CN104951704B - A kind of image information collecting device and its encryption method - Google Patents
A kind of image information collecting device and its encryption method Download PDFInfo
- Publication number
- CN104951704B CN104951704B CN201510337687.2A CN201510337687A CN104951704B CN 104951704 B CN104951704 B CN 104951704B CN 201510337687 A CN201510337687 A CN 201510337687A CN 104951704 B CN104951704 B CN 104951704B
- Authority
- CN
- China
- Prior art keywords
- encryption
- user
- image data
- unit
- encryption algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Studio Devices (AREA)
Abstract
The invention discloses a kind of image information collecting device and its encryption methods, the controller of the device includes start unit, query unit, collecting unit, authentication unit and encryption unit, use the image information collecting device carry out image information collecting encryption method for:Image data is encrypted using the Encryption Algorithm of device itself, or double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, encrypted image data is transmitted to output unit.The present invention utmostly ensures that the image information safety of user, and request use the data safety of the user of the image information of user.User management module and management of encryption algorithms module delete the user being of little use and Encryption Algorithm in the encryption method of image information collecting of the present invention, add new user and Encryption Algorithm, it realizes and the real-time dynamic of any number of manufacturer's difference Encryption Algorithm is managed, meet the demand for security of each businessman.
Description
Technical field
The present invention relates to the encryption technology of image information, more particularly to the encryption method and dress of a kind of image information collecting
It sets.
Background technology
Biological identification technology is just applied to finance, public security at present, and each key area such as traffic is answered in subscription authentication
It plays a significant role in.The biometric image information collection of support encryption function based on biometric image information collecting device
There are many be that can only fix to use a certain cipher mode, single cipher mode that cannot meet the safety of multiple manufacturers for device
It needs, or is only capable of the demand that limited support prestores several manufacturers of Encryption Algorithm, it can not be to other than several manufacturers
User and its corresponding Encryption Algorithm image data is encrypted in real time, and then also can not really meet the needs of this is huge.
Invention content
A kind of image information collecting device of present invention offer and its encryption method, allow image information collecting device in inside
Image data is encrypted using the Encryption Algorithm of device itself, or using the Encryption Algorithm of device itself and adding for user
Close algorithm carries out double-encryption to image data, and different user and its corresponding Encryption Algorithm can also be into Mobile state management.
The present invention is realized by following technical proposals:
A kind of image information collecting device, it is characterised in that the device is equipped with controller, and controller further includes having:
Start unit judges whether to include acquisition instructions, if then activating for monitoring enabling signal in real time after reception
Collecting unit, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit examines the image currently acquired whether to meet picture big for receiving image data from collecting unit
Small and picture quality condition notifies collecting unit to stop acquisition if having met, and it is single to notify that encryption unit obtains acquisition
The image data of member acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition;
Encryption unit is provided with user management module, storage encryption corresponding with each user in user management module is calculated
The management of encryption algorithms module of method and calling corresponded in management of encryption algorithms module the Encryption Algorithm of user to image data into
The encrypted encrypting module of row;
Output unit, the output for image data after encrypting.
It is equipped in the encryption unit and forbids instructing, the device except the controller processing unit is forbidden to read described add
The algorithm of close algorithm management module.
The image data received is encrypted in the encryption unit, needs encrypted information in addition to the figure of shooting
As except data, also encryption algorithm identification, Encryption Algorithm version identifier, quantity of documents, file size, creation time, effectively
It is one or more in time, business information, user information, verification information, additional information.
The user management module executes addition user, or deletes the operation of user or user right modification, or inquiry is used
Family state, or verify the operation of active user's permission.
The management of encryption algorithms module executes addition user encryption algorithm, or deletion user encryption algorithm or user add
The operation of close algorithm permission modification, or the operation of inquiry user encryption algorithm state or user right verification.
The method that described image information collecting device carries out double-encryption to image data, it is characterised in that including walking as follows
Suddenly:
(1)The collecting unit is activated to carry out image data acquiring, the encryption unit receives picture number from collecting unit
According to;
(2)Encryption Algorithm and enabling signal using the present apparatus include corresponding user Encryption Algorithm to image data into
Row double-encryption;
(3)Image data after double-encryption is transmitted to output unit.
