CN111638782A - AR data encryption method and device, electronic equipment and storage medium - Google Patents

AR data encryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111638782A
CN111638782A CN202010420740.6A CN202010420740A CN111638782A CN 111638782 A CN111638782 A CN 111638782A CN 202010420740 A CN202010420740 A CN 202010420740A CN 111638782 A CN111638782 A CN 111638782A
Authority
CN
China
Prior art keywords
data
target
value
identification
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010420740.6A
Other languages
Chinese (zh)
Inventor
彭婕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Genius Technology Co Ltd
Original Assignee
Guangdong Genius Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Genius Technology Co Ltd filed Critical Guangdong Genius Technology Co Ltd
Priority to CN202010420740.6A priority Critical patent/CN111638782A/en
Publication of CN111638782A publication Critical patent/CN111638782A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses an encryption method, an encryption device, electronic equipment and a storage medium of AR data, wherein the method comprises the following steps: acquiring a book mark of a book to which the AR data belongs and a delineation mark of the AR data in the book to which the AR data belongs; acquiring a data identification sequence of the AR data according to the book identification and the delineation identification; acquiring a target binary number value corresponding to the AR data; and acquiring encrypted data corresponding to the AR data according to the target second-level system numerical value and the data identification sequence. Because the AR data has a mapping relation with the book mark and the delineation mark of the AR data in the book, the data mark sequence obtained according to the book mark and the delineation mark is the unique mark of the AR data. Therefore, the data encryption is carried out on the target binary number value corresponding to the AR data through the unique identifier, so that the data security is ensured, and the encryption efficiency is improved.

Description

AR data encryption method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to an encryption method and an encryption apparatus for AR data, an electronic device, and a storage medium.
Background
Augmented Reality (AR) technology is to generate virtual objects that do not exist in a real environment by using a computer graphics technology and a visualization technology, accurately add the virtual objects to the real environment, then integrate the virtual objects and the real environment into a whole through a display device, and apply virtual information to the real world, thereby presenting a new environment with vivid effect to a user to realize the enhancement of Reality.
At present, in the process of reading by a reading machine, the reading machine can present the relevant AR data according to the contents of the student. In order to improve the security of data, it is generally necessary to encrypt the AR data. Although the encryption effect of the existing Message-Digest Algorithm 5 (MD 5), RSA encryption method, etc. is good, the problem of long time consumption exists, which results in that the point reading machine cannot quickly acquire the encrypted AR data, and the point reading experience is poor.
Disclosure of Invention
The embodiment of the application provides an encryption method, an encryption device, electronic equipment and a storage medium for AR data, wherein the AR data in the application has a mapping relation with a book mark and a delineation mark of the AR data in a book, so that a data mark sequence obtained according to the book mark and the delineation mark is a unique mark of the AR data. Therefore, the data encryption is carried out on the target binary number value corresponding to the AR data through the unique identifier, so that the data security is ensured, and the encryption efficiency is improved.
According to a first aspect of an embodiment of the present application, there is provided an encryption method for AR data, including:
acquiring a book mark of a book to which AR data belongs and a delineation mark of the AR data in the book to which the AR data belongs;
acquiring a data identification sequence of the AR data according to the book identification and the delineation identification;
acquiring a target binary number value corresponding to the AR data;
and acquiring encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
Optionally, the obtaining, according to the target secondary system value and the data identification sequence, encrypted data corresponding to the AR data includes:
acquiring a target numerical value corresponding to the designated bit according to the data identification sequence;
acquiring a binary number value to be operated corresponding to the AR data according to the target value;
and carrying out operation processing on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
Optionally, the obtaining a target numerical value corresponding to the designated bit according to the data identifier sequence includes:
under the condition that the target designated bit exists in the data identification sequence, acquiring a numerical value corresponding to the target designated bit in the data identification sequence to obtain a target numerical value corresponding to the target designated bit;
under the condition that no target designated bit exists in the data identification sequence, taking a preset numerical value as a target numerical value corresponding to the target designated bit;
wherein the designated location comprises the target designated location.
Optionally, when the designated bit includes at least two bits, the obtaining, according to the target value, a binary value to be calculated corresponding to the AR data includes:
and calculating the product of the target numerical values corresponding to each target designation bit to obtain the binary numerical value to be calculated corresponding to the AR data.
Optionally, the performing operation processing on the binary value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data includes:
carrying out XOR operation processing on the binary number to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out exclusive OR operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out AND or NOT operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
performing NAND operation on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
and performing NOR operation on the binary number value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
Optionally, when the designated bit includes at least three bits, the obtaining, according to the target value, a binary value to be calculated corresponding to the AR data includes:
acquiring at least two predetermined bit combinations; the bit combination comprises at least two bits of the designated bits;
calculating the product of target numerical values corresponding to at least two bits included in each bit combination to obtain a binary numerical value to be calculated of each bit combination; the binary value to be calculated corresponding to the AR data comprises the binary value to be calculated of the at least two bit combinations.
