CN104951704B - A kind of image information collecting device and its encryption method - Google Patents

A kind of image information collecting device and its encryption method Download PDF

Info

Publication number
CN104951704B
CN104951704B CN201510337687.2A CN201510337687A CN104951704B CN 104951704 B CN104951704 B CN 104951704B CN 201510337687 A CN201510337687 A CN 201510337687A CN 104951704 B CN104951704 B CN 104951704B
Authority
CN
China
Prior art keywords
encryption
user
image data
unit
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510337687.2A
Other languages
Chinese (zh)
Other versions
CN104951704A (en
Inventor
皮爱平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sundang (Guangdong) Technology Co.,Ltd.
Original Assignee
GUANGZHOU XUNTENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU XUNTENG INFORMATION TECHNOLOGY Co Ltd filed Critical GUANGZHOU XUNTENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201510337687.2A priority Critical patent/CN104951704B/en
Publication of CN104951704A publication Critical patent/CN104951704A/en
Priority to PCT/CN2016/082276 priority patent/WO2016202130A1/en
Application granted granted Critical
Publication of CN104951704B publication Critical patent/CN104951704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Studio Devices (AREA)

Abstract

The invention discloses a kind of image information collecting device and its encryption methods, the controller of the device includes start unit, query unit, collecting unit, authentication unit and encryption unit, use the image information collecting device carry out image information collecting encryption method for:Image data is encrypted using the Encryption Algorithm of device itself, or double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, encrypted image data is transmitted to output unit.The present invention utmostly ensures that the image information safety of user, and request use the data safety of the user of the image information of user.User management module and management of encryption algorithms module delete the user being of little use and Encryption Algorithm in the encryption method of image information collecting of the present invention, add new user and Encryption Algorithm, it realizes and the real-time dynamic of any number of manufacturer's difference Encryption Algorithm is managed, meet the demand for security of each businessman.

