CN106209381A - A kind of photo encipher-decipher method and system thereof - Google Patents

A kind of photo encipher-decipher method and system thereof Download PDF

Info

Publication number
CN106209381A
CN106209381A CN201610546539.6A CN201610546539A CN106209381A CN 106209381 A CN106209381 A CN 106209381A CN 201610546539 A CN201610546539 A CN 201610546539A CN 106209381 A CN106209381 A CN 106209381A
Authority
CN
China
Prior art keywords
photo
encryption
key
chip
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610546539.6A
Other languages
Chinese (zh)
Other versions
CN106209381B (en
Inventor
刘美云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongyitong Technology Co.,Ltd.
Original Assignee
Shenzhen Zhongyitong Security Core Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongyitong Security Core Technology Co Ltd filed Critical Shenzhen Zhongyitong Security Core Technology Co Ltd
Priority to CN201610546539.6A priority Critical patent/CN106209381B/en
Publication of CN106209381A publication Critical patent/CN106209381A/en
Application granted granted Critical
Publication of CN106209381B publication Critical patent/CN106209381B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of photo encipher-decipher method, comprise the following steps: S1, obtain multiple cryptographic key factor and generate key and be stored in encryption chip;S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or being decrypted according to described key pair encryption photo and obtain original photo;Also disclose a kind of photo encrypting and deciphering system.A kind of photo encipher-decipher method and system thereof in the present invention, key is generated by multiple cryptographic key factors, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to described double secret key photo, all carry out in encryption chip due to encryption process, then can improve the safety and reliability of encryption and decryption photo, improve user and carry out the Consumer's Experience of photo encryption and decryption.The present invention, as a kind of photo encipher-decipher method and system thereof, can be widely applied to information security field.