Step(2)Include the following steps:
The encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls correspond to later
The cryptographic algorithm process of user carries out second to image data and encrypts, alternatively, encrypting module calls the encryption of corresponding user to calculate
Method program carries out first time encryption to image data, and encrypting module carries out image data by the Encryption Algorithm of the present apparatus later
Second of encryption.
Before described image information collecting device carries out image data encryption, it is additionally provided with the step of structure encrypts environment, structure
Building the step of encrypting environment includes:
(21)It includes user, corresponding user encryption algorithm and the startup letter for asking encrypted instruction that the start unit, which is monitored,
Number;
(22)Judge in the user management module whether the user that packet enabling signal is included, if including, operation step
Suddenly(23), otherwise user management module, which executes, adds new user's operation, operating procedure(23);
(23)Judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, such as
Fruit includes to execute image data encrypting step, otherwise operating procedure(24);
(24)It includes to correspond to the encryption of user to judge whether the controller memory space is stored enough to enabling signal
The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, is held if there is enough memory spaces by algorithm routine
Row image data encrypting step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor enabling signal institute
Including the cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, image data encrypting step is executed.
The step(1)In, the verification step equipped with the authentication unit between the collecting unit and the encryption unit
Suddenly, verification step includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure
The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition
The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
The method that described image information collecting device carries out one-time pad encryption to image data, it is characterised in that including walking as follows
Suddenly:
(31)The collecting unit is activated to carry out image data acquiring to subject, the encryption unit is from collecting unit
Receive image data;
(32)One-time pad encryption is carried out to the image data of shooting using the Encryption Algorithm of the present apparatus;
(33)Encrypted image data is transmitted to output unit.
The step(31)In, the verification step equipped with the authentication unit between the collecting unit and the encryption unit
Suddenly, verification step includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure
The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition
The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
Beneficial effects of the present invention:
(1)Image information collecting device of the present invention, the internal Encryption Algorithm using device itself carry out image data
Encryption, or double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, due to adding
Close unit is using the assignment algorithm of corresponding merchant user as Encryption Algorithm, that is, the Encryption Algorithm of different businessmans and image letter
The AES combination of harvester itself is ceased into different double-encryptions, utmostly ensures the image information safety of user,
And request uses the data safety of the user of the image information of user.
(2)User management module and management of encryption algorithms module are to seldom in the encryption method of image information collecting of the present invention
User and its corresponding Encryption Algorithm can delete, and add new user and its corresponding Encryption Algorithm, realize to arbitrary more
The real-time dynamic of the different Encryption Algorithm of a manufacturer user manages, and meets the demand for security of each businessman.
Description of the drawings
Fig. 1 is encryption system structure chart in biometric image information collecting device controller of the present invention;
Fig. 2 is user management module execution flow chart;
Fig. 3 is management of encryption algorithms module execution flow chart;
Fig. 4 is the flow chart that double-encryption is carried out to human face image information;
Fig. 5 is the flow chart that one-time pad encryption is carried out to human face image information.
Specific implementation mode
Embodiment 1:
A kind of image information collecting device, the device are equipped with controller, and controller further includes having:
Start unit judges whether to include acquisition instructions, if then activating for monitoring enabling signal in real time after reception
Collecting unit, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit examines the image currently acquired whether to meet picture big for receiving image data from collecting unit
Small and picture quality condition notifies collecting unit to stop acquisition if having met, and it is single to notify that encryption unit obtains acquisition
The image data of member acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition;
Encryption unit is provided with user management module, storage encryption corresponding with each user in user management module is calculated
The management of encryption algorithms module of method and calling corresponded in management of encryption algorithms module the Encryption Algorithm of user to image data into
The encrypted encrypting module of row;
Output unit, the output for image data after encrypting.
It is equipped in encryption unit and forbids instructing, the device except the controller processing unit is forbidden to read Encryption Algorithm pipe
The algorithm for managing module, to prevent algorithm leakage to be even cracked.