Description

A kind of image information collecting device and its encryption method
Technical field
The present invention relates to the encryption technology of image information, more particularly to the encryption method and dress of a kind of image information collecting It sets.
Background technology
Biological identification technology is just applied to finance, public security at present, and each key area such as traffic is answered in subscription authentication It plays a significant role in.The biometric image information collection of support encryption function based on biometric image information collecting device There are many be that can only fix to use a certain cipher mode, single cipher mode that cannot meet the safety of multiple manufacturers for device It needs, or is only capable of the demand that limited support prestores several manufacturers of Encryption Algorithm, it can not be to other than several manufacturers User and its corresponding Encryption Algorithm image data is encrypted in real time, and then also can not really meet the needs of this is huge.
Invention content
A kind of image information collecting device of present invention offer and its encryption method, allow image information collecting device in inside Image data is encrypted using the Encryption Algorithm of device itself, or using the Encryption Algorithm of device itself and adding for user Close algorithm carries out double-encryption to image data, and different user and its corresponding Encryption Algorithm can also be into Mobile state management.
The present invention is realized by following technical proposals:
A kind of image information collecting device, it is characterised in that the device is equipped with controller, and controller further includes having:
Start unit judges whether to include acquisition instructions, if then activating for monitoring enabling signal in real time after reception Collecting unit, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit examines the image currently acquired whether to meet picture big for receiving image data from collecting unit Small and picture quality condition notifies collecting unit to stop acquisition if having met, and it is single to notify that encryption unit obtains acquisition The image data of member acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition;
Encryption unit is provided with user management module, storage encryption corresponding with each user in user management module is calculated The management of encryption algorithms module of method and calling corresponded in management of encryption algorithms module the Encryption Algorithm of user to image data into The encrypted encrypting module of row;
Output unit, the output for image data after encrypting.
It is equipped in the encryption unit and forbids instructing, the device except the controller processing unit is forbidden to read described add The algorithm of close algorithm management module.
The image data received is encrypted in the encryption unit, needs encrypted information in addition to the figure of shooting As except data, also encryption algorithm identification, Encryption Algorithm version identifier, quantity of documents, file size, creation time, effectively It is one or more in time, business information, user information, verification information, additional information.
The user management module executes addition user, or deletes the operation of user or user right modification, or inquiry is used Family state, or verify the operation of active user's permission.
The management of encryption algorithms module executes addition user encryption algorithm, or deletion user encryption algorithm or user add The operation of close algorithm permission modification, or the operation of inquiry user encryption algorithm state or user right verification.
The method that described image information collecting device carries out double-encryption to image data, it is characterised in that including walking as follows Suddenly:
(1)The collecting unit is activated to carry out image data acquiring, the encryption unit receives picture number from collecting unit According to;
(2)Encryption Algorithm and enabling signal using the present apparatus include corresponding user Encryption Algorithm to image data into Row double-encryption;
(3)Image data after double-encryption is transmitted to output unit.
Step(2)Include the following steps:
The encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls correspond to later The cryptographic algorithm process of user carries out second to image data and encrypts, alternatively, encrypting module calls the encryption of corresponding user to calculate Method program carries out first time encryption to image data, and encrypting module carries out image data by the Encryption Algorithm of the present apparatus later Second of encryption.
Before described image information collecting device carries out image data encryption, it is additionally provided with the step of structure encrypts environment, structure Building the step of encrypting environment includes:
(21)It includes user, corresponding user encryption algorithm and the startup letter for asking encrypted instruction that the start unit, which is monitored, Number;
(22)Judge in the user management module whether the user that packet enabling signal is included, if including, operation step Suddenly(23), otherwise user management module, which executes, adds new user's operation, operating procedure(23);
(23)Judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, such as Fruit includes to execute image data encrypting step, otherwise operating procedure(24);
(24)It includes to correspond to the encryption of user to judge whether the controller memory space is stored enough to enabling signal The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, is held if there is enough memory spaces by algorithm routine Row image data encrypting step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor enabling signal institute Including the cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, image data encrypting step is executed.
The step(1)In, the verification step equipped with the authentication unit between the collecting unit and the encryption unit Suddenly, verification step includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
The method that described image information collecting device carries out one-time pad encryption to image data, it is characterised in that including walking as follows Suddenly:
(31)The collecting unit is activated to carry out image data acquiring to subject, the encryption unit is from collecting unit Receive image data;
(32)One-time pad encryption is carried out to the image data of shooting using the Encryption Algorithm of the present apparatus;
(33)Encrypted image data is transmitted to output unit.
The step(31)In, the verification step equipped with the authentication unit between the collecting unit and the encryption unit Suddenly, verification step includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
Beneficial effects of the present invention:
(1)Image information collecting device of the present invention, the internal Encryption Algorithm using device itself carry out image data Encryption, or double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, due to adding Close unit is using the assignment algorithm of corresponding merchant user as Encryption Algorithm, that is, the Encryption Algorithm of different businessmans and image letter The AES combination of harvester itself is ceased into different double-encryptions, utmostly ensures the image information safety of user, And request uses the data safety of the user of the image information of user.
(2)User management module and management of encryption algorithms module are to seldom in the encryption method of image information collecting of the present invention User and its corresponding Encryption Algorithm can delete, and add new user and its corresponding Encryption Algorithm, realize to arbitrary more The real-time dynamic of the different Encryption Algorithm of a manufacturer user manages, and meets the demand for security of each businessman.
Description of the drawings
Fig. 1 is encryption system structure chart in biometric image information collecting device controller of the present invention;
Fig. 2 is user management module execution flow chart;
Fig. 3 is management of encryption algorithms module execution flow chart;
Fig. 4 is the flow chart that double-encryption is carried out to human face image information;
Fig. 5 is the flow chart that one-time pad encryption is carried out to human face image information.
Specific implementation mode
Embodiment 1:
A kind of image information collecting device, the device are equipped with controller, and controller further includes having:
Start unit judges whether to include acquisition instructions, if then activating for monitoring enabling signal in real time after reception Collecting unit, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit examines the image currently acquired whether to meet picture big for receiving image data from collecting unit Small and picture quality condition notifies collecting unit to stop acquisition if having met, and it is single to notify that encryption unit obtains acquisition The image data of member acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition;
Encryption unit is provided with user management module, storage encryption corresponding with each user in user management module is calculated The management of encryption algorithms module of method and calling corresponded in management of encryption algorithms module the Encryption Algorithm of user to image data into The encrypted encrypting module of row;
Output unit, the output for image data after encrypting.
It is equipped in encryption unit and forbids instructing, the device except the controller processing unit is forbidden to read Encryption Algorithm pipe The algorithm for managing module, to prevent algorithm leakage to be even cracked.
The image data received is encrypted in encryption unit, needs encrypted information in addition to the picture number of shooting Except, also encryption algorithm identification, Encryption Algorithm version identifier, quantity of documents, file size, creation time, effective time, It is one or more in business information, user information, verification information, additional information.
The method for carrying out double-encryption to image data using above-mentioned image information collecting device, includes the following steps:
(1)The collecting unit is activated to carry out image data acquiring, the encryption unit receives picture number from collecting unit According to;
(2)Encryption Algorithm and enabling signal using the present apparatus include corresponding user Encryption Algorithm to image data into Row double-encryption;
(3)Image data after double-encryption is transmitted to output unit.
Step(2)Include the following steps:
Encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls corresponding user later Cryptographic algorithm process second carried out to image data encrypt, alternatively, encrypting module calls the Encryption Algorithm journey of corresponding user Ordered pair image data carries out first time encryption, and encrypting module carries out second by the Encryption Algorithm of the present apparatus to image data later Secondary encryption.
Before above-mentioned image information collecting device carries out image data double-encryption, it is additionally provided with the step of structure encryption environment Suddenly, the step of structure encryption environment includes:
(21)It includes user, corresponding user encryption algorithm and the startup letter for asking encrypted instruction that the start unit, which is monitored, Number;
(22)Judge in the user management module whether the user that packet enabling signal is included, if including, operation step Suddenly(23), otherwise user management module, which executes, adds new user's operation, operating procedure(23);
(23)Judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, such as Fruit includes to execute image data encrypting step, otherwise operating procedure(24);
(24)It includes to correspond to the encryption of user to judge whether the controller memory space is stored enough to enabling signal The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, is held if there is enough memory spaces by algorithm routine Row image data encrypting step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor enabling signal institute Including the cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, image data encrypting step is executed.
Step(1)In, the verification step of authentication unit, verification step packet are equipped between collecting unit and the encryption unit Include following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
