CN106209381A - A kind of photo encipher-decipher method and system thereof - Google Patents
A kind of photo encipher-decipher method and system thereof Download PDFInfo
- Publication number
- CN106209381A CN106209381A CN201610546539.6A CN201610546539A CN106209381A CN 106209381 A CN106209381 A CN 106209381A CN 201610546539 A CN201610546539 A CN 201610546539A CN 106209381 A CN106209381 A CN 106209381A
- Authority
- CN
- China
- Prior art keywords
- photo
- encryption
- key
- chip
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of photo encipher-decipher method, comprise the following steps: S1, obtain multiple cryptographic key factor and generate key and be stored in encryption chip;S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or being decrypted according to described key pair encryption photo and obtain original photo;Also disclose a kind of photo encrypting and deciphering system.A kind of photo encipher-decipher method and system thereof in the present invention, key is generated by multiple cryptographic key factors, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to described double secret key photo, all carry out in encryption chip due to encryption process, then can improve the safety and reliability of encryption and decryption photo, improve user and carry out the Consumer's Experience of photo encryption and decryption.The present invention, as a kind of photo encipher-decipher method and system thereof, can be widely applied to information security field.
Description
Technical field
The present invention relates to information security field, especially a kind of photo encipher-decipher method and system thereof.
Background technology
Entering after 21 century, mobile Internet business provides a user with the application that personalization, variation, content are mutual,
Wherein mobile social activity highlights because of socialization's demand, applies abnormal the most fiery.Such as the most wide variety of Twitter, Facebook,
Domestic QQ, wechat, microblogging etc. all have multimedia interactive function, include mobile social including numerous APP application all have bat
According to the function with access camera authority, with this when taking pictures and store photo, there is the risk of leakage.
Presently used photo encryption technology aspect mainly have employed software cryptography mode, when terminal taking completes, logical
Cross encrypting module captured photo is encrypted, after encryption generate cryptograph files, be stored in terminal memory or on
Reach server to preserve.The mode of soft encryption usually arranges a password or cipher code set, can be numerical ciphers, pattern or
Biological characteristic, for user authentication or encryption;Although soft encryption scheme has certain advantage in R&D costs, but mainly
Encryption and decryption performance and security performance on cannot meet growing needs;During because of photo by software cryptography, all fortune
The resource called is required to terminal hardware and operating system provides and supports, very big to the resource occupation of terminal when encryption and decryption,
If terminal software and hardware configuration is relatively low, the most easily cause encryption and decryption failure or the encryption performance problem occurred;The opposing party is thin-skinned
The most effective several encryption factors composition key encryption during part encryption, because of software cryptography process all in terminal system and internal memory, quilt
Wooden horse and Malware are followed the tracks of the probability cracked and are raised, and safety has greater risk.
Summary of the invention
In order to solve above-mentioned technical problem, it is an object of the invention to provide a kind of photo encipher-decipher method and system, institute
Stating photo encipher-decipher method and system can improve the safety of photo encryption, reliability in intelligent terminal, encryption and decryption is to terminal
Resources occupation rate low, improve the encryption and decryption performance of photo.
The technical solution adopted in the present invention is: a kind of photo encipher-decipher method, comprises the following steps:
S1, obtain multiple cryptographic key factor and generate key be stored in encryption chip;
S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or according to described double secret key
Encryption photo is decrypted and obtains original photo.
Further, described step S1 comprises the following steps:
S11, arrange or verify encryption and decryption authentication password using obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal's fix information, effective encryption chip fix information respectively as cryptographic key factor it
One;
S13, according to encryption and decryption authentication password, effective intelligent terminal's fix information, effective encryption chip fix information generate
Key;
S14, by described key storage in encryption chip.
Further, described step S2 comprises the following steps:
S21, establishment temporal cache file;
S22, using original photo or encryption photo put into temporal cache file as temporal cache photo;
S23, encryption chip add firmly according to the original photo in the file of described double secret key temporal cache or encryption photo
Close or firmly decipher;
After S24, hardware encryption or hard successful decryption, delete temporal cache file.
Further, the acquisition methods of described original photo include by different operating path call different cameral obtain,
Intelligent terminal is obtained by wireless receiving or wired importing, and described different cameral includes operating system camera, encryption camera.