Optionally, the performing operation processing on the binary value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data includes:
respectively carrying out primary operation processing on the binary value to be operated of each bit combination and the target secondary system numerical value to obtain initial encrypted data;
and carrying out second operation processing on the initial encrypted data to obtain encrypted data corresponding to the AR data.
According to a second aspect of the embodiments of the present application, there is provided an encryption apparatus for AR data, including:
the identification acquisition module is used for acquiring book identifications of books to which augmented reality AR data belong and delineating identifications of the AR data in the books to which the AR data belong;
the sequence acquisition module is used for acquiring a data identification sequence of the AR data according to the book identification and the delineation identification;
the binary number value acquisition module is used for acquiring a target binary number value corresponding to the AR data;
and the encrypted data acquisition module is used for acquiring encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
Optionally, the encrypted data obtaining module is further configured to obtain a target numerical value corresponding to the designated bit according to the data identifier sequence;
acquiring a binary number value to be operated corresponding to the AR data according to the target value;
and carrying out operation processing on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
Optionally, the encrypted data obtaining module is further configured to obtain a value corresponding to the target designated bit in the data identifier sequence under the condition that the target designated bit exists in the data identifier sequence, so as to obtain a target value corresponding to the target designated bit;
under the condition that no target designated bit exists in the data identification sequence, taking a preset numerical value as a target numerical value corresponding to the target designated bit;
wherein the designated bits include the target designated bit.
Optionally, the encrypted data obtaining module is further configured to calculate a product between target values corresponding to each target designated bit under the condition that the designated bit includes at least two bits, so as to obtain a binary value to be calculated corresponding to the AR data.
Optionally, the encrypted data obtaining module is further configured to perform xor operation on the binary value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out exclusive OR operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out AND or NOT operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
performing NAND operation on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
and performing NOR operation on the binary number value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
Optionally, in a case that the designated bits include at least three bits, the encrypted data obtaining module is further configured to obtain at least two predetermined bit combinations; the bit combination comprises at least two bits of designated bits; and the number of the first and second groups,
calculating the product of target numerical values corresponding to at least two bits included in each bit combination to obtain a binary numerical value to be calculated of each bit combination; the binary value to be calculated corresponding to the AR data comprises the binary value to be calculated of the at least two bit combinations.
Optionally, the encrypted data obtaining module is further configured to perform first operation processing on the binary value to be operated of each bit combination and the target secondary system value respectively to obtain initial encrypted data; and the number of the first and second groups,
and carrying out second operation processing on the initial encrypted data to obtain encrypted data corresponding to the AR data.
According to a third aspect of embodiments herein, there is provided an electronic device comprising a processor and a memory, the processor and the memory being coupled, the memory being configured to store computer program instructions, which, when executed by the processor, cause the electronic device to perform the method of encrypting AR data of the first aspect described above.
According to a fourth aspect of embodiments of the present application, there is provided a computer storage medium having stored therein program instructions that, when run on an electronic device, cause the electronic device to perform the method for encrypting AR data of the first aspect described above.
According to a fifth aspect of embodiments of the present application, there is provided a chip, where the chip is coupled with a memory in an electronic device, so that the chip calls program instructions stored in the memory when running, so that the electronic device executes the encryption method for AR data according to the first aspect.
According to the technical scheme, the embodiment of the application has the following advantages: the method comprises the steps that firstly, book identification of a book to which AR data belong and drawing identification of the AR data in the book to which the AR data belong can be obtained; then acquiring a data identification sequence of the AR data according to the book identification and the delineation identification; then acquiring a target binary number value corresponding to the AR data; and finally, acquiring encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
In summary, because the AR data has a mapping relationship with the book identifier and the delineation identifier of the AR data in the book, the data identifier sequence obtained according to the book identifier and the delineation identifier is the unique identifier of the AR data. Therefore, the data encryption is carried out on the target binary number value corresponding to the AR data through the unique identifier, so that the data security is ensured, and the encryption efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following briefly introduces the embodiments and the drawings used in the description of the prior art, and obviously, the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained according to the drawings.
Fig. 1 is a schematic flowchart of an encryption method for AR data according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another AR data encryption method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another AR data encryption method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another AR data encryption method according to an embodiment of the present application;
fig. 5 is a block diagram illustrating an encryption apparatus for AR data according to an embodiment of the present disclosure;
fig. 6 is a block diagram of another electronic device according to an embodiment of the present disclosure.
Detailed Description
For a person skilled in the art to better understand the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. The embodiments in the present application shall fall within the protection scope of the present application.
The following describes in detail an encryption method for AR data disclosed in an embodiment of the present application.