Description

A kind of photo encipher-decipher method and system thereof
Technical field
The present invention relates to information security field, especially a kind of photo encipher-decipher method and system thereof.
Background technology
Entering after 21 century, mobile Internet business provides a user with the application that personalization, variation, content are mutual, Wherein mobile social activity highlights because of socialization's demand, applies abnormal the most fiery.Such as the most wide variety of Twitter, Facebook, Domestic QQ, wechat, microblogging etc. all have multimedia interactive function, include mobile social including numerous APP application all have bat According to the function with access camera authority, with this when taking pictures and store photo, there is the risk of leakage.
Presently used photo encryption technology aspect mainly have employed software cryptography mode, when terminal taking completes, logical Cross encrypting module captured photo is encrypted, after encryption generate cryptograph files, be stored in terminal memory or on Reach server to preserve.The mode of soft encryption usually arranges a password or cipher code set, can be numerical ciphers, pattern or Biological characteristic, for user authentication or encryption;Although soft encryption scheme has certain advantage in R&D costs, but mainly Encryption and decryption performance and security performance on cannot meet growing needs;During because of photo by software cryptography, all fortune The resource called is required to terminal hardware and operating system provides and supports, very big to the resource occupation of terminal when encryption and decryption, If terminal software and hardware configuration is relatively low, the most easily cause encryption and decryption failure or the encryption performance problem occurred;The opposing party is thin-skinned The most effective several encryption factors composition key encryption during part encryption, because of software cryptography process all in terminal system and internal memory, quilt Wooden horse and Malware are followed the tracks of the probability cracked and are raised, and safety has greater risk.
Summary of the invention
In order to solve above-mentioned technical problem, it is an object of the invention to provide a kind of photo encipher-decipher method and system, institute Stating photo encipher-decipher method and system can improve the safety of photo encryption, reliability in intelligent terminal, encryption and decryption is to terminal Resources occupation rate low, improve the encryption and decryption performance of photo.
The technical solution adopted in the present invention is: a kind of photo encipher-decipher method, comprises the following steps:
S1, obtain multiple cryptographic key factor and generate key be stored in encryption chip;
S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or according to described double secret key Encryption photo is decrypted and obtains original photo.
Further, described step S1 comprises the following steps:
S11, arrange or verify encryption and decryption authentication password using obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal's fix information, effective encryption chip fix information respectively as cryptographic key factor it One;
S13, according to encryption and decryption authentication password, effective intelligent terminal's fix information, effective encryption chip fix information generate Key;
S14, by described key storage in encryption chip.
Further, described step S2 comprises the following steps:
S21, establishment temporal cache file;
S22, using original photo or encryption photo put into temporal cache file as temporal cache photo;
S23, encryption chip add firmly according to the original photo in the file of described double secret key temporal cache or encryption photo Close or firmly decipher;
After S24, hardware encryption or hard successful decryption, delete temporal cache file.
Further, the acquisition methods of described original photo include by different operating path call different cameral obtain, Intelligent terminal is obtained by wireless receiving or wired importing, and described different cameral includes operating system camera, encryption camera.
Further, described encryption and decryption authentication password includes character, fingerprint, iris image.
Further, described intelligent terminal's fix information includes intelligent terminal's IMEI code, intelligent terminal No. SN, described encryption Chip fix information includes encryption chip SN.
Further, described a kind of photo encipher-decipher method further comprises the steps of:
S3, checking encryption and decryption authentication password are with managing encrypted photo, including browsing, check, delete, import, deriving.
Of the present invention another solution is that a kind of photo encrypting and deciphering system, including:
First module, is used for obtaining multiple cryptographic key factor and generates key and be stored in encryption chip;
Second module, obtains encrypting photo and/or according to described key for being encrypted according to described double secret key original photo Encryption photo is decrypted and obtains original photo.
Of the present invention another solution is that a kind of photo encrypting and deciphering system, including intelligent terminal, encryption chip And processor, described intelligent terminal is connected with processor, and described processor is connected with encryption chip, and described processor is used for holding OK:
Obtain multiple cryptographic key factor generate key and be stored in encryption chip;
Triggering encryption chip is encrypted according to described double secret key original photo and obtains encrypting photo and/or according to described double secret key Encryption photo is decrypted and obtains original photo.
Further, described encryption chip includes that encryption/decryption module, chip memory, described encryption/decryption module are deposited with chip Reservoir connects.
Further, described intelligent terminal include terminal handler, photographic head, wireless communication module, wireless connections module, Data-interface and terminal memory, described terminal handler respectively with photographic head, wireless communication module, wireless connections module, number Connect according to interface, terminal memory.
The invention has the beneficial effects as follows: a kind of photo encipher-decipher method in the present invention, generate close by multiple cryptographic key factors Key, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to described double secret key photo, due to encryption and decryption mistake Cheng Jun is carried out in encryption chip, then can improve the safety and reliability of encryption and decryption photo, and raising user carries out photo and adds solution Close Consumer's Experience.