Further, described encryption and decryption authentication password includes character, fingerprint, iris image.
Further, described intelligent terminal's fix information includes intelligent terminal's IMEI code, intelligent terminal No. SN, described encryption
Chip fix information includes encryption chip SN.
Further, described a kind of photo encipher-decipher method further comprises the steps of:
S3, checking encryption and decryption authentication password are with managing encrypted photo, including browsing, check, delete, import, deriving.
Of the present invention another solution is that a kind of photo encrypting and deciphering system, including:
First module, is used for obtaining multiple cryptographic key factor and generates key and be stored in encryption chip;
Second module, obtains encrypting photo and/or according to described key for being encrypted according to described double secret key original photo
Encryption photo is decrypted and obtains original photo.
Of the present invention another solution is that a kind of photo encrypting and deciphering system, including intelligent terminal, encryption chip
And processor, described intelligent terminal is connected with processor, and described processor is connected with encryption chip, and described processor is used for holding
OK:
Obtain multiple cryptographic key factor generate key and be stored in encryption chip;
Triggering encryption chip is encrypted according to described double secret key original photo and obtains encrypting photo and/or according to described double secret key
Encryption photo is decrypted and obtains original photo.
Further, described encryption chip includes that encryption/decryption module, chip memory, described encryption/decryption module are deposited with chip
Reservoir connects.
Further, described intelligent terminal include terminal handler, photographic head, wireless communication module, wireless connections module,
Data-interface and terminal memory, described terminal handler respectively with photographic head, wireless communication module, wireless connections module, number
Connect according to interface, terminal memory.
The invention has the beneficial effects as follows: a kind of photo encipher-decipher method in the present invention, generate close by multiple cryptographic key factors
Key, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to described double secret key photo, due to encryption and decryption mistake
Cheng Jun is carried out in encryption chip, then can improve the safety and reliability of encryption and decryption photo, and raising user carries out photo and adds solution
Close Consumer's Experience.
Another of the present invention provides the benefit that: a kind of photo encrypting and deciphering system in the present invention, including the first module and second
Module, described first module generates key according to multiple cryptographic key factors, and by key storage in encryption chip, described second mould
Tuber carries out encryption and decryption according to described double secret key photo, owing to key storage is in encryption chip, improves the safety of encryption and decryption photo
Property.
Another of the present invention provides the benefit that: a kind of photo encrypting and deciphering system in the present invention, including intelligent terminal, encryption core
Sheet and processor, use encryption chip to carry out photo encryption and decryption, completely cut off unauthorized access physically, it is ensured that safety during computing
Property;Photo encryption and decryption all computings in encryption chip simultaneously, few to the resource occupation of intelligent terminal, improve the encryption and decryption of photo
Usefulness.
Accompanying drawing explanation
Below in conjunction with the accompanying drawings the detailed description of the invention of the present invention is described further:
Fig. 1 is the method flow diagram of a kind of photo encipher-decipher method in the present invention;
Fig. 2 is the specific embodiment flow chart of steps encrypting photo in the present invention in a kind of photo encipher-decipher method;
Fig. 3 is the specific embodiment flow chart of steps deciphering photo in the present invention in a kind of photo encipher-decipher method;
Fig. 4 is the photo encryption process schematic diagram of a kind of photo encipher-decipher method in the present invention;
Fig. 5 is the structured flowchart of a kind of photo encrypting and deciphering system in the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment can phases
Combination mutually.
A kind of photo encipher-decipher method, is the method flow of a kind of photo encipher-decipher method in the present invention with reference to Fig. 1, Fig. 1
Figure, comprises the following steps:
S1, obtain multiple cryptographic key factor and generate key be stored in encryption chip;
S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or according to described double secret key
Encryption photo is decrypted and obtains original photo.
In the present embodiment, generating key by multiple cryptographic key factors, described key storage is in encryption chip;Encryption chip
It is encrypted according to double secret key original photo or encryption photo or deciphers;Obtained key by multiple cryptographic key factor, improve and shine
The security performance of sheet encryption and decryption, encryption process is all carried out in encryption chip, completely cuts off unauthorized access physically, it is ensured that computing
Time safety;Encryption and decryption all computings in encryption chip simultaneously, take less to terminal resource, improve the encryption and decryption of photo
Usefulness.