Fig. 1 is a schematic flowchart of an encryption method for AR data according to an embodiment of the present application. The method may be applied to an electronic device, which may include, for example, a mobile phone, a tablet computer, a notebook computer, an ultra-mobile personal computer (UMPC), a handheld computer, a netbook, a Personal Digital Assistant (PDA), a wearable device (such as a watch, a wrist, glasses, a helmet, a headband, and the like), a server, and the like, and the specific form of the electronic device is not particularly limited in the embodiments of the present application.
As shown in fig. 1, the method may include:
101. and acquiring the book identification of the book to which the AR data belongs and the drawing identification of the AR data in the book to which the AR data belongs.
It is understood that both the book and outline identifiers may be represented in the form of a sequence.
In this embodiment of the present application, the process of acquiring the AR data may include: when the point reading equipment detects that the point reading operation exists on the point reading equipment, the point reading equipment acquires the content to be read according to the point reading operation and sends the content to be read to the electronic equipment. Thus, the electronic device can obtain the AR data corresponding to the content to be read.
Further, in order to improve the accuracy of content matching, acquiring the content to be read according to the read-on operation may include: and acquiring the content to be read, a plurality of upper contents of the content to be read and a plurality of lower contents of the content to be read according to the reading operation.
The book identification of the book to which the AR data belongs and the delineation identification of the AR data in the book to which the AR data belongs may be obtained by, but not limited to, the following manners:
in the first mode, the electronic device may pre-establish an identifier correspondence relationship between the candidate AR data, the book identifier of the book to which the candidate AR data belongs, and the delineation identifier of the candidate AR data in the book to which the candidate AR data belongs. Therefore, the electronic equipment can acquire the book identification of the book to which the AR data belongs and the delineation identification of the AR data in the book to which the AR data belongs according to the identification corresponding relation.
And secondly, the electronic equipment can perform content matching according to the contents to be read to obtain book identifications of the books to which the contents to be read belong and delineation identifications of the contents to be read in the books to which the contents to be read belong. Therefore, the book identification of the book to which the content to be read by pointing belongs can be used as the book identification of the book to which the AR data belongs, and the drawing identification of the content to be read by pointing in the book to which the content belongs can be used as the drawing identification of the AR data in the book to which the content belongs.
It can be understood that the electronic device may store a plurality of book scanning pages included in the book in advance, so that the book scanning pages and the contents to be read may be used to perform content matching, so as to obtain the book identifier of the book to which the contents to be read belong and the delineation identifier of the contents to be read in the book to which the contents to be read belong.
In alternative embodiments of the present application, a book may be provided with a delineation mark by, but not limited to, the following means:
the method comprises the steps of dividing a book into a plurality of delineation areas from a first page to a last page, and setting delineation marks in each delineation area.
For example, if a book is divided into 205 delineating areas from the first page to the last page, the delineating identifiers corresponding to the 205 delineating areas may be sequentially set as: draw1, draw2, …, and draw 205.
In a second mode, the method can divide a target page included in one book into a plurality of delineation areas, and set delineation marks for the plurality of delineation areas respectively; the target page is any page of the book.
For example, if the first page of a book is divided into 5 delineation areas, the delineation marks corresponding to the 5 delineation areas may be sequentially set as: draw1, draw2, draw3, draw4, draw 5; if the first page of a book is divided into 16 delineating areas, the delineating identifications corresponding to the 16 delineating areas can be sequentially set as: draw1, draw2, …, draw15, and draw 16.
It should be noted that, if the delineation flag is set by the method described in the second mode, step 101 may be replaced by: and acquiring a book identifier of the book to which the AR data belongs, a drawing identifier of the AR data in the book to which the AR data belongs, and a page identifier of the AR data in the book to which the AR data belongs. Therefore, in the subsequent steps, the data identification sequence of the AR data can be obtained according to the book identification, the delineation identification and the page number identification, so that the obtained data identification sequence has uniqueness.
102. And acquiring a data identification sequence of the AR data according to the book identification and the delineation identification.
The data identification sequence of the AR data may be obtained by, but is not limited to, the following ways:
in the first mode, the electronic device can combine the book mark and the delineation mark to obtain a data mark sequence of the AR data.
Further, the electronic device may combine the book identifier and the delineation identifier according to a first preset priority to obtain a data identifier sequence of the AR data, where the first preset priority includes an arrangement order between the book identifier and the delineation identifier.
For example, if the priority of the book identifier is higher than that of the delineation identifier, the book identifier may be used as a front part sequence in the data identifier sequence, and the delineation identifier may be used as a rear part sequence in the data identifier sequence. For example, a book is identified as: x1X2X3…XnThe delineation mark is: y is1Y2Y3…YmM and n are positive integers, in this case, the data identification sequence can beComprises the following steps: x1X2X3…XnY1Y2Y3…Ym
And secondly, the electronic equipment can combine the book identification, the drawing identification and the designated identification to obtain a data identification sequence of the AR data. The specified identifier may be at least one of a device identifier of the reading device and a date identifier of the current date.