Another of the present invention provides the benefit that: a kind of photo encrypting and deciphering system in the present invention, including the first module and second Module, described first module generates key according to multiple cryptographic key factors, and by key storage in encryption chip, described second mould Tuber carries out encryption and decryption according to described double secret key photo, owing to key storage is in encryption chip, improves the safety of encryption and decryption photo Property.
Another of the present invention provides the benefit that: a kind of photo encrypting and deciphering system in the present invention, including intelligent terminal, encryption core Sheet and processor, use encryption chip to carry out photo encryption and decryption, completely cut off unauthorized access physically, it is ensured that safety during computing Property;Photo encryption and decryption all computings in encryption chip simultaneously, few to the resource occupation of intelligent terminal, improve the encryption and decryption of photo Usefulness.
Accompanying drawing explanation
Below in conjunction with the accompanying drawings the detailed description of the invention of the present invention is described further:
Fig. 1 is the method flow diagram of a kind of photo encipher-decipher method in the present invention;
Fig. 2 is the specific embodiment flow chart of steps encrypting photo in the present invention in a kind of photo encipher-decipher method;
Fig. 3 is the specific embodiment flow chart of steps deciphering photo in the present invention in a kind of photo encipher-decipher method;
Fig. 4 is the photo encryption process schematic diagram of a kind of photo encipher-decipher method in the present invention;
Fig. 5 is the structured flowchart of a kind of photo encrypting and deciphering system in the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment can phases Combination mutually.
A kind of photo encipher-decipher method, is the method flow of a kind of photo encipher-decipher method in the present invention with reference to Fig. 1, Fig. 1 Figure, comprises the following steps:
S1, obtain multiple cryptographic key factor and generate key be stored in encryption chip;
S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or according to described double secret key Encryption photo is decrypted and obtains original photo.
In the present embodiment, generating key by multiple cryptographic key factors, described key storage is in encryption chip;Encryption chip It is encrypted according to double secret key original photo or encryption photo or deciphers;Obtained key by multiple cryptographic key factor, improve and shine The security performance of sheet encryption and decryption, encryption process is all carried out in encryption chip, completely cuts off unauthorized access physically, it is ensured that computing Time safety;Encryption and decryption all computings in encryption chip simultaneously, take less to terminal resource, improve the encryption and decryption of photo Usefulness.
As the further improvement of technical scheme, described step S1 comprises the following steps:
S11, arrange or verify encryption and decryption authentication password using obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal's fix information, effective encryption chip fix information respectively as cryptographic key factor it One;
S13, according to encryption and decryption authentication password, effective intelligent terminal's fix information, effective encryption chip fix information generate Key;
S14, by described key storage in encryption chip.
In the present embodiment, described cryptographic key factor includes encryption and decryption authentication password, effective intelligent terminal's fix information, has The encryption chip fix information of effect, is obtained the key of encryption and decryption photo, improves encryption and decryption photo by multiple different cryptographic key factors Safety, reliability.It addition, all users of having identify all can making of uniqueness and authentication terminal equipment uniqueness identity characteristic For forming the cryptographic key factor of key.
As the further improvement of technical scheme, described encryption and decryption authentication password includes character, fingerprint, iris image, institute State encryption and decryption authentication password by preserving to the data base of intelligent terminal after encryption.
As the further improvement of technical scheme, described intelligent terminal's fix information includes intelligent terminal's IMEI code, intelligence Terminal SN, described encryption chip fix information includes that the inside that encryption chip SN, encryption chip SN are encryption chip is compiled Code, every chips has unique No. SN and be made up of 16 bit digital, and the IMEI code of intelligent terminal is added 1 bit check by 14 bit digital Code composition.
In the present embodiment, reference Fig. 2, Fig. 2 is the tool encrypting photo in the present invention in a kind of photo encipher-decipher method Body embodiment flow chart of steps, time actually used, makes the photo encryption system being obtained by the present invention run with intelligence eventually On the operating system of end, before entering photo encryption system, need to arrange the encryption and decryption authentication password of photo encryption system, institute State encryption and decryption authentication password and carry out safety certification for the user that request is entered photo encryption system, when certification is by just entering Enter photo encryption system, encryption photo is carried out feature operation and management.Then, interface interchange is passed through on photo encryption system backstage Obtain intelligent terminal's IMEI code, encryption chip SN, and judge whether described intelligent terminal's IMEI code, encryption chip SN code have Effect, when intelligent terminal's IMEI code, encryption chip SN are invalid, arrange the failure of encryption and decryption authentication password, otherwise arranges encryption and decryption Authentication password success.Finally, according to set encryption and decryption authentication password, effective intelligent terminal's fix information, effectively add The logical operations that close chip fix information is combined, obtains key by complicated computing.