As the further improvement of technical scheme, described step S1 comprises the following steps:
S11, arrange or verify encryption and decryption authentication password using obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal's fix information, effective encryption chip fix information respectively as cryptographic key factor it
One;
S13, according to encryption and decryption authentication password, effective intelligent terminal's fix information, effective encryption chip fix information generate
Key;
S14, by described key storage in encryption chip.
In the present embodiment, described cryptographic key factor includes encryption and decryption authentication password, effective intelligent terminal's fix information, has
The encryption chip fix information of effect, is obtained the key of encryption and decryption photo, improves encryption and decryption photo by multiple different cryptographic key factors
Safety, reliability.It addition, all users of having identify all can making of uniqueness and authentication terminal equipment uniqueness identity characteristic
For forming the cryptographic key factor of key.
As the further improvement of technical scheme, described encryption and decryption authentication password includes character, fingerprint, iris image, institute
State encryption and decryption authentication password by preserving to the data base of intelligent terminal after encryption.
As the further improvement of technical scheme, described intelligent terminal's fix information includes intelligent terminal's IMEI code, intelligence
Terminal SN, described encryption chip fix information includes that the inside that encryption chip SN, encryption chip SN are encryption chip is compiled
Code, every chips has unique No. SN and be made up of 16 bit digital, and the IMEI code of intelligent terminal is added 1 bit check by 14 bit digital
Code composition.
In the present embodiment, reference Fig. 2, Fig. 2 is the tool encrypting photo in the present invention in a kind of photo encipher-decipher method
Body embodiment flow chart of steps, time actually used, makes the photo encryption system being obtained by the present invention run with intelligence eventually
On the operating system of end, before entering photo encryption system, need to arrange the encryption and decryption authentication password of photo encryption system, institute
State encryption and decryption authentication password and carry out safety certification for the user that request is entered photo encryption system, when certification is by just entering
Enter photo encryption system, encryption photo is carried out feature operation and management.Then, interface interchange is passed through on photo encryption system backstage
Obtain intelligent terminal's IMEI code, encryption chip SN, and judge whether described intelligent terminal's IMEI code, encryption chip SN code have
Effect, when intelligent terminal's IMEI code, encryption chip SN are invalid, arrange the failure of encryption and decryption authentication password, otherwise arranges encryption and decryption
Authentication password success.Finally, according to set encryption and decryption authentication password, effective intelligent terminal's fix information, effectively add
The logical operations that close chip fix information is combined, obtains key by complicated computing.
It is the specific embodiment step stream deciphering photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3
Cheng Tu, when user wants that encryption photo is decrypted operation, needs first to ask to enter photo encryption system, needs checking to use
The encryption and decryption authentication password of family input, only when encryption and decryption authentication password is correct, user just can enter photo encryption system, no
Then code error will move out and logs in.After logging in successfully, obtain intelligent terminal's IMEI code and encryption chip SN and judge that it is
No legal effectively, only when intelligent terminal's IMEI code and encryption chip SN are effective, processor just can according to input adding
Decrypted authentication password, intelligent terminal's IMEI code and encryption chip SN generate key.
As the further improvement of technical scheme, described step S2 comprises the following steps:
S21, establishment temporal cache file;
S22, using original photo or encryption photo put into temporal cache file as temporal cache photo;
S23, encryption chip add firmly according to the original photo in the file of described double secret key temporal cache or encryption photo
Close or firmly decipher;
After S24, hardware encryption or hard successful decryption, delete temporal cache file.
In the present embodiment, reference Fig. 4, Fig. 4 is the photo encryption process of a kind of photo encipher-decipher method in the present invention
Schematic diagram, is stored in temporal cache file as temporal cache photo, described temporal cache using original photo or encryption photo
Photo is not supported to be directly viewable, and processor makes encryption chip utilize key to complete former by calling the SDK interface of encryption chip
The encryption of beginning photo or the deciphering to encryption photo, until after encryption and decryption success, delete temporal cache file, described temporarily
Cache file folder is positioned in the terminal memory of intelligent terminal, and described encryption photo, original photo are stored in the end of intelligent terminal
In end memorizer.Time actually used, photo storage uses one piece of memory area at terminal memory, and this memory area can
For storing the original photo captured by operating system camera, encryption camera, produced slow when encryption photo and encryption and decryption
Deposit data;The amount of capacity of described memory area determines (dynamically to become with the capacity of terminal memory according to terminal memory size
Change).Encryption chip supports multiple domestic and international AES (AES, DES, RSA, SM2, SM3, SM4 etc.), different by calling
AES interface obtains different AESs, carries out photo encryption and decryption after having initialized.