The image data received is encrypted in encryption unit, needs encrypted information in addition to the picture number of shooting
Except, also encryption algorithm identification, Encryption Algorithm version identifier, quantity of documents, file size, creation time, effective time,
It is one or more in business information, user information, verification information, additional information.
The method for carrying out double-encryption to image data using above-mentioned image information collecting device, includes the following steps:
(1)The collecting unit is activated to carry out image data acquiring, the encryption unit receives picture number from collecting unit
According to;
(2)Encryption Algorithm and enabling signal using the present apparatus include corresponding user Encryption Algorithm to image data into
Row double-encryption;
(3)Image data after double-encryption is transmitted to output unit.
Step(2)Include the following steps:
Encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls corresponding user later
Cryptographic algorithm process second carried out to image data encrypt, alternatively, encrypting module calls the Encryption Algorithm journey of corresponding user
Ordered pair image data carries out first time encryption, and encrypting module carries out second by the Encryption Algorithm of the present apparatus to image data later
Secondary encryption.
Before above-mentioned image information collecting device carries out image data double-encryption, it is additionally provided with the step of structure encryption environment
Suddenly, the step of structure encryption environment includes:
(21)It includes user, corresponding user encryption algorithm and the startup letter for asking encrypted instruction that the start unit, which is monitored,
Number;
(22)Judge in the user management module whether the user that packet enabling signal is included, if including, operation step
Suddenly(23), otherwise user management module, which executes, adds new user's operation, operating procedure(23);
(23)Judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, such as
Fruit includes to execute image data encrypting step, otherwise operating procedure(24);
(24)It includes to correspond to the encryption of user to judge whether the controller memory space is stored enough to enabling signal
The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, is held if there is enough memory spaces by algorithm routine
Row image data encrypting step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor enabling signal institute
Including the cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, image data encrypting step is executed.
Step(1)In, the verification step of authentication unit, verification step packet are equipped between collecting unit and the encryption unit
Include following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure
The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition
The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
The method for carrying out one-time pad encryption to image data using above-mentioned image information collecting device, includes the following steps:
(31)The collecting unit is activated to carry out image data acquiring to subject, the encryption unit is from collecting unit
Receive image data;
(32)One-time pad encryption is carried out to the image data of shooting using the Encryption Algorithm of the present apparatus;
(33)Encrypted image data is transmitted to output unit.
The step(31)In, the authentication unit is equipped between the collecting unit and the encryption unit, verification is single
Member includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and figure
The shooting condition of tablet quality notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain acquisition
The image data of unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting condition.
Collecting unit the image collected data of above-mentioned image information collecting device can be static data for example according to
Piece, or dynamic data such as video.
Authentication unit mainly verifies whether it meets shooting condition to the biometric image of shooting, can be applied to face knowledge
Not, iris recognition, refer to hand vein recognition, vena metacarpea identification, fingerprint recognition, personal recognition, person's handwriting identification etc..
Image information collecting device of the present invention, it is internal that image data is added using the Encryption Algorithm of device itself
It is close, or double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, due to encryption
Unit is using the assignment algorithm of corresponding merchant user as Encryption Algorithm, that is, the Encryption Algorithm and image information of different businessmans
The AES combination of harvester itself utmostly ensures the image information safety of user at different double-encryptions, with
And request uses the data safety of the user of the image information of user, such as businessman is to the face verification of payment process.
If the not no Encryption Algorithm of oneself of businessman user can ask the self-encryption using this image information collecting device
Algorithm carries out one-time pad encryption to image data.
User management module executes addition user, or deletes the operation of user or user right modification, or inquiry user's shape
State, or verify the operation of active user's permission.Management of encryption algorithms module executes addition user encryption algorithm, or deletes user and add
The operation of close algorithm or the modification of user encryption algorithm permission, or the behaviour of inquiry user encryption algorithm state or user right verification
Make.
