.
11. device according to claim 8, it is characterised in that the first key acquisition module includes:
First decomposes file obtaining unit, at least one key decomposition text for obtaining the biometric keys prestored Part;
First key reduction unit, it is special to obtain the biology prestored at least one described key decomposition file to be reduced Levy key.
12. device according to claim 9, it is characterised in that also include:
Decomposing module, text is decomposed for being decomposed to the terminal password ciphertext to obtain at least one terminal password ciphertext Part.
13. device according to claim 9, it is characterised in that second Key Acquisition Module includes:
Second decomposes file obtaining unit, at least one key decomposition file for obtaining the biometric keys;
Second key recovery unit, it is close to obtain the biological characteristic at least one described key decomposition file to be reduced Key.
14. the device according to any one of claim 8-13, it is characterised in that the connectable terminal is WiFi whole End.
15. a kind of electronic equipment, it is characterised in that including the device any one of claim 8-14.
CN201710262439.5A 2017-04-20 2017-04-20 Terminal connection method, device and electronic equipment Pending CN107148016A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710262439.5A CN107148016A (en) 2017-04-20 2017-04-20 Terminal connection method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710262439.5A CN107148016A (en) 2017-04-20 2017-04-20 Terminal connection method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN107148016A true CN107148016A (en) 2017-09-08

Family

ID=59774115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710262439.5A Pending CN107148016A (en) 2017-04-20 2017-04-20 Terminal connection method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN107148016A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021160084A1 (en) * 2020-02-14 2021-08-19 深圳市万普拉斯科技有限公司 File transmission method and apparatus, electronic device, and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458409A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
CN104144424A (en) * 2013-05-07 2014-11-12 华为终端有限公司 Method for establishing connection between devices, configuration device and wireless devices
CN105099669A (en) * 2015-05-28 2015-11-25 努比亚技术有限公司 Recording encryption and decryption method and device
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
WO2016086739A1 (en) * 2014-12-03 2016-06-09 西安西电捷通无线网络通信股份有限公司 Method for device having wlan function to access network and device for implementing method
CN105978683A (en) * 2005-11-18 2016-09-28 安全第公司 Secure data parser method and system
CN106131834A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 Method for connecting network, network connection device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978683A (en) * 2005-11-18 2016-09-28 安全第公司 Secure data parser method and system
CN104144424A (en) * 2013-05-07 2014-11-12 华为终端有限公司 Method for establishing connection between devices, configuration device and wireless devices
CN103458409A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
WO2016086739A1 (en) * 2014-12-03 2016-06-09 西安西电捷通无线网络通信股份有限公司 Method for device having wlan function to access network and device for implementing method
CN105099669A (en) * 2015-05-28 2015-11-25 努比亚技术有限公司 Recording encryption and decryption method and device
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
CN106131834A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 Method for connecting network, network connection device and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021160084A1 (en) * 2020-02-14 2021-08-19 深圳市万普拉斯科技有限公司 File transmission method and apparatus, electronic device, and readable storage medium

Similar Documents

Publication Publication Date Title
CN104125055B (en) Encryption and decryption method and electronic equipment
US9262618B2 (en) Secure and usable protection of a roamable credentials store
CN102682506B (en) Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
JP4866863B2 (en) Security code generation method and user device
CN105429761B (en) A kind of key generation method and device
US20070039042A1 (en) Information-security systems and methods
CN102819702B (en) File encryption operation method and file encryption operational system
CN108615154B (en) Block chain digital signature system based on hardware encryption protection and using process
JP2001320768A (en) Portable telephone set and secrecy method of data
CN101965723A (en) Image-based man-in-the-middle protection in numeric comparison association models
CN106850220A (en) Data ciphering method, data decryption method and device
CN103763091B (en) A kind of application program encryption and decryption method and encryption, decryption device
CN111563251B (en) Encryption method and related device for private information in terminal equipment
CN102419805A (en) Terminal equipment and method for encrypting user information
CN109561056B (en) Secret communication method, system, mobile terminal and wearable device
WO2014169610A1 (en) Data encryption and decryption method and device, and protection system of mobile terminal
CN110771190A (en) Controlling access to data
Jeong et al. Utilizing a Bluetooth remote lock system for a smartphone
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN105022965B (en) A kind of data ciphering method and device
CN105162592B (en) A kind of method and system of certification wearable device
CN114501431A (en) Message transmission method and device, storage medium and electronic equipment
CN107148016A (en) Terminal connection method, device and electronic equipment
EP1725939A1 (en) Storing of encrypted data in the memory of a portable electronic device
CN108073820A (en) Security processing, device and the mobile terminal of data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908

RJ01 Rejection of invention patent application after publication