It is the specific embodiment step stream encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2
Cheng Tu, is stored in original photo in the file of temporal cache, encryption chip according to key by the caching in the file of temporal cache
Photo after photo is encrypted preserves to terminal memory.After photo has been encrypted, read the closing tag of encryption photo, sentence
Disconnected photo encryption is the most successful, if encrypting successfully, will delete temporal cache file, will photograph successful to unencryption if unsuccessful
Sheet is encrypted again, encrypts successful photo and can be saved in photo encryption system and normally show preview.Encryption photo makes
Preserve by ciphertext, will not normally be read and show in the picture library of intelligent terminal operation system, need by export function, will
Encryption photo is derived to (derivation process is exactly a decrypting process) in intelligent terminal operation system, could normal preview show.
It is the specific embodiment step stream deciphering photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3
Cheng Tu, is stored in encryption photo in the file of temporal cache, encryption chip according to key by the caching in the file of temporal cache
Photo after photo is decrypted preserves to terminal memory.After photo has been deciphered, read the closing tag of deciphering photo, sentence
Disconnected photo deciphering is the most successful, if successful decryption, will delete temporal cache file, if unsuccessful, then to non-successful decryption
Photo re-starts deciphering, and the photo of successful decryption preserves the picture library to intelligent terminal operation system, normally can show in picture library
Show preview.
Encryption process use cache file folder preserve encryption and decryption photo, when encryption and decryption is failed or in encryption and decryption power-off
Photo can be prevented effectively from damage or lose abnormal;It addition, the encryption process of photo only occurs in encryption chip.It is not take up intelligence
The resource of energy terminal, it is also possible to improve the security performance of photo encryption and decryption.
As the further improvement of technical scheme, the acquisition methods of described original photo includes being adjusted by different operating path
Being obtained by wireless receiving or wired importing with different cameral acquisition, intelligent terminal, described different cameral includes operating system
Camera, encryption camera.
In the present embodiment, reference Fig. 2, Fig. 2 is the tool encrypting photo in the present invention in a kind of photo encipher-decipher method
Body embodiment flow chart of steps, is generating before key, opens camera and takes pictures acquisition original photo, by the operation of intelligent terminal
Photo captured by system camera is deposited to the picture library of intelligent terminal, and original photo needs just to enter encryption photo by importing
System, needs first to create a temporal cache file before photo encryption, and original photo can first be directed into temporal cache file
As caching photo, and encrypting camera is directly to be stored in captured photo in the file of temporal cache to shine as caching
Sheet.Furthermore it is also possible to obtain original photo by intelligent terminal's wireless receiving or wired importing, described original photo is stored in behaviour
Make in the picture library of system, when needing to encrypt original photo, temporal cache file can be imported and be encrypted.
As the further improvement of technical scheme, described a kind of photo encipher-decipher method further comprises the steps of:
S3, checking encryption and decryption authentication password are with managing encrypted photo, including browsing, check, delete, import, deriving.
In the present embodiment, photo encryption system include encrypt photo management function, enter encryption the photo management page it
Before, need to carry out authentication, only input correct encryption and decryption authentication password and just can show the encryption photo management page, encryption
Encryption photo could can be browsed, check, delete, lead by interface display after entering encryption photo management interface by photo
The operation such as go out, it is also possible to original photo is imported photo encryption phychology, an importing process encryption original photo in fact
Process.
Photo generation, photo encryption and decryption, photo management are integrated in photo encryption system by the present invention effectively, solve
The safety problem of photo storage, carries out encryption and decryption process by encryption chip and ensure that the safety of photo, reliability and add solution
Close effectiveness, simplifies user operation, improves Consumer's Experience.