At this time, the sending, by the reading device described in step 101, the content to be read to the electronic device may include: and the point reading equipment sends the content to be point read and the equipment identification of the point reading equipment to the electronic equipment.
Further, the electronic device may combine the book identifier, the delineation identifier, and the specific identifier according to a second preset priority to obtain a data identifier sequence of the AR data, where the second preset priority includes an arrangement order among the book identifier, the delineation identifier, and the specific identifier.
For example, if the specified identifier includes a device identifier of the reading device and a date identifier of the current date, and the second preset priority may include: the priority of the book identification > the priority of the delineation identification > the priority of the device identification > the priority of the date identification. The sequence of data identifications may include, in order, a book identification, a delineation identification, a device identification, and a date identification. For example, a book is identified as: x1X2X3…XnThe delineation mark is: y is1Y2Y3…YmThe equipment identifier is Z1Z2Z3…ZiThe date identifier is 20200514, and m, n, i are positive integers, in this case, the data identifier sequence may be: x1X2X3…XnY1Y2Y3…YmZ1Z2Z3…Zi20200514。
And thirdly, if the page identifier of the AR data in the book in the step 101 needs to be acquired, the electronic device may combine the book identifier, the sketching identifier and the page identifier to obtain a data identifier sequence of the AR data.
Further, the electronic device may combine the book identifier, the delineation identifier, and the page identifier according to a third preset priority to obtain a data identifier sequence of the AR data, where the third preset priority includes an arrangement order among the book identifier, the delineation identifier, and the page identifier.
For example, if the third predetermined priority may include: the priority of book mark > the priority of outline mark > the priority of page number mark. The data identification sequence may comprise book identification, outline identification, page identification in sequence. For example, a book is identified as: x1X2X3…XnThe delineation mark is: y is1Y2Y3…YmPage number marked as Q1Q2Q3…QjAnd m, n and j are positive integers, and in this case, the data identification sequence may be: x1X2X3…XnY1Y2Y3…YmQ1Q2Q3…Qj
Further, the method and the device can also combine the book identification, the delineation identification, the designated identification and the page number identification to obtain a data identification sequence of the AR data. For the specific process, reference may be made to the above contents, which are not described herein again.
In an optional embodiment of the present application, the electronic device may preset a designated identification digit corresponding to the target identification (equivalent to the book identification, the outline identification, the designated identification, and the page identification). Therefore, under the condition that the identification digit of the target identification is not the designated identification digit, identification adjustment can be carried out on the target identification, so that the step can obtain the data identification sequence of the AR data according to the adjusted target identification. Therefore, through the identification adjustment process, the data identification sequences corresponding to different AR data have the same sequence length, so that the data management is convenient to unify, and the encrypted data is convenient to decrypt.
It is to be understood that the identity adjustment of the target identity may include:
and deleting the appointed sub-identification included in the target identification under the condition that the identification digit number of the target identification is greater than the appointed identification digit number, wherein the identification digit number of the appointed sub-identification is the difference value between the identification digit number of the target identification and the appointed identification digit number. Alternatively, the designated sub-identifier may be the identifier of the last part of the target identifier.
And under the condition that the identification digit number of the target identification is smaller than the designated identification digit number, adding a designated number of preset values into the target identification, wherein the designated number is a difference value between the designated identification digit number and the identification digit number of the target identification, and the preset values can be manually predetermined numerical values. Alternatively, the preset value may be added to the rear of the target identifier, or may be added to the front of the target identifier. The preset value may be a positive integer. The above examples are merely illustrative, and the present application is not limited thereto.
103. And acquiring a target binary value corresponding to the AR data.
In this embodiment of the application, a target binary value corresponding to the AR data may be obtained according to a preset data conversion relationship.
Alternatively, the AR data includes characters each having a corresponding ASCII (American standard code for Information Interchange) code value. Thus, the ASCII encoded value may be converted to a specified type value (e.g., int type value) which is then converted to the target binary value. The above examples are merely illustrative, and the present application is not limited thereto.
It should be noted that, the present application does not limit the timing sequence of step 103, for example, step 103 may precede step 101, or precede step 102.
104. And acquiring encrypted data corresponding to the AR data according to the target second-level system numerical value and the data identification sequence.
In the embodiment of the application, the electronic device can obtain a target numerical value corresponding to the designated bit according to the data identification sequence; acquiring a binary number value to be calculated corresponding to the AR data according to the target value; and then, carrying out operation processing on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
It is understood that obtaining the target value corresponding to the designated bit according to the data identification sequence may include: under the condition that the target designated bit exists in the data identification sequence, acquiring a numerical value corresponding to the target designated bit in the data identification sequence to obtain a target numerical value corresponding to the target designated bit; under the condition that the target designated bit does not exist in the data identification sequence, taking a preset value as a target value corresponding to the target designated bit; wherein the designated bits include target designated bits. For example, the preset value may be a positive integer.