The method for carrying out one-time pad encryption to image data using above-mentioned image information collecting device, includes the following steps:
(31)The collecting unit is activated to carry out image data acquiring to subject, the encryption unit is from collecting unit Receive image data;
(32)One-time pad encryption is carried out to the image data of shooting using the Encryption Algorithm of the present apparatus;
(33)Encrypted image data is transmitted to output unit.
The step(31)In, the authentication unit is equipped between the collecting unit and the encryption unit, verification is single Member includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
Collecting unit the image collected data of above-mentioned image information collecting device can be static data for example according to Piece, or dynamic data such as video.
Authentication unit mainly verifies whether it meets shooting condition to the biometric image of shooting, can be applied to face knowledge Not, iris recognition, refer to hand vein recognition, vena metacarpea identification, fingerprint recognition, personal recognition, person's handwriting identification etc..
Image information collecting device of the present invention, it is internal that image data is added using the Encryption Algorithm of device itself It is close, or double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, due to encryption Unit is using the assignment algorithm of corresponding merchant user as Encryption Algorithm, that is, the Encryption Algorithm and image information of different businessmans The AES combination of harvester itself utmostly ensures the image information safety of user at different double-encryptions, with And request uses the data safety of the user of the image information of user, such as businessman is to the face verification of payment process.
If the not no Encryption Algorithm of oneself of businessman user can ask the self-encryption using this image information collecting device Algorithm carries out one-time pad encryption to image data.
User management module executes addition user, or deletes the operation of user or user right modification, or inquiry user's shape State, or verify the operation of active user's permission.Management of encryption algorithms module executes addition user encryption algorithm, or deletes user and add The operation of close algorithm or the modification of user encryption algorithm permission, or the behaviour of inquiry user encryption algorithm state or user right verification Make.
User management module and management of encryption algorithms module are realized to any number of manufacturer users and its corresponding Encryption Algorithm Progress dynamically manage in real time, as long as start unit listens to new user and its corresponding Encryption Algorithm or user's difference version This new Encryption Algorithm, you can real-time update is carried out by user management module and management of encryption algorithms module, breaks through biology figure As there are many be that can only fix using a certain cipher mode, or be only capable of several manufacturers of limited support for information collecting device Demand really meets the needs of this is huge.
After encryption unit receives the instruction in enabling signal, judge to include user management instruction in enabling signal, User management module flow is executed, as shown in Fig. 2.
User management instruction is added if user to be instructed, then shows to be wrapped not comprising enabling signal in user management module The user contained executes user and adds operation, the new user for including in instruction is added to the user management module in encryption unit, Terminate this instruction.
User management instruction is deleted if user to be instructed, then it represents that controller insufficient memory stores adding for new user Close algorithm routine, execute to already present other be of little use user carry out delete operation.In the deletion behaviour for executing the user that is of little use Before work, whether the user that first checks for being of little use if having if first deletes the be of little use user pair with corresponding Encryption Algorithm Then the Encryption Algorithm answered deletes the user that is of little use;If not having, the user that is of little use directly is deleted, this instruction is terminated.
User management instruction is changed if user right to be instructed, then it represents that executes user right modification operation.Verification is worked as Whether the permission of preceding user passes through, and is grasped if, according to the permission of instruction modification user, otherwise directly terminating this instruction if Make.
Preferably, when executing subscriber management function, verification active user's permission is all added after receiving instruction Function, safely and effectively managed with the user ensured in image information collecting device.
After encryption unit receives the instruction in enabling signal, judge to include that management of encryption algorithms refers in enabling signal It enables, executes management of encryption algorithms block process, as shown in Fig. 3.
The user instruction is added if Encryption Algorithm and is instructed, then it represents that has the correspondence Encryption Algorithm of new user to store into adding In the management of encryption algorithms module of close unit(Or there is the Encryption Algorithm of the corresponding new version of user to store into encryption unit In management of encryption algorithms module), Encryption Algorithm addition operation is executed, finds in instruction and corresponds to new user to be added, and verify Its permission adds the correspondence Encryption Algorithm of new user if being verified, and terminates this instruction operation;It is straight not if if verification Binding beam.
The user instruction is deleted if Encryption Algorithm and is instructed, then it represents that it is corresponding that controller insufficient memory stores user Cryptographic algorithm process executes the Encryption Algorithm delete operation to being of little use, and finds the corresponding user deleted in instruction, finds out the use Whether family possesses this Encryption Algorithm, if directly terminating this instruction operation without if, if possessing this Encryption Algorithm, verifies the use The permission at family does not terminate this instruction operation if verification if, if by deleting the algorithm, and terminate this instruction.