User management module and management of encryption algorithms module are realized to any number of manufacturer users and its corresponding Encryption Algorithm
Progress dynamically manage in real time, as long as start unit listens to new user and its corresponding Encryption Algorithm or user's difference version
This new Encryption Algorithm, you can real-time update is carried out by user management module and management of encryption algorithms module, breaks through biology figure
As there are many be that can only fix using a certain cipher mode, or be only capable of several manufacturers of limited support for information collecting device
Demand really meets the needs of this is huge.
After encryption unit receives the instruction in enabling signal, judge to include user management instruction in enabling signal,
User management module flow is executed, as shown in Fig. 2.
User management instruction is added if user to be instructed, then shows to be wrapped not comprising enabling signal in user management module
The user contained executes user and adds operation, the new user for including in instruction is added to the user management module in encryption unit,
Terminate this instruction.
User management instruction is deleted if user to be instructed, then it represents that controller insufficient memory stores adding for new user
Close algorithm routine, execute to already present other be of little use user carry out delete operation.In the deletion behaviour for executing the user that is of little use
Before work, whether the user that first checks for being of little use if having if first deletes the be of little use user pair with corresponding Encryption Algorithm
Then the Encryption Algorithm answered deletes the user that is of little use;If not having, the user that is of little use directly is deleted, this instruction is terminated.
User management instruction is changed if user right to be instructed, then it represents that executes user right modification operation.Verification is worked as
Whether the permission of preceding user passes through, and is grasped if, according to the permission of instruction modification user, otherwise directly terminating this instruction if
Make.
Preferably, when executing subscriber management function, verification active user's permission is all added after receiving instruction
Function, safely and effectively managed with the user ensured in image information collecting device.
After encryption unit receives the instruction in enabling signal, judge to include that management of encryption algorithms refers in enabling signal
It enables, executes management of encryption algorithms block process, as shown in Fig. 3.
The user instruction is added if Encryption Algorithm and is instructed, then it represents that has the correspondence Encryption Algorithm of new user to store into adding
In the management of encryption algorithms module of close unit(Or there is the Encryption Algorithm of the corresponding new version of user to store into encryption unit
In management of encryption algorithms module), Encryption Algorithm addition operation is executed, finds in instruction and corresponds to new user to be added, and verify
Its permission adds the correspondence Encryption Algorithm of new user if being verified, and terminates this instruction operation;It is straight not if if verification
Binding beam.
The user instruction is deleted if Encryption Algorithm and is instructed, then it represents that it is corresponding that controller insufficient memory stores user
Cryptographic algorithm process executes the Encryption Algorithm delete operation to being of little use, and finds the corresponding user deleted in instruction, finds out the use
Whether family possesses this Encryption Algorithm, if directly terminating this instruction operation without if, if possessing this Encryption Algorithm, verifies the use
The permission at family does not terminate this instruction operation if verification if, if by deleting the algorithm, and terminate this instruction.
User management module and management of encryption algorithms module then realize the different Encryption Algorithm progress to multiple manufacturer users
Dynamic manages in real time, meets the demand for security of each businessman.
Embodiment 2:
The image information collecting device of the present invention is mainly used in the acquisition of biometric image information, and image information of the present invention is adopted
The encryption method of collection is mainly used in the encryption of biometric image information.
Such as Fig. 1, a kind of biometric image information collecting device, which is equipped with controller, and controller further includes having:
Start unit judges whether to include acquisition instructions, if then activating for monitoring enabling signal in real time after reception
Collecting unit, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit examines the image currently acquired whether to meet picture big for receiving image data from collecting unit
The condition of small, picture quality and angle about X, Y, Z axis notifies collecting unit to stop acquisition, and lead to if having met
Know that encryption unit obtains the image data of collecting unit acquisition, otherwise continues to examine whether the image currently acquired meets shooting item
Part.
Encryption unit is provided with user management module, storage encryption corresponding with each user in user management module is calculated
The management of encryption algorithms module of method and calling corresponded in management of encryption algorithms module the Encryption Algorithm of user to image data into
The encrypted encrypting module of row;
Output unit is exported for image data after encrypting to outside biometric image information collecting device or biometric image letter
On the display screen for ceasing harvester.