It is the specific embodiment step stream deciphering photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3 Cheng Tu, when user wants that encryption photo is decrypted operation, needs first to ask to enter photo encryption system, needs checking to use The encryption and decryption authentication password of family input, only when encryption and decryption authentication password is correct, user just can enter photo encryption system, no Then code error will move out and logs in.After logging in successfully, obtain intelligent terminal's IMEI code and encryption chip SN and judge that it is No legal effectively, only when intelligent terminal's IMEI code and encryption chip SN are effective, processor just can according to input adding Decrypted authentication password, intelligent terminal's IMEI code and encryption chip SN generate key.
As the further improvement of technical scheme, described step S2 comprises the following steps:
S21, establishment temporal cache file;
S22, using original photo or encryption photo put into temporal cache file as temporal cache photo;
S23, encryption chip add firmly according to the original photo in the file of described double secret key temporal cache or encryption photo Close or firmly decipher;
After S24, hardware encryption or hard successful decryption, delete temporal cache file.
In the present embodiment, reference Fig. 4, Fig. 4 is the photo encryption process of a kind of photo encipher-decipher method in the present invention Schematic diagram, is stored in temporal cache file as temporal cache photo, described temporal cache using original photo or encryption photo Photo is not supported to be directly viewable, and processor makes encryption chip utilize key to complete former by calling the SDK interface of encryption chip The encryption of beginning photo or the deciphering to encryption photo, until after encryption and decryption success, delete temporal cache file, described temporarily Cache file folder is positioned in the terminal memory of intelligent terminal, and described encryption photo, original photo are stored in the end of intelligent terminal In end memorizer.Time actually used, photo storage uses one piece of memory area at terminal memory, and this memory area can For storing the original photo captured by operating system camera, encryption camera, produced slow when encryption photo and encryption and decryption Deposit data;The amount of capacity of described memory area determines (dynamically to become with the capacity of terminal memory according to terminal memory size Change).Encryption chip supports multiple domestic and international AES (AES, DES, RSA, SM2, SM3, SM4 etc.), different by calling AES interface obtains different AESs, carries out photo encryption and decryption after having initialized.
It is the specific embodiment step stream encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2 Cheng Tu, is stored in original photo in the file of temporal cache, encryption chip according to key by the caching in the file of temporal cache Photo after photo is encrypted preserves to terminal memory.After photo has been encrypted, read the closing tag of encryption photo, sentence Disconnected photo encryption is the most successful, if encrypting successfully, will delete temporal cache file, will photograph successful to unencryption if unsuccessful Sheet is encrypted again, encrypts successful photo and can be saved in photo encryption system and normally show preview.Encryption photo makes Preserve by ciphertext, will not normally be read and show in the picture library of intelligent terminal operation system, need by export function, will Encryption photo is derived to (derivation process is exactly a decrypting process) in intelligent terminal operation system, could normal preview show.
It is the specific embodiment step stream deciphering photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3 Cheng Tu, is stored in encryption photo in the file of temporal cache, encryption chip according to key by the caching in the file of temporal cache Photo after photo is decrypted preserves to terminal memory.After photo has been deciphered, read the closing tag of deciphering photo, sentence Disconnected photo deciphering is the most successful, if successful decryption, will delete temporal cache file, if unsuccessful, then to non-successful decryption Photo re-starts deciphering, and the photo of successful decryption preserves the picture library to intelligent terminal operation system, normally can show in picture library Show preview.
Encryption process use cache file folder preserve encryption and decryption photo, when encryption and decryption is failed or in encryption and decryption power-off Photo can be prevented effectively from damage or lose abnormal;It addition, the encryption process of photo only occurs in encryption chip.It is not take up intelligence The resource of energy terminal, it is also possible to improve the security performance of photo encryption and decryption.
As the further improvement of technical scheme, the acquisition methods of described original photo includes being adjusted by different operating path Being obtained by wireless receiving or wired importing with different cameral acquisition, intelligent terminal, described different cameral includes operating system Camera, encryption camera.
In the present embodiment, reference Fig. 2, Fig. 2 is the tool encrypting photo in the present invention in a kind of photo encipher-decipher method Body embodiment flow chart of steps, is generating before key, opens camera and takes pictures acquisition original photo, by the operation of intelligent terminal Photo captured by system camera is deposited to the picture library of intelligent terminal, and original photo needs just to enter encryption photo by importing System, needs first to create a temporal cache file before photo encryption, and original photo can first be directed into temporal cache file As caching photo, and encrypting camera is directly to be stored in captured photo in the file of temporal cache to shine as caching Sheet.Furthermore it is also possible to obtain original photo by intelligent terminal's wireless receiving or wired importing, described original photo is stored in behaviour Make in the picture library of system, when needing to encrypt original photo, temporal cache file can be imported and be encrypted.
As the further improvement of technical scheme, described a kind of photo encipher-decipher method further comprises the steps of:
S3, checking encryption and decryption authentication password are with managing encrypted photo, including browsing, check, delete, import, deriving.