A kind of photo encrypting and deciphering system, including:
First module, is used for obtaining multiple cryptographic key factor and generates key and be stored in encryption chip;
Second module, obtains encrypting photo and/or according to described key for being encrypted according to described double secret key original photo
Encryption photo is decrypted and obtains original photo.
In the present embodiment, a kind of photo encrypting and deciphering system includes the first module, the second module, and the logical acquisition of the first module is multiple
Cryptographic key factor generates key and is stored in encryption chip, and encryption chip stops extraneous program and application accesses, it is ensured that close
The safety of key;Second module carries out photo encryption and decryption according to described key.
A kind of photo encrypting and deciphering system, is the structured flowchart of a kind of photo encrypting and deciphering system in the present invention with reference to Fig. 5, Fig. 5,
Including intelligent terminal, encryption chip and processor, described intelligent terminal is connected with processor, and described processor is with encryption chip even
Connecing, described processor is used for performing:
Obtain multiple cryptographic key factor generate key and be stored in encryption chip;
Triggering encryption chip is encrypted according to described double secret key original photo and obtains encrypting photo and/or according to described double secret key
Encryption photo is decrypted and obtains original photo.
In the present embodiment, the processor of photo encryption system generates key by obtaining multiple cryptographic key factors, and by it
Being stored in encryption chip, described encryption chip is encrypted according to double secret key original photo or encryption photo or deciphers.
Being obtained key by multiple cryptographic key factor, improve the security performance of photo encryption and decryption, encryption process is all carried out in encryption chip,
Completely cut off unauthorized access physically, it is ensured that safety during computing;Encryption and decryption all computings in encryption chip simultaneously, provide terminal
Source takies less, improves the encryption and decryption usefulness of photo.
As the further improvement of technical scheme, described encryption chip includes encryption/decryption module, chip memory, described in add
Deciphering module is connected with chip memory.
In the present embodiment, encryption/decryption module be encrypted according to described double secret key original photo obtain encrypt photo and/
Or be decrypted according to described key pair encryption photo and to obtain original photo;Chip memory is responsible for storing key.Outside journey
Sequence and application can not arbitrarily access the chip memory of encryption chip, need the interface using regulation to access, encryption and decryption mould
Block obtains key by chip peculiar interface accessing chip memory, for encryption and decryption, it is ensured that key and encryption process
Safety.
As the further improvement of technical scheme, described intelligent terminal includes terminal handler, photographic head, wireless telecommunications mould
Block, wireless connections module, data-interface and terminal memory, described terminal handler respectively with photographic head, wireless communication module,
Wireless connections module, data-interface, terminal memory connect.
In the present embodiment, terminal handler is as the information processing centre of intelligent terminal and control centre, described process
Device can be integrated with terminal handler;Described photographic head is for shooting to obtain original photo;Wireless communication module is used for
Wireless network communication, wireless communication module includes 2G communication module, 3G communication module, 4G communication module, can be used for the behaviour such as online
Make;Wireless connections module connects for wireless data, and wireless connections module includes bluetooth module, WiFi module, described channel radio
News module, wireless connections module can be used for obtaining original photo.It addition, data-interface includes usb data interface it can also be used to count
According to transmission, in the present embodiment, can be used for transmitting original photo.
Described terminal memory is used for storing photo, and when actually used, storage photo uses at terminal memory
One piece of memory area, this memory area can be used for storing operating system camera, encryption original photo captured by camera, encryption
When photo and encryption and decryption produced data cached.
The present invention is integrated encryption chip in intelligent terminal, the key obtained by multiple cryptographic key factors, and utilize its with
The photo that different paths are obtained by the mode that soft or hard combines carries out hardware encryption, firmly deciphers, simultaneously can be right in photo encryption system
The photo encrypted is managed.Solve the safety problem of the photo that intelligent terminal is stored, it is to avoid photo is by intelligent terminal
Other application software illegally read, in photo encryption system, integrated encryption camera and photo management function, add operation
Safety and experience, have positive effect in terms of protection privacy of user.
It is above the preferably enforcement of the present invention is illustrated, but the invention is not limited to described enforcement
Example, those of ordinary skill in the art it may also be made that all equivalent variations on the premise of spirit of the present invention or replacing
Changing, deformation or the replacement of these equivalents are all contained in the application claim limited range.