It is equipped in encryption unit and forbids instructing, the device except the controller processing unit is forbidden to read Encryption Algorithm pipe
The algorithm for managing module, to prevent algorithm leakage to be even cracked.
The biometric image data received is encrypted in encryption unit, needs encrypted information in addition to the figure of shooting
As except data, also encryption algorithm identification, Encryption Algorithm version identifier, quantity of documents, file size, creation time, effectively
It is one or more in time, business information, user information, verification information, additional information.
Such as Fig. 4, the method that double-encryption is carried out to human face image information using above-mentioned biometric image information collecting device
Include the following steps:
(51)It includes a certain businessman user, the Encryption Algorithm of the corresponding businessman user and request encryption that start unit, which is monitored,
The enabling signal of instruction;
(52)Judge in the user management module of encryption unit whether to include the businessman user, if including, operating procedure
(53), otherwise user management module, which executes, adds businessman's user's operation, operating procedure(53);
(53)Whether judge in management of encryption algorithms module comprising the encryption for corresponding to the businessman user in user management module
Algorithm, if including, operating procedure(55), otherwise operating procedure(54);
(54)Judge whether enough storage enabling signal includes to correspond to the encryption of the businessman user to controller memory space
Algorithm routine stores the cryptographic algorithm process of the corresponding businessman user into management of encryption algorithms if there is enough memory spaces
Module, operating procedure(55), otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor that enabling signal is wrapped
Cryptographic algorithm process containing the corresponding businessman user is stored into management of encryption algorithms module, operating procedure(55).
(55)Activate collecting unit;
(56)Collecting unit acquires face image data;
(57)Authentication unit receives face image data from collecting unit, examines whether the facial image currently acquired meets
The condition of picture size, picture quality and the angle about X, Y, Z axis notifies collecting unit stopping to adopt if having met
Collect, and encrypting module is notified to obtain the face image data of collecting unit acquisition, otherwise operating procedure(56);
(58)Encryption Algorithm and enabling signal using the present apparatus include the Encryption Algorithm of the corresponding businessman user to bat
The image data taken the photograph carries out double-encryption, and encrypting module to image data for the first time add by the Encryption Algorithm of the present apparatus
It is close, it calls the cryptographic algorithm process of the corresponding businessman user to carry out second to image data later and encrypts;
(59)Face image data after double-encryption is transmitted to output unit.
If the not no Encryption Algorithm of oneself of the businessman user, can ask using above-mentioned biometric image information collecting device from
Body Encryption Algorithm carries out one-time pad encryption to face image data.
Such as Fig. 5, the method that one-time pad encryption is carried out to face image data using above-mentioned biometric image information collecting device
Include the following steps:
(61)Start unit monitoring includes the businessman user and request encrypted instruction, but is added without the corresponding businessman user
The enabling signal of close algorithm;
(62)Activate collecting unit;
(63)Collecting unit acquires face image data;
(64)Authentication unit receives face image data from collecting unit, examines whether the facial image currently acquired meets
The condition of picture size, picture quality and the angle about X, Y, Z axis notifies collecting unit stopping to adopt if having met
Collect, and encrypting module is notified to obtain the face image data of collecting unit acquisition, otherwise operating procedure(63);
(65)One-time pad encryption is carried out to the image data of shooting using the Encryption Algorithm of the present apparatus;
(66)Encrypted face image data is transmitted to output unit.
The above, only part specific implementation mode of the invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, can readily occur in change or replacement,
All within protection scope of the present invention.