In the present embodiment, photo encryption system include encrypt photo management function, enter encryption the photo management page it Before, need to carry out authentication, only input correct encryption and decryption authentication password and just can show the encryption photo management page, encryption Encryption photo could can be browsed, check, delete, lead by interface display after entering encryption photo management interface by photo The operation such as go out, it is also possible to original photo is imported photo encryption phychology, an importing process encryption original photo in fact Process.
Photo generation, photo encryption and decryption, photo management are integrated in photo encryption system by the present invention effectively, solve The safety problem of photo storage, carries out encryption and decryption process by encryption chip and ensure that the safety of photo, reliability and add solution Close effectiveness, simplifies user operation, improves Consumer's Experience.
A kind of photo encrypting and deciphering system, including:
First module, is used for obtaining multiple cryptographic key factor and generates key and be stored in encryption chip;
Second module, obtains encrypting photo and/or according to described key for being encrypted according to described double secret key original photo Encryption photo is decrypted and obtains original photo.
In the present embodiment, a kind of photo encrypting and deciphering system includes the first module, the second module, and the logical acquisition of the first module is multiple Cryptographic key factor generates key and is stored in encryption chip, and encryption chip stops extraneous program and application accesses, it is ensured that close The safety of key;Second module carries out photo encryption and decryption according to described key.
A kind of photo encrypting and deciphering system, is the structured flowchart of a kind of photo encrypting and deciphering system in the present invention with reference to Fig. 5, Fig. 5, Including intelligent terminal, encryption chip and processor, described intelligent terminal is connected with processor, and described processor is with encryption chip even Connecing, described processor is used for performing:
Obtain multiple cryptographic key factor generate key and be stored in encryption chip;
Triggering encryption chip is encrypted according to described double secret key original photo and obtains encrypting photo and/or according to described double secret key Encryption photo is decrypted and obtains original photo.
In the present embodiment, the processor of photo encryption system generates key by obtaining multiple cryptographic key factors, and by it Being stored in encryption chip, described encryption chip is encrypted according to double secret key original photo or encryption photo or deciphers. Being obtained key by multiple cryptographic key factor, improve the security performance of photo encryption and decryption, encryption process is all carried out in encryption chip, Completely cut off unauthorized access physically, it is ensured that safety during computing;Encryption and decryption all computings in encryption chip simultaneously, provide terminal Source takies less, improves the encryption and decryption usefulness of photo.
As the further improvement of technical scheme, described encryption chip includes encryption/decryption module, chip memory, described in add Deciphering module is connected with chip memory.
In the present embodiment, encryption/decryption module be encrypted according to described double secret key original photo obtain encrypt photo and/ Or be decrypted according to described key pair encryption photo and to obtain original photo;Chip memory is responsible for storing key.Outside journey Sequence and application can not arbitrarily access the chip memory of encryption chip, need the interface using regulation to access, encryption and decryption mould Block obtains key by chip peculiar interface accessing chip memory, for encryption and decryption, it is ensured that key and encryption process Safety.
As the further improvement of technical scheme, described intelligent terminal includes terminal handler, photographic head, wireless telecommunications mould Block, wireless connections module, data-interface and terminal memory, described terminal handler respectively with photographic head, wireless communication module, Wireless connections module, data-interface, terminal memory connect.
In the present embodiment, terminal handler is as the information processing centre of intelligent terminal and control centre, described process Device can be integrated with terminal handler;Described photographic head is for shooting to obtain original photo;Wireless communication module is used for Wireless network communication, wireless communication module includes 2G communication module, 3G communication module, 4G communication module, can be used for the behaviour such as online Make;Wireless connections module connects for wireless data, and wireless connections module includes bluetooth module, WiFi module, described channel radio News module, wireless connections module can be used for obtaining original photo.It addition, data-interface includes usb data interface it can also be used to count According to transmission, in the present embodiment, can be used for transmitting original photo.
Described terminal memory is used for storing photo, and when actually used, storage photo uses at terminal memory One piece of memory area, this memory area can be used for storing operating system camera, encryption original photo captured by camera, encryption When photo and encryption and decryption produced data cached.
The present invention is integrated encryption chip in intelligent terminal, the key obtained by multiple cryptographic key factors, and utilize its with The photo that different paths are obtained by the mode that soft or hard combines carries out hardware encryption, firmly deciphers, simultaneously can be right in photo encryption system The photo encrypted is managed.Solve the safety problem of the photo that intelligent terminal is stored, it is to avoid photo is by intelligent terminal Other application software illegally read, in photo encryption system, integrated encryption camera and photo management function, add operation Safety and experience, have positive effect in terms of protection privacy of user.
It is above the preferably enforcement of the present invention is illustrated, but the invention is not limited to described enforcement Example, those of ordinary skill in the art it may also be made that all equivalent variations on the premise of spirit of the present invention or replacing Changing, deformation or the replacement of these equivalents are all contained in the application claim limited range.