User management module and management of encryption algorithms module then realize the different Encryption Algorithm progress to multiple manufacturer users Dynamic manages in real time, meets the demand for security of each businessman.
Embodiment 2:
The image information collecting device of the present invention is mainly used in the acquisition of biometric image information, and image information of the present invention is adopted The encryption method of collection is mainly used in the encryption of biometric image information.
Such as Fig. 1, a kind of biometric image information collecting device, which is equipped with controller, and controller further includes having:
Start unit judges whether to include acquisition instructions, if then activating for monitoring enabling signal in real time after reception Collecting unit, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit examines the image currently acquired whether to meet picture big for receiving image data from collecting unit The condition of small, picture quality and angle about X, Y, Z axis notifies collecting unit to stop acquisition, and lead to if having met Know that encryption unit obtains the image data of collecting unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting item Part.
Encryption unit is provided with user management module, storage encryption corresponding with each user in user management module is calculated The management of encryption algorithms module of method and calling corresponded in management of encryption algorithms module the Encryption Algorithm of user to image data into The encrypted encrypting module of row;
Output unit is exported for image data after encrypting to outside biometric image information collecting device or biometric image letter On the display screen for ceasing harvester.
It is equipped in encryption unit and forbids instructing, the device except the controller processing unit is forbidden to read Encryption Algorithm pipe The algorithm for managing module, to prevent algorithm leakage to be even cracked.
The biometric image data received is encrypted in encryption unit, needs encrypted information in addition to the figure of shooting As except data, also encryption algorithm identification, Encryption Algorithm version identifier, quantity of documents, file size, creation time, effectively It is one or more in time, business information, user information, verification information, additional information.
Such as Fig. 4, the method that double-encryption is carried out to human face image information using above-mentioned biometric image information collecting device Include the following steps:
(51)It includes a certain businessman user, the Encryption Algorithm of the corresponding businessman user and request encryption that start unit, which is monitored, The enabling signal of instruction;
(52)Judge in the user management module of encryption unit whether to include the businessman user, if including, operating procedure (53), otherwise user management module, which executes, adds businessman's user's operation, operating procedure(53);
(53)Whether judge in management of encryption algorithms module comprising the encryption for corresponding to the businessman user in user management module Algorithm, if including, operating procedure(55), otherwise operating procedure(54);
(54)Judge whether enough storage enabling signal includes to correspond to the encryption of the businessman user to controller memory space Algorithm routine stores the cryptographic algorithm process of the corresponding businessman user into management of encryption algorithms if there is enough memory spaces Module, operating procedure(55), otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor that enabling signal is wrapped Cryptographic algorithm process containing the corresponding businessman user is stored into management of encryption algorithms module, operating procedure(55).
(55)Activate collecting unit;
(56)Collecting unit acquires face image data;
(57)Authentication unit receives face image data from collecting unit, examines whether the facial image currently acquired meets The condition of picture size, picture quality and the angle about X, Y, Z axis notifies collecting unit stopping to adopt if having met Collect, and encrypting module is notified to obtain the face image data of collecting unit acquisition, otherwise operating procedure(56);
(58)Encryption Algorithm and enabling signal using the present apparatus include the Encryption Algorithm of the corresponding businessman user to bat The image data taken the photograph carries out double-encryption, and encrypting module to image data for the first time add by the Encryption Algorithm of the present apparatus It is close, it calls the cryptographic algorithm process of the corresponding businessman user to carry out second to image data later and encrypts;
(59)Face image data after double-encryption is transmitted to output unit.
If the not no Encryption Algorithm of oneself of the businessman user, can ask using above-mentioned biometric image information collecting device from Body Encryption Algorithm carries out one-time pad encryption to face image data.
Such as Fig. 5, the method that one-time pad encryption is carried out to face image data using above-mentioned biometric image information collecting device Include the following steps:
(61)Start unit monitoring includes the businessman user and request encrypted instruction, but is added without the corresponding businessman user The enabling signal of close algorithm;
(62)Activate collecting unit;
(63)Collecting unit acquires face image data;
(64)Authentication unit receives face image data from collecting unit, examines whether the facial image currently acquired meets The condition of picture size, picture quality and the angle about X, Y, Z axis notifies collecting unit stopping to adopt if having met Collect, and encrypting module is notified to obtain the face image data of collecting unit acquisition, otherwise operating procedure(63);
(65)One-time pad encryption is carried out to the image data of shooting using the Encryption Algorithm of the present apparatus;
(66)Encrypted face image data is transmitted to output unit.
The above, only part specific implementation mode of the invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, All within protection scope of the present invention.