Claims (11)
1. a photo encipher-decipher method, it is characterised in that comprise the following steps:
S1, obtain multiple cryptographic key factor and generate key be stored in encryption chip;
S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or according to described double secret key
Encryption photo is decrypted and obtains original photo.
A kind of photo encipher-decipher method the most according to claim 1, it is characterised in that described step S1 includes following step
Rapid:
S11, arrange or verify encryption and decryption authentication password using obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal's fix information, effective encryption chip fix information respectively as cryptographic key factor it
One;
S13, according to encryption and decryption authentication password, effective intelligent terminal's fix information, effective encryption chip fix information generate
Key;
S14, by described key storage in encryption chip.
A kind of photo encipher-decipher method the most according to claim 1, it is characterised in that described step S2 includes following step
Rapid:
S21, establishment temporal cache file;
S22, using original photo or encryption photo put into temporal cache file as temporal cache photo;
S23, encryption chip add firmly according to the original photo in the file of described double secret key temporal cache or encryption photo
Close or firmly decipher;
After S24, hardware encryption or hard successful decryption, delete temporal cache file.
4. according to a kind of photo encipher-decipher method described in any one of claims 1 to 3, it is characterised in that described original photo
Acquisition methods include being called by different operating path that different cameral obtains, intelligent terminal is by wireless receiving or wired leads
Entering to obtain, described different cameral includes operating system camera, encryption camera.
A kind of photo encipher-decipher method the most according to claim 2, it is characterised in that described encryption and decryption authentication password includes
Character, fingerprint, iris image.
A kind of photo encipher-decipher method the most according to claim 5, it is characterised in that described intelligent terminal's fix information bag
Including intelligent terminal's IMEI code, intelligent terminal No. SN, described encryption chip fix information includes encryption chip SN.
7. according to a kind of photo encipher-decipher method described in claim 2,5 or 6, it is characterised in that further comprise the steps of:
S3, checking encryption and decryption authentication password are with managing encrypted photo, including browsing, check, delete, import, deriving.
8. a photo encrypting and deciphering system, it is characterised in that including:
First module, is used for obtaining multiple cryptographic key factor and generates key and be stored in encryption chip;
Second module, obtains encrypting photo and/or according to described key for being encrypted according to described double secret key original photo
Encryption photo is decrypted and obtains original photo.
9. a photo encrypting and deciphering system, it is characterised in that including intelligent terminal, encryption chip and processor, described intelligence is eventually
End is connected with processor, and described processor is connected with encryption chip, and described processor is used for performing:
Obtain multiple cryptographic key factor generate key and be stored in encryption chip;
Triggering encryption chip is encrypted according to described double secret key original photo and obtains encrypting photo and/or according to described double secret key
Encryption photo is decrypted and obtains original photo.
A kind of photo encrypting and deciphering system the most according to claim 9, it is characterised in that described encryption chip includes adding solution
Close module, chip memory, described encryption/decryption module is connected with chip memory.
11. a kind of photo encrypting and deciphering systems according to claim 9, it is characterised in that described intelligent terminal includes terminal
Processor, photographic head, wireless communication module, wireless connections module, data-interface and terminal memory, described terminal handler divides
It is not connected with photographic head, wireless communication module, wireless connections module, data-interface, terminal memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610546539.6A CN106209381B (en) | 2016-07-12 | 2016-07-12 | A kind of photo encipher-decipher method and its system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610546539.6A CN106209381B (en) | 2016-07-12 | 2016-07-12 | A kind of photo encipher-decipher method and its system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209381A true CN106209381A (en) | 2016-12-07 |
CN106209381B CN106209381B (en) | 2019-04-26 |
Family
ID=57476435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610546539.6A Active CN106209381B (en) | 2016-07-12 | 2016-07-12 | A kind of photo encipher-decipher method and its system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209381B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145563A (en) * | 2018-08-13 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of auth method and device |