Claims (11)

1. a photo encipher-decipher method, it is characterised in that comprise the following steps:
S1, obtain multiple cryptographic key factor and generate key be stored in encryption chip;
S2, encryption chip are encrypted according to described double secret key original photo and obtain encrypting photo and/or according to described double secret key Encryption photo is decrypted and obtains original photo.
A kind of photo encipher-decipher method the most according to claim 1, it is characterised in that described step S1 includes following step Rapid:
S11, arrange or verify encryption and decryption authentication password using obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal's fix information, effective encryption chip fix information respectively as cryptographic key factor it One;
S13, according to encryption and decryption authentication password, effective intelligent terminal's fix information, effective encryption chip fix information generate Key;
S14, by described key storage in encryption chip.
A kind of photo encipher-decipher method the most according to claim 1, it is characterised in that described step S2 includes following step Rapid:
S21, establishment temporal cache file;
S22, using original photo or encryption photo put into temporal cache file as temporal cache photo;
S23, encryption chip add firmly according to the original photo in the file of described double secret key temporal cache or encryption photo Close or firmly decipher;
After S24, hardware encryption or hard successful decryption, delete temporal cache file.
4. according to a kind of photo encipher-decipher method described in any one of claims 1 to 3, it is characterised in that described original photo Acquisition methods include being called by different operating path that different cameral obtains, intelligent terminal is by wireless receiving or wired leads Entering to obtain, described different cameral includes operating system camera, encryption camera.
A kind of photo encipher-decipher method the most according to claim 2, it is characterised in that described encryption and decryption authentication password includes Character, fingerprint, iris image.
A kind of photo encipher-decipher method the most according to claim 5, it is characterised in that described intelligent terminal's fix information bag Including intelligent terminal's IMEI code, intelligent terminal No. SN, described encryption chip fix information includes encryption chip SN.
7. according to a kind of photo encipher-decipher method described in claim 2,5 or 6, it is characterised in that further comprise the steps of:
S3, checking encryption and decryption authentication password are with managing encrypted photo, including browsing, check, delete, import, deriving.
8. a photo encrypting and deciphering system, it is characterised in that including:
First module, is used for obtaining multiple cryptographic key factor and generates key and be stored in encryption chip;
Second module, obtains encrypting photo and/or according to described key for being encrypted according to described double secret key original photo Encryption photo is decrypted and obtains original photo.
9. a photo encrypting and deciphering system, it is characterised in that including intelligent terminal, encryption chip and processor, described intelligence is eventually End is connected with processor, and described processor is connected with encryption chip, and described processor is used for performing:
Obtain multiple cryptographic key factor generate key and be stored in encryption chip;
Triggering encryption chip is encrypted according to described double secret key original photo and obtains encrypting photo and/or according to described double secret key Encryption photo is decrypted and obtains original photo.
A kind of photo encrypting and deciphering system the most according to claim 9, it is characterised in that described encryption chip includes adding solution Close module, chip memory, described encryption/decryption module is connected with chip memory.
11. a kind of photo encrypting and deciphering systems according to claim 9, it is characterised in that described intelligent terminal includes terminal Processor, photographic head, wireless communication module, wireless connections module, data-interface and terminal memory, described terminal handler divides It is not connected with photographic head, wireless communication module, wireless connections module, data-interface, terminal memory.
CN201610546539.6A 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system Active CN106209381B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610546539.6A CN106209381B (en) 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610546539.6A CN106209381B (en) 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system