Claims (12)

1. a kind of image information collecting device, it is characterised in that the device is equipped with controller, and controller further includes having:
Start unit monitors enabling signal in real time, judges whether to include acquisition instructions after reception, if then activating acquisition single Member, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit, for receiving image data from collecting unit, examine the image that currently acquires whether meet picture size and The condition of picture quality notifies collecting unit to stop acquisition if having met, and encryption unit is notified to obtain collecting unit and adopt Otherwise the image data of collection continues to examine whether the image currently acquired meets shooting condition;
Encryption unit is provided with user management module, storage Encryption Algorithm corresponding with each user in user management module The Encryption Algorithm that user is corresponded in management of encryption algorithms module and calling management of encryption algorithms module adds image data Close encrypting module;
Output unit, the output for image data after encrypting;
The collecting unit is activated to carry out image data acquiring, the encryption unit receives image data from collecting unit,
Described image information collecting device, it is internal that image data is encrypted using the Encryption Algorithm of device itself;Or Double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, the double-encryption is: The encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls adding for corresponding user later Close algorithm routine carries out second to image data and encrypts, alternatively, encrypting module calls the cryptographic algorithm process pair of corresponding user Image data carries out first time encryption, and encrypting module to image data for the second time add by the Encryption Algorithm of the present apparatus later It is close;
The user management module and management of encryption algorithms module, which are realized, carries out in fact the different Encryption Algorithm of multiple manufacturer users When dynamic manage, meet the demand for security of each businessman.
2. image information collecting device according to claim 1, it is characterised in that:It is equipped in the encryption unit and forbids referring to It enables, the device except the controller is forbidden to read the algorithm of the management of encryption algorithms module.
3. image information collecting device according to claim 1, it is characterised in that:The encryption unit is to the figure that receives As data are encrypted, need encrypted information other than the image data of shooting, also encryption algorithm identification, encryption Algorithm versions mark, quantity of documents, file size, creation time, effective time, business information, user information, verification information, It is one or more in additional information.
4. image information collecting device according to claim 1, it is characterised in that:The user management module executes addition User, or the operation of user or user right modification is deleted, or inquiry User Status, or verify the operation of active user's permission.
5. image information collecting device according to claim 1, it is characterised in that:The management of encryption algorithms module executes User encryption algorithm is added, or deletes the operation of user encryption algorithm or the modification of user encryption algorithm permission, or inquiry user adds The operation of close algorithm state or user right verification.
6. image information collecting device according to claim 1, it is characterised in that:Described image information collecting device carries out Before image data double-encryption, it is additionally provided with the step of structure encrypts environment, building the step of encrypting environment includes:
(21) it includes user, corresponding user encryption algorithm and the enabling signal for asking encrypted instruction that the start unit, which is monitored,;
(22) judge in the user management module whether the corresponding user being loaded with comprising enabling signal, if including, Operating procedure (23), otherwise user management module, which executes, adds new user's operation, operating procedure (23);
(23) judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, if packet Contain, executes image data encrypting step, otherwise operating procedure (24);
(24) it includes to correspond to the Encryption Algorithm of user to judge whether the controller memory space is stored enough to enabling signal The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module if there is enough memory spaces, executes figure by program As data encryption step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor that enabling signal is included The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, executes image data encryption.
What 7. image data was encrypted in the image information collecting device according to any claim in claim 1-6 Method, it is characterised in that include the following steps:
(1) collecting unit is activated to carry out image data acquiring, the encryption unit receives image data from collecting unit;
(2) it includes that the Encryption Algorithm of corresponding user gives image data progress pair to use the Encryption Algorithm of the present apparatus and enabling signal Re-encryption;
(3) image data after double-encryption is transmitted to output unit.
8. the method that image data is encrypted in image information collecting device according to claim 7, it is characterised in that Step (2) includes the following steps:
The encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls corresponding user later Cryptographic algorithm process second carried out to image data encrypt, alternatively, encrypting module calls the Encryption Algorithm journey of corresponding user Ordered pair image data carries out first time encryption, and encrypting module carries out second by the Encryption Algorithm of the present apparatus to image data later Secondary encryption.
9. the method that image data is encrypted in image information collecting device according to claim 7, it is characterised in that Before described image information collecting device carries out image data encryption, it is additionally provided with the step of structure encrypts environment, builds encryption ring The step of border includes:
(21) it includes user, corresponding user encryption algorithm and the enabling signal for asking encrypted instruction that the start unit, which is monitored,;
(22) judge in the user management module whether the corresponding user being loaded with comprising enabling signal, if including, Operating procedure (23), otherwise user management module, which executes, adds new user's operation, operating procedure (23);
(23) judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, if packet Contain, executes image data encrypting step, otherwise operating procedure (24);
(24) it includes to correspond to the Encryption Algorithm of user to judge whether the controller memory space is stored enough to enabling signal The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module if there is enough memory spaces, executes figure by program As data encryption step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor that enabling signal is included The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, executes image data encrypting step.
10. the method that image information is encrypted in image information collecting device according to claim 7, it is characterised in that In the step (1), the verification step of the authentication unit, verification step are equipped between the collecting unit and the encryption unit Suddenly include the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and picture matter The shooting condition of amount notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain collecting unit Otherwise the image data of acquisition continues to examine whether the image currently acquired meets shooting condition.
11. image data is encrypted in the image information collecting device according to any claim in claim 1-6 Method, it is characterised in that include the following steps:
(31) collecting unit is activated to carry out image data acquiring to subject, the encryption unit is received from collecting unit Image data;
(32) Encryption Algorithm of the present apparatus is used to carry out one-time pad encryption to the image data of shooting;
(33) encrypted image data is transmitted to output unit.
12. the method that image data is encrypted in image information collecting device according to claim 11, feature exist In the step (31), it is equipped with the verification step of the authentication unit between the collecting unit and the encryption unit, tests Card step includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and picture matter The shooting condition of amount notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain collecting unit Otherwise the image data of acquisition continues to examine whether the image currently acquired meets shooting condition.
CN201510337687.2A 2015-06-17 2015-06-17 A kind of image information collecting device and its encryption method Active CN104951704B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510337687.2A CN104951704B (en) 2015-06-17 2015-06-17 A kind of image information collecting device and its encryption method
PCT/CN2016/082276 WO2016202130A1 (en) 2015-06-17 2016-05-17 Device for image information collection and encryption method therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510337687.2A CN104951704B (en) 2015-06-17 2015-06-17 A kind of image information collecting device and its encryption method