Claims (12)
1. a kind of image information collecting device, it is characterised in that the device is equipped with controller, and controller further includes having:
Start unit monitors enabling signal in real time, judges whether to include acquisition instructions after reception, if then activating acquisition single
Member, while starting query unit and judging that the Encryption Algorithm of user and corresponding user whether there is in enabling signal;
Query unit, the information of the Encryption Algorithm for accessing encryption unit inquiry user and corresponding user;
Collecting unit is used for the image data acquiring of described image information collecting device;
Authentication unit, for receiving image data from collecting unit, examine the image that currently acquires whether meet picture size and
The condition of picture quality notifies collecting unit to stop acquisition if having met, and encryption unit is notified to obtain collecting unit and adopt
Otherwise the image data of collection continues to examine whether the image currently acquired meets shooting condition;
Encryption unit is provided with user management module, storage Encryption Algorithm corresponding with each user in user management module
The Encryption Algorithm that user is corresponded in management of encryption algorithms module and calling management of encryption algorithms module adds image data
Close encrypting module;
Output unit, the output for image data after encrypting;
The collecting unit is activated to carry out image data acquiring, the encryption unit receives image data from collecting unit,
Described image information collecting device, it is internal that image data is encrypted using the Encryption Algorithm of device itself;Or
Double-encryption is carried out to image data using the Encryption Algorithm of device itself and the Encryption Algorithm of user, the double-encryption is:
The encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls adding for corresponding user later
Close algorithm routine carries out second to image data and encrypts, alternatively, encrypting module calls the cryptographic algorithm process pair of corresponding user
Image data carries out first time encryption, and encrypting module to image data for the second time add by the Encryption Algorithm of the present apparatus later
It is close;
The user management module and management of encryption algorithms module, which are realized, carries out in fact the different Encryption Algorithm of multiple manufacturer users
When dynamic manage, meet the demand for security of each businessman.
2. image information collecting device according to claim 1, it is characterised in that:It is equipped in the encryption unit and forbids referring to
It enables, the device except the controller is forbidden to read the algorithm of the management of encryption algorithms module.
3. image information collecting device according to claim 1, it is characterised in that:The encryption unit is to the figure that receives
As data are encrypted, need encrypted information other than the image data of shooting, also encryption algorithm identification, encryption
Algorithm versions mark, quantity of documents, file size, creation time, effective time, business information, user information, verification information,
It is one or more in additional information.
4. image information collecting device according to claim 1, it is characterised in that:The user management module executes addition
User, or the operation of user or user right modification is deleted, or inquiry User Status, or verify the operation of active user's permission.
5. image information collecting device according to claim 1, it is characterised in that:The management of encryption algorithms module executes
User encryption algorithm is added, or deletes the operation of user encryption algorithm or the modification of user encryption algorithm permission, or inquiry user adds
The operation of close algorithm state or user right verification.
6. image information collecting device according to claim 1, it is characterised in that:Described image information collecting device carries out
Before image data double-encryption, it is additionally provided with the step of structure encrypts environment, building the step of encrypting environment includes:
(21) it includes user, corresponding user encryption algorithm and the enabling signal for asking encrypted instruction that the start unit, which is monitored,;
(22) judge in the user management module whether the corresponding user being loaded with comprising enabling signal, if including,
Operating procedure (23), otherwise user management module, which executes, adds new user's operation, operating procedure (23);
(23) judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, if packet
Contain, executes image data encrypting step, otherwise operating procedure (24);
(24) it includes to correspond to the Encryption Algorithm of user to judge whether the controller memory space is stored enough to enabling signal
The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module if there is enough memory spaces, executes figure by program
As data encryption step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor that enabling signal is included
The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, executes image data encryption.
What 7. image data was encrypted in the image information collecting device according to any claim in claim 1-6
Method, it is characterised in that include the following steps:
(1) collecting unit is activated to carry out image data acquiring, the encryption unit receives image data from collecting unit;
(2) it includes that the Encryption Algorithm of corresponding user gives image data progress pair to use the Encryption Algorithm of the present apparatus and enabling signal
Re-encryption;
(3) image data after double-encryption is transmitted to output unit.
8. the method that image data is encrypted in image information collecting device according to claim 7, it is characterised in that
Step (2) includes the following steps:
The encrypting module carries out first time encryption by the Encryption Algorithm of the present apparatus to image data, calls corresponding user later
Cryptographic algorithm process second carried out to image data encrypt, alternatively, encrypting module calls the Encryption Algorithm journey of corresponding user
Ordered pair image data carries out first time encryption, and encrypting module carries out second by the Encryption Algorithm of the present apparatus to image data later
Secondary encryption.