Illustratively, if the data identification sequence includes: x1X2X3X4Y1Y2Y3Y4Y5Q1Q2Q3If the preset number is 9, then if the designated bit includes the first bit and the sixth bit, since the first bit and the sixth bit exist in the data id sequence, it can be obtained: the first bit corresponds to a target value of X1The sixth bit corresponds to a target value of Y2(ii) a In the case where the designated bits include the first bit, the sixth bit, and the fifteenth bit, since the first bit and the sixth bit exist in the data identification sequence, and the fifteenth bit does not exist, it is possible to obtain: the first bit corresponds to a target value of X1The sixth bit corresponds to a target value of Y2And the fifteenth bit corresponds to a target value of 9.
Further, the designated bits may include an f-th bit, f + k1Bit, f + k2Bit …, f + kvBit, f, kvAll represent positive integers.
Alternatively, k2、…、kvCan be k1Multiples of (a).
Optionally, to improve the data security, if the f bit, the f + k bit1Bit, f + k2Bit …, f + kvThe target value of at least one of the bits is 0. Then 0 in the target value can be removed, so that the binary value to be operated corresponding to the AR data can be obtained according to the target value from which 0 is removed. Thus, the binary value to be calculated acquired subsequently is ensured not to be changedIs 0, so that the security of the encrypted data obtained by subsequently encrypting the AR data is higher.
Alternatively, according to the setting rule of the data identification sequence, a plurality of bits with historical numerical values different from 0 can be used as the designated bits.
In this way, obtaining the binary value to be calculated corresponding to the AR data according to the target value may include, but is not limited to, the following manners:
in the first mode, under the condition that the designated bits comprise at least two bits, the product between the target numerical values corresponding to each target designated bit is calculated, and the binary numerical value to be calculated corresponding to the AR data is obtained.
For example, if the designated bits include the p-th bit and the p + s-th bit, p is a natural number and s is a positive integer. Under the condition that the p-th bit and the p + s-th bit exist in the data identification sequence, calculating the product between the target value corresponding to the p-th bit and the target value corresponding to the p + s-th bit to obtain a binary value to be calculated corresponding to the AR data; under the condition that the p-th bit exists in the data identification sequence but the p + s-th bit does not exist, the target value corresponding to the p + s-th bit can be determined to be a preset value, and the product between the target value corresponding to the p-th bit and the preset value is calculated to obtain the binary value to be calculated corresponding to the AR data.
For another example, if the designated bits include the p-th bit, the p + s-th bit, and the p + r-th bit, p is a natural number, and s and r are positive integers. Under the condition that the p bit, the p + s bit and the p + r bit exist in the data identification sequence, calculating the product of the target value corresponding to the p bit, the target value corresponding to the p + s bit and the target value corresponding to the p + r bit to obtain a binary value to be calculated corresponding to the AR data; under the condition that the p-th bit and the p + s-th bit exist in the data identification sequence but the p + r-th bit does not exist, the target value corresponding to the p + r-th bit can be determined to be a preset value, and the product of the target value corresponding to the p-th bit, the target value corresponding to the p + s-th bit and the preset value is calculated to obtain a binary value to be calculated corresponding to the AR data. The above examples are merely illustrative, and the present application is not limited thereto.
If the application determines the to-be-operated secondary system numerical value by the method of the first mode, performing operation processing on the to-be-operated binary value and the target secondary system numerical value to obtain the encrypted data corresponding to the AR data, which may include:
carrying out XOR operation on the binary number to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out exclusive OR operation on the binary number value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out AND-OR operation on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out NAND operation on the binary number value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
and performing NOR operation on the binary number value to be operated and the target second-level system numerical value to obtain the encrypted data corresponding to the AR data.
Optionally, performing operation processing on the binary number value to be operated and the target secondary system numerical value to obtain an initial operation result, and acquiring encrypted data corresponding to the AR data from the initial operation result; the data bit number of the encrypted data is the same as the numerical bit number of the target second-level system value. And if the numerical digit of the target secondary system numerical value is less than the numerical digit of the binary numerical value to be operated, the encrypted data is the data behind the initial operation result. The above-mentioned operation processing method is only an exemplary one, and the present application does not limit this.
In a second manner, under the condition that the designated bits include at least three bits, obtaining a binary value to be calculated corresponding to the AR data according to the target value may include: acquiring at least two predetermined bit combinations; the bit combination comprises at least two bits of the designated bits; then, calculating the product of the target numerical values corresponding to at least two bits included in each bit combination to obtain a binary numerical value to be calculated of each bit combination; the binary value to be calculated corresponding to the AR data includes a binary value to be calculated of at least two bit combinations. Wherein the two different bit combinations may include the same bit.