CN111711515A (en) * | 2020-05-18 | 2020-09-25 | 冠群信息技术(南京)有限公司 | Three-party AES key synthesis method, encryption method and decryption method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102419805A (en) * | 2011-11-22 | 2012-04-18 | 中兴通讯股份有限公司 | Terminal equipment and method for encrypting user information |
CN103020504A (en) * | 2012-12-03 | 2013-04-03 | 鹤山世达光电科技有限公司 | Image management system and image management method based on fingerprint identification |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103559453A (en) * | 2013-05-23 | 2014-02-05 | 深圳市中易通网络技术有限公司 | Hardware encryption protection method and system for cellphone data |
CN104683978A (en) * | 2015-03-27 | 2015-06-03 | 襄阳泰凯电子有限公司 | Mobile phone stored information encryption device and method |
CN105160264A (en) * | 2015-09-29 | 2015-12-16 | 努比亚技术有限公司 | Photograph encryption device and method |
CN105260669A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Transmission method and system of pictures |
CN105354501A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo processing method and processing system |
-
2016
- 2016-07-12 CN CN201610546539.6A patent/CN106209381B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102419805A (en) * | 2011-11-22 | 2012-04-18 | 中兴通讯股份有限公司 | Terminal equipment and method for encrypting user information |
CN103020504A (en) * | 2012-12-03 | 2013-04-03 | 鹤山世达光电科技有限公司 | Image management system and image management method based on fingerprint identification |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103559453A (en) * | 2013-05-23 | 2014-02-05 | 深圳市中易通网络技术有限公司 | Hardware encryption protection method and system for cellphone data |
CN104683978A (en) * | 2015-03-27 | 2015-06-03 | 襄阳泰凯电子有限公司 | Mobile phone stored information encryption device and method |
CN105160264A (en) * | 2015-09-29 | 2015-12-16 | 努比亚技术有限公司 | Photograph encryption device and method |
CN105260669A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Transmission method and system of pictures |
CN105354501A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo processing method and processing system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145563A (en) * | 2018-08-13 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of auth method and device |
CN109145563B (en) * | 2018-08-13 | 2022-04-22 | 创新先进技术有限公司 | Identity verification method and device |
CN111711515A (en) * | 2020-05-18 | 2020-09-25 | 冠群信息技术(南京)有限公司 | Three-party AES key synthesis method, encryption method and decryption method |
CN111711515B (en) * | 2020-05-18 | 2022-04-26 | 冠群信息技术(南京)有限公司 | Three-party AES key synthesis method, encryption method and decryption method |
Also Published As
Publication number | Publication date |
---|---|
CN106209381B (en) | 2019-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10659226B2 (en) | Data encryption method, decryption method, apparatus, and system | |
US20050235143A1 (en) | Mobile network authentication for protection stored content | |
WO2006109307A2 (en) | Method, device, and system of selectively accessing data | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
CN102781001A (en) | Method for encrypting built-in file of mobile terminal and mobile terminal | |
CN103246850A (en) | Method and device for processing file | |
CN105653986B (en) | A kind of data guard method and device based on microSD card | |
CN106997439A (en) | TrustZone-based data encryption and decryption method and device and terminal equipment | |
CN103378971B (en) | A kind of data encryption system and method | |
US11227041B2 (en) | Identification service based authorization | |
WO2013182154A1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN104769983A (en) | Methods and apparatus for managing data within a secure element | |
CN113541935B (en) | Encryption cloud storage method, system, equipment and terminal supporting key escrow | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN106992851A (en) | TrustZone-based database file password encryption and decryption method and device and terminal equipment | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
CN111566989B (en) | Key processing method and device | |
CN103577769A (en) | File content safety management method and management system | |
KR100594886B1 (en) | System and Method for Security of Database | |
CN106209381B (en) | A kind of photo encipher-decipher method and its system | |
US8234501B2 (en) | System and method of controlling access to a device | |
CN102761559B (en) | Network security based on private data shares method and communication terminal | |
WO2015090055A1 (en) | Method, device and apparatus for storing and reading data | |
CN111628864A (en) | Method for carrying out secret key safety recovery by using SIM card | |
KR101329789B1 (en) | Encryption Method of Database of Mobile Communication Device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210909 Address after: 518000 1310, Tianming science and technology building, No. 8, wushitou Road, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after: Zhongyitong Technology Co.,Ltd. Address before: 518000 tower 501, tower a, Jiada R & D building, No. 5, songpingshan Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Patentee before: SHENZHEN ZHONGYITONG SECURITY CORE TECHNOLOGY Co.,Ltd. |