9. the method that image data is encrypted in image information collecting device according to claim 7, it is characterised in that
Before described image information collecting device carries out image data encryption, it is additionally provided with the step of structure encrypts environment, builds encryption ring
The step of border includes:
(21) it includes user, corresponding user encryption algorithm and the enabling signal for asking encrypted instruction that the start unit, which is monitored,;
(22) judge in the user management module whether the corresponding user being loaded with comprising enabling signal, if including,
Operating procedure (23), otherwise user management module, which executes, adds new user's operation, operating procedure (23);
(23) judge whether comprising the Encryption Algorithm for corresponding to user in user management module in management of encryption algorithms module, if packet
Contain, executes image data encrypting step, otherwise operating procedure (24);
(24) it includes to correspond to the Encryption Algorithm of user to judge whether the controller memory space is stored enough to enabling signal
The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module if there is enough memory spaces, executes figure by program
As data encryption step, otherwise management of encryption algorithms module deletes other Encryption Algorithm, and will monitor that enabling signal is included
The cryptographic algorithm process of corresponding user is stored into management of encryption algorithms module, executes image data encrypting step.
10. the method that image information is encrypted in image information collecting device according to claim 7, it is characterised in that
In the step (1), the verification step of the authentication unit, verification step are equipped between the collecting unit and the encryption unit
Suddenly include the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and picture matter
The shooting condition of amount notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain collecting unit
Otherwise the image data of acquisition continues to examine whether the image currently acquired meets shooting condition.
11. image data is encrypted in the image information collecting device according to any claim in claim 1-6
Method, it is characterised in that include the following steps:
(31) collecting unit is activated to carry out image data acquiring to subject, the encryption unit is received from collecting unit
Image data;
(32) Encryption Algorithm of the present apparatus is used to carry out one-time pad encryption to the image data of shooting;
(33) encrypted image data is transmitted to output unit.
12. the method that image data is encrypted in image information collecting device according to claim 11, feature exist
In the step (31), it is equipped with the verification step of the authentication unit between the collecting unit and the encryption unit, tests
Card step includes the following steps:
Authentication unit receives image data from collecting unit, examines whether the image currently acquired meets picture size and picture matter
The shooting condition of amount notifies collecting unit to stop acquisition if having met, and the encrypting module is notified to obtain collecting unit
Otherwise the image data of acquisition continues to examine whether the image currently acquired meets shooting condition.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510337687.2A CN104951704B (en) | 2015-06-17 | 2015-06-17 | A kind of image information collecting device and its encryption method |
PCT/CN2016/082276 WO2016202130A1 (en) | 2015-06-17 | 2016-05-17 | Device for image information collection and encryption method therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510337687.2A CN104951704B (en) | 2015-06-17 | 2015-06-17 | A kind of image information collecting device and its encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104951704A CN104951704A (en) | 2015-09-30 |
CN104951704B true CN104951704B (en) | 2018-07-13 |
Family
ID=54166353
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510337687.2A Active CN104951704B (en) | 2015-06-17 | 2015-06-17 | A kind of image information collecting device and its encryption method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104951704B (en) |
WO (1) | WO2016202130A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104951704B (en) * | 2015-06-17 | 2018-07-13 | 广州市巽腾信息科技有限公司 | A kind of image information collecting device and its encryption method |
CN106108950A (en) * | 2016-07-14 | 2016-11-16 | 宁波美童智能科技有限公司 | A kind of intelligent wireless ultrasonic fetal imaging screen method |