Publications (2)

Publication Number Publication Date
CN106209381A true CN106209381A (en) 2016-12-07
CN106209381B CN106209381B (en) 2019-04-26

Family

ID=57476435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610546539.6A Active CN106209381B (en) 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system

Country Status (1)

Country Link
CN (1) CN106209381B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145563A (en) * 2018-08-13 2019-01-04 阿里巴巴集团控股有限公司 A kind of auth method and device
CN111711515A (en) * 2020-05-18 2020-09-25 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419805A (en) * 2011-11-22 2012-04-18 中兴通讯股份有限公司 Terminal equipment and method for encrypting user information
CN103020504A (en) * 2012-12-03 2013-04-03 鹤山世达光电科技有限公司 Image management system and image management method based on fingerprint identification
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103559453A (en) * 2013-05-23 2014-02-05 深圳市中易通网络技术有限公司 Hardware encryption protection method and system for cellphone data
CN104683978A (en) * 2015-03-27 2015-06-03 襄阳泰凯电子有限公司 Mobile phone stored information encryption device and method
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105260669A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Transmission method and system of pictures
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419805A (en) * 2011-11-22 2012-04-18 中兴通讯股份有限公司 Terminal equipment and method for encrypting user information
CN103020504A (en) * 2012-12-03 2013-04-03 鹤山世达光电科技有限公司 Image management system and image management method based on fingerprint identification
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103559453A (en) * 2013-05-23 2014-02-05 深圳市中易通网络技术有限公司 Hardware encryption protection method and system for cellphone data
CN104683978A (en) * 2015-03-27 2015-06-03 襄阳泰凯电子有限公司 Mobile phone stored information encryption device and method
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105260669A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Transmission method and system of pictures
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145563A (en) * 2018-08-13 2019-01-04 阿里巴巴集团控股有限公司 A kind of auth method and device
CN109145563B (en) * 2018-08-13 2022-04-22 创新先进技术有限公司 Identity verification method and device
CN111711515A (en) * 2020-05-18 2020-09-25 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method
CN111711515B (en) * 2020-05-18 2022-04-26 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method

Also Published As

Publication number Publication date
CN106209381B (en) 2019-04-26

Similar Documents

Publication Publication Date Title
US10659226B2 (en) Data encryption method, decryption method, apparatus, and system
US20050235143A1 (en) Mobile network authentication for protection stored content
WO2006109307A2 (en) Method, device, and system of selectively accessing data
US20130185569A1 (en) Data protection system and method based on cloud storage
CN102781001A (en) Method for encrypting built-in file of mobile terminal and mobile terminal
CN103246850A (en) Method and device for processing file
CN105653986B (en) A kind of data guard method and device based on microSD card
CN106997439A (en) TrustZone-based data encryption and decryption method and device and terminal equipment
CN103378971B (en) A kind of data encryption system and method
US11227041B2 (en) Identification service based authorization
WO2013182154A1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN104769983A (en) Methods and apparatus for managing data within a secure element
CN113541935B (en) Encryption cloud storage method, system, equipment and terminal supporting key escrow
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN111566989B (en) Key processing method and device
CN103577769A (en) File content safety management method and management system
KR100594886B1 (en) System and Method for Security of Database
CN106209381B (en) A kind of photo encipher-decipher method and its system
US8234501B2 (en) System and method of controlling access to a device
CN102761559B (en) Network security based on private data shares method and communication terminal
WO2015090055A1 (en) Method, device and apparatus for storing and reading data
CN111628864A (en) Method for carrying out secret key safety recovery by using SIM card
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210909

Address after: 518000 1310, Tianming science and technology building, No. 8, wushitou Road, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: Zhongyitong Technology Co.,Ltd.

Address before: 518000 tower 501, tower a, Jiada R & D building, No. 5, songpingshan Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN ZHONGYITONG SECURITY CORE TECHNOLOGY Co.,Ltd.