Publications (2)

Publication Number Publication Date
CN104951704A CN104951704A (en) 2015-09-30
CN104951704B true CN104951704B (en) 2018-07-13

Family

ID=54166353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510337687.2A Active CN104951704B (en) 2015-06-17 2015-06-17 A kind of image information collecting device and its encryption method

Country Status (2)

Country Link
CN (1) CN104951704B (en)
WO (1) WO2016202130A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951704B (en) * 2015-06-17 2018-07-13 广州市巽腾信息科技有限公司 A kind of image information collecting device and its encryption method
CN106108950A (en) * 2016-07-14 2016-11-16 宁波美童智能科技有限公司 A kind of intelligent wireless ultrasonic fetal imaging screen method
US11062304B2 (en) * 2016-10-20 2021-07-13 Google Llc Offline user identification
CN107550487A (en) * 2017-09-22 2018-01-09 成都比特律动科技有限责任公司 Portable cardiac monitor system
CN109495715B (en) * 2018-11-22 2020-08-25 成都零壹众科技有限公司 Mobile communication law enforcement instrument system suitable for commanding and dispatching
CN110460580B (en) * 2019-07-11 2022-02-22 中国银联股份有限公司 Image acquisition device, server and encryption and decryption methods
CN111416718A (en) * 2020-03-13 2020-07-14 浙江华消科技有限公司 Method and device for receiving communication key, method and device for sending communication key

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN103632102A (en) * 2012-08-21 2014-03-12 中兴通讯股份有限公司 Certificate processing method and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201305841A (en) * 2011-07-28 2013-02-01 Hon Hai Prec Ind Co Ltd Computer system, encryption apparatus and method for encryption
CN204347841U (en) * 2014-12-31 2015-05-20 北京华大智宝电子系统有限公司 A kind of fingerprint identification device
CN104951704B (en) * 2015-06-17 2018-07-13 广州市巽腾信息科技有限公司 A kind of image information collecting device and its encryption method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632102A (en) * 2012-08-21 2014-03-12 中兴通讯股份有限公司 Certificate processing method and terminal
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system

Also Published As

Publication number Publication date
WO2016202130A1 (en) 2016-12-22
CN104951704A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN104951704B (en) A kind of image information collecting device and its encryption method
US10375116B2 (en) System and method to provide server control for access to mobile client data
US9628478B2 (en) Technologies for secure storage and use of biometric authentication information
CN104967511B (en) The processing method and processing device of encryption data
CN106330442B (en) Identity authentication method, device and system
CN106612259A (en) Identity recognition method and device, service information processing method and device and biological feature information processing method and device
WO2017063517A1 (en) Near field communication establishing method and device
CN105281907B (en) Encrypted data processing method and device
CN103927470A (en) File encryption and decryption system and method based on iris recognition
CN106161028A (en) Safety chip, communication terminal and the method improving communication security
WO2021047477A1 (en) Key allocation method and system, mobile terminal and wearable device
CN108073820A (en) Security processing, device and the mobile terminal of data
CN105208045A (en) Identity authentication method, equipment and system
CN106355112A (en) Method of destructing data in encrypted mobile storage device and server
CN112564892B (en) Key distribution method, system and wearable device
KR20150100602A (en) Data storing and reading methods, apparatuses and devices
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
CN111177694B (en) Method and device for processing data
CN107038389A (en) Data encryption processing method, data deciphering processing method and mobile terminal
WO2015131585A1 (en) Method and device for ensuring sd card security
JP2005242471A (en) Information collection/transfer/acquisition system, information collection controller, information collection control method, program therefor and recording medium recording them
CN116582281B (en) Safe face recognition method, system and equipment based on password technology
CN106888318A (en) A kind of smart mobile phone black box device
CN114090988A (en) Processing method and device
WO2017185704A1 (en) Method and device for secure processing of important contact

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 510000 unit 103, first floor, C2 innovation building, No. 182, science Avenue, Science City, Guangzhou high tech Industrial Development Zone, Guangdong Province

Patentee after: Sundang (Guangdong) Technology Co.,Ltd.

Address before: 511400, No. 268 West Ring Road, Shiqiao street, Guangzhou, Guangdong, Panyu District

Patentee before: GUANGZHOU XUNTENG INFORMATION TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address