US11062304B2 (en) * | 2016-10-20 | 2021-07-13 | Google Llc | Offline user identification |
CN107550487A (en) * | 2017-09-22 | 2018-01-09 | 成都比特律动科技有限责任公司 | Portable cardiac monitor system |
CN109495715B (en) * | 2018-11-22 | 2020-08-25 | 成都零壹众科技有限公司 | Mobile communication law enforcement instrument system suitable for commanding and dispatching |
CN110460580B (en) * | 2019-07-11 | 2022-02-22 | 中国银联股份有限公司 | Image acquisition device, server and encryption and decryption methods |
CN111416718A (en) * | 2020-03-13 | 2020-07-14 | 浙江华消科技有限公司 | Method and device for receiving communication key, method and device for sending communication key |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400082A (en) * | 2013-08-16 | 2013-11-20 | 中科创达软件股份有限公司 | File encryption/decryption method and system |
CN103632102A (en) * | 2012-08-21 | 2014-03-12 | 中兴通讯股份有限公司 | Certificate processing method and terminal |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201305841A (en) * | 2011-07-28 | 2013-02-01 | Hon Hai Prec Ind Co Ltd | Computer system, encryption apparatus and method for encryption |
CN204347841U (en) * | 2014-12-31 | 2015-05-20 | 北京华大智宝电子系统有限公司 | A kind of fingerprint identification device |
CN104951704B (en) * | 2015-06-17 | 2018-07-13 | 广州市巽腾信息科技有限公司 | A kind of image information collecting device and its encryption method |
-
2015
- 2015-06-17 CN CN201510337687.2A patent/CN104951704B/en active Active
-
2016
- 2016-05-17 WO PCT/CN2016/082276 patent/WO2016202130A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632102A (en) * | 2012-08-21 | 2014-03-12 | 中兴通讯股份有限公司 | Certificate processing method and terminal |
CN103400082A (en) * | 2013-08-16 | 2013-11-20 | 中科创达软件股份有限公司 | File encryption/decryption method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2016202130A1 (en) | 2016-12-22 |
CN104951704A (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104951704B (en) | A kind of image information collecting device and its encryption method | |
US10375116B2 (en) | System and method to provide server control for access to mobile client data | |
US9628478B2 (en) | Technologies for secure storage and use of biometric authentication information | |
CN104967511B (en) | The processing method and processing device of encryption data | |
CN106330442B (en) | Identity authentication method, device and system | |
CN106612259A (en) | Identity recognition method and device, service information processing method and device and biological feature information processing method and device | |
WO2017063517A1 (en) | Near field communication establishing method and device | |
CN105281907B (en) | Encrypted data processing method and device | |
CN103927470A (en) | File encryption and decryption system and method based on iris recognition | |
CN106161028A (en) | Safety chip, communication terminal and the method improving communication security | |
WO2021047477A1 (en) | Key allocation method and system, mobile terminal and wearable device | |
CN108073820A (en) | Security processing, device and the mobile terminal of data | |
CN105208045A (en) | Identity authentication method, equipment and system | |
CN106355112A (en) | Method of destructing data in encrypted mobile storage device and server | |
CN112564892B (en) | Key distribution method, system and wearable device | |
KR20150100602A (en) | Data storing and reading methods, apparatuses and devices | |
CN108696355B (en) | Method and system for preventing head portrait of user from being embezzled | |
CN111177694B (en) | Method and device for processing data | |
CN107038389A (en) | Data encryption processing method, data deciphering processing method and mobile terminal | |
WO2015131585A1 (en) | Method and device for ensuring sd card security | |
JP2005242471A (en) | Information collection/transfer/acquisition system, information collection controller, information collection control method, program therefor and recording medium recording them | |
CN116582281B (en) | Safe face recognition method, system and equipment based on password technology | |
CN106888318A (en) | A kind of smart mobile phone black box device | |
CN114090988A (en) | Processing method and device | |
WO2017185704A1 (en) | Method and device for secure processing of important contact |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 510000 unit 103, first floor, C2 innovation building, No. 182, science Avenue, Science City, Guangzhou high tech Industrial Development Zone, Guangdong Province Patentee after: Sundang (Guangdong) Technology Co.,Ltd. Address before: 511400, No. 268 West Ring Road, Shiqiao street, Guangzhou, Guangdong, Panyu District Patentee before: GUANGZHOU XUNTENG INFORMATION TECHNOLOGY Co.,Ltd. |
|
CP03 | Change of name, title or address |