For example, assume that the designated bits include the p-th bit, the p + s-th bit, and the p + r-th bit, p is a natural number, and s and r are positive integers; the data identification sequence has the p th bit and the p + s th bit, but does not have the p + r th bit, and the target value corresponding to the p + r th bit can be determined to be a preset value. If the predetermined at least two bit combinations include: a first combination of the p-th bit and the p + s-th bit, a second combination of the p + s-th bit and the p + r-th bit, and a third combination of the p-th bit and the p + r-th bit. Then, the product of the target values respectively corresponding to the p-th bit and the p + s-th bit included in the first combination can be obtained to obtain a first binary value to be operated; obtaining the product of target values respectively corresponding to the p + s th bit and the p + r th bit included in the second combination to obtain a second binary value to be operated; and obtaining the product of target numerical values respectively corresponding to the p-th bit and the p + r-th bit included in the third combination to obtain a third binary numerical value to be calculated.
If the to-be-operated two-level system value of at least two bit combinations is obtained by the method described in mode two, in an optional embodiment, the performing operation processing on the to-be-operated binary value and the target two-level system value to obtain the encrypted data corresponding to the AR data may include: respectively carrying out primary operation processing on the binary value to be operated of each bit combination and a target secondary system value to obtain initial encrypted data; and carrying out second operation processing on the initial encrypted data to obtain encrypted data corresponding to the AR data.
It is understood that the first operation processing may include one of exclusive or operation processing, and or nor operation processing, nand operation processing, nor operation processing, and the like.
It should be understood that since there are at least two pieces of initial encrypted data acquired in the present application, a second arithmetic processing is required. Further, under the condition that at least three pieces of initial encrypted data are obtained, a second operation processing may be performed on two target initial encrypted data of the at least three pieces of initial encrypted data to obtain a processing result, and a second operation processing may be performed according to the processing result and the first remaining initial encrypted data to obtain encrypted data corresponding to the AR data; the first remaining initial encrypted data is initial encrypted data of the at least three initial encrypted data excluding the two target initial encrypted data.
Further, if at least two first remaining initial encrypted data are obtained, performing a second operation process according to the processing result and the first remaining initial encrypted data to obtain encrypted data corresponding to the AR data, which may include: and performing second operation processing on the processing result and one target residual initial encrypted data in the first residual initial encrypted data to obtain a new processing result, and performing second operation processing on the new processing result and the second residual initial encrypted data to obtain encrypted data corresponding to the AR data, wherein the second residual initial encrypted data is the initial encrypted data except the one target residual initial encrypted data in the first residual initial encrypted data.
The second arithmetic processing may include one of exclusive or arithmetic processing, and or nor arithmetic processing, nand arithmetic processing, nor arithmetic processing, and the like.
Illustratively, if the number of the obtained initial encrypted data is 3, the obtained initial encrypted data includes first initial encrypted data, second initial encrypted data, and third initial encrypted data. In this step, the first initial encrypted data and the second initial encrypted data may be subjected to xor operation to obtain a processing result, and the processing result and the third initial encrypted data may be subjected to xor operation to obtain encrypted data corresponding to the AR data.
It should be noted that, after the encrypted data corresponding to the AR data is obtained, the encrypted data may be sent to the point-to-read device. Thus, the probability of being tampered during data transmission is reduced.
According to the AR data encryption method, because the AR data has a mapping relation with the book identification and the delineation identification of the AR data in the book, the data identification sequence obtained according to the book identification and the delineation identification is the unique identification of the AR data. Therefore, the data encryption is carried out on the target binary number value corresponding to the AR data through the unique identifier, so that the data security is ensured, and the encryption efficiency is improved.
Fig. 2 is a schematic flowchart of an AR data encryption method according to an embodiment of the present application, and as shown in fig. 2, the AR data encryption method includes:
201. and the point reading equipment acquires the content to be point read under the condition of detecting the point reading operation.
In the embodiment of the present application, the content to be read may be obtained by, but is not limited to, the following ways:
in a first mode, the touch and talk operation may be a designated gesture on a display screen of the touch and talk device. Therefore, the point-reading equipment can detect whether the appointed gesture exists on the display screen of the point-reading equipment, and if the appointed gesture exists on the display screen of the point-reading equipment, the contents to be point-read indicated by the appointed gesture are collected. The designated gesture may be a pointing gesture of a single finger, or may also be a pointing gesture of two fingers, and the like, which is not limited in this application.
And secondly, the point reading operation can be a trigger operation of a point reader (such as a point reading pen and the like) on a display screen of the point reading device, and the like. Wherein, the point reader and the point reading device can be bound in advance. Therefore, the point reading device can detect whether the point reader exists on the display screen of the point reading device, and if the appointed point reader exists on the display screen of the point reading device, the content to be read indicated by the point reader is collected.
And thirdly, the point reading operation can be a virtual sketching track on a display screen of the point reading equipment. Therefore, the point-reading device can detect whether the display screen of the point-reading device has the virtual delineation track or not, and if the display screen of the point-reading device has the virtual delineation track, the point-reading content indicated by the virtual delineation track is acquired. For example, the virtual delineation track may be a primitive track or a rectangular track, etc.
In the fourth mode, the click-to-read operation can be a click-to-read voice command. Therefore, the point-reading device detects whether the user inputs the point-reading voice instruction, and if the point-reading device detects that the user inputs the point-reading voice instruction, the contents to be point-read on the display screen of the point-reading device can be acquired according to the point-reading voice instruction. The click-to-read voice instruction may include content position information of the content to be clicked and read. For example, the content position information may be row information and column information corresponding to the content to be read.
It is to be understood that the point-reading device may be a point-reading machine, and the like, and the present application is not limited thereto.
202. And the point reading equipment sends the content to be read to the electronic equipment.
203. The electronic equipment acquires AR data corresponding to the content to be read under the condition that the content to be read is received.
204. The electronic device determines whether the AR data is target data.
It is understood that the electronic device may preset the degree of importance of the candidate AR data.
Wherein the importance of the candidate AR data may be set manually in the electronic device. Thus, the target data may be data having a degree of importance equal to or greater than a preset degree threshold. Alternatively, the longer the production time of the candidate AR data, the greater the degree of importance.
Of course, the electronic device may also determine whether key information (e.g., information such as an identification number and a bank card number) exists in the candidate AR data, and if so, determine that the AR data is the target data; and if not, determining that the AR data is not the target data.
If the AR data is the target data, step 205 to step 208 are performed;
in the case where the AR data is not the target data, step 209 is executed.
205. The electronic equipment acquires the book identification of the book to which the AR data belongs and the drawing identification of the AR data in the book to which the AR data belongs.
206. And the electronic equipment acquires the data identification sequence of the AR data according to the book identification and the delineation identification.
207. The electronic equipment acquires a target binary value corresponding to the AR data.
208. The electronic equipment acquires the encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence, and sends the encrypted data to the reading equipment so that the reading equipment can output the encrypted data.
The content of step 205 to step 208 may refer to the content of step 101 to step 104, which is not described herein again.
Therefore, for important AR data, the electronic device needs to be encrypted, so that important information is prevented from being leaked.
It can be understood that, if the reading-and-clicking device is connected with the wearable device and the reading-and-clicking device detects that the wearable device is worn by the user, the reading-and-clicking device can control a camera on the wearable device to output the encrypted data. Wherein, the wearable device can be AR glasses, a smart watch or a smart ring, etc. This allows the encrypted data to be output in different ways.
It should be understood that outputting the encrypted data by the point-to-read device may include: the point-reading device decrypts the encrypted data to obtain decrypted AR data, and accordingly the decrypted AR data are output.
209. The electronic device sends the AR data to the reading device so that the reading device outputs the AR data.
It can be understood that, if the reading device is connected with the wearable device and the reading device detects that the wearable device is worn by the user, the reading device may control the camera on the wearable device to output the AR data. Wherein, the wearable device can be AR glasses, a smart watch or a smart ring, etc. This allows the AR data to be output in different ways.
According to the AR data encryption method, because the AR data has a mapping relation with the book identification and the delineation identification of the AR data in the book, when the AR data is important data, the data identification sequence obtained according to the book identification and the delineation identification is the unique identification of the AR data. Therefore, the data encryption is carried out on the target binary numerical value corresponding to the important AR data through the unique identifier, so that the security of the important data can be ensured, and the encryption efficiency is improved.
Fig. 3 is a schematic flowchart of an AR data encryption method according to an embodiment of the present application, and as shown in fig. 3, the AR data encryption method includes:
301. and the point reading equipment acquires the content to be point read under the condition of detecting the point reading operation.
For details, refer to step 201, and are not described herein again.
302. And the point reading equipment sends the content to be read to the electronic equipment.
303. The electronic equipment acquires AR data corresponding to the content to be read under the condition that the content to be read is received.
304. The electronic equipment acquires the book identification of the book to which the AR data belongs and the drawing identification of the AR data in the book to which the AR data belongs.
305. And the electronic equipment acquires the data identification sequence of the AR data according to the book identification and the delineation identification.
306. The electronic equipment acquires a target binary value corresponding to the AR data.
307. And the electronic equipment acquires the encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
The specific contents of step 303 to step 307 may refer to the contents of step 101 to step 104, which are not described herein again.
308. The electronic equipment detects whether the current bandwidth resource occupancy rate is greater than or equal to a preset occupancy threshold value.
Executing step 309 when the current bandwidth resource occupancy rate is greater than or equal to the preset occupancy threshold;
and in the case that the current bandwidth resource occupancy rate is smaller than the preset occupancy threshold, executing step 310.
In another optional embodiment of the present application, in a case that the current bandwidth resource occupancy rate is less than a preset occupancy threshold, the electronic device obtains a transmission data amount of the encrypted data, and if the transmission data amount is less than or equal to the preset data amount, step 310 is executed; if the transmission data volume is greater than the preset data volume, the data transmission consumes a long time and occupies a large bandwidth resource, so that the electronic device needs to perform data compression on the encrypted data and send the encrypted data after data compression to the point reading device. Therefore, after receiving the encrypted data after data compression, the point reading device needs to decompress the encrypted data after data compression to obtain the encrypted data.
309. The electronic device waits for a preset duration and returns to step 308.
For example, the preset time period may be 2 seconds, 3 seconds, or the like.
310. The electronic device sends the encrypted data to the reading device so that the reading device outputs the encrypted data.
It can be understood that, if the reading-and-clicking device is connected with the wearable device and the reading-and-clicking device detects that the wearable device is worn by the user, the reading-and-clicking device can control a camera on the wearable device to output the encrypted data. Wherein, the wearable device can be AR glasses, a smart watch or a smart ring, etc.
It should be understood that outputting the encrypted data by the point-to-read device may include: the point-reading device decrypts the encrypted data to obtain decrypted AR data, and accordingly the decrypted AR data are output.
According to the AR data encryption method, because the AR data has a mapping relation with the book identification and the delineation identification of the AR data in the book, the data identification sequence obtained according to the book identification and the delineation identification is the unique identification of the AR data. Therefore, the data encryption is carried out on the target binary number value corresponding to the AR data through the unique identifier, so that the encryption efficiency is improved while the safety of important data is ensured. In addition, in order to avoid the problem that the electronic equipment is down due to high occupation of the bandwidth resources of the electronic equipment, the encrypted data can be transmitted when the occupation of the bandwidth resources of the electronic equipment is not high.
Fig. 4 is a schematic flowchart of an AR data encryption method according to an embodiment of the present application, and as shown in fig. 4, the AR data encryption method includes:
401. and the point reading equipment acquires the content to be point read under the condition of detecting the point reading operation.
For details, refer to step 201, and are not described herein again.
402. And the point reading equipment sends the content to be read to the electronic equipment.
403. The electronic equipment acquires AR data corresponding to the content to be read under the condition that the content to be read is received.
404. The electronic equipment acquires the book identification of the book to which the AR data belongs and the drawing identification of the AR data in the book to which the AR data belongs.
405. And the electronic equipment acquires the data identification sequence of the AR data according to the book identification and the delineation identification.
406. The electronic equipment acquires a target binary value corresponding to the AR data.
407. And the electronic equipment acquires the encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
The contents of step 403 to step 407 may refer to the contents of step 101 to step 104, which are not described herein again.
408. The electronic device sends the encrypted data to the point-to-read device.
409. And the point-reading equipment acquires the current position information under the condition of receiving the encrypted data.
In the embodiment of the application, the current position information of the point-reading device can be acquired through a positioning sensor arranged in the point-reading device.
410. And the point-reading equipment detects whether the current position information has corresponding historical playing volume.
It will be appreciated that the playback volume used by the user is different in different location areas. For example, at home, the user prefers a lower playback volume; in a classroom, users prefer a larger playback volume, and so on.
Optionally, in this step, a target position area to which the current position information belongs may be obtained, and it is determined whether there is a historical playing volume in the target position area, and if so, there is a corresponding historical playing volume in the current position information; and if not, the current position information does not have the corresponding historical playing volume.
If the current position information has a corresponding historical playing volume, executing step 411;
in the case where the current position information does not have a corresponding history play volume, step 412 is performed.
411. The point-reading equipment determines the target playing volume according to the historical playing volume and outputs the encrypted data according to the target playing volume.
It is to be understood that this step may determine the target playback volume based on the historical playback volume. For example, the average value of the history playback volume may be determined as the target playback volume.
In another alternative embodiment, the playing volume used by the user is different in each time period in the same location area. Therefore, the target position area to which the current position information belongs and the target time period to which the current time belongs can be further acquired, the historical playing volume in the target position area and the target time period can be acquired, and then the target playing volume can be determined according to the historical playing volume. For example, an average of the historical playback volumes may be determined to result in a target playback volume.
412. And the point reading equipment outputs the encrypted data according to the reference playing volume.
It is to be understood that the reference playback volume may be a playback volume preset by the user.
It should be understood that outputting the encrypted data described in steps 411 and 412 may include: the point-reading device decrypts the encrypted data to obtain decrypted AR data, and accordingly the decrypted AR data are output.
According to the AR data encryption method, because the AR data has a mapping relation with the book identification and the delineation identification of the AR data in the book, the data identification sequence obtained according to the book identification and the delineation identification is the unique identification of the AR data. Therefore, the data encryption is carried out on the target binary number value corresponding to the AR data through the unique identifier, so that the data security is ensured, and the encryption efficiency is improved. In addition, the playing volume can be determined according to the current position of the point-reading device, so that the playing volume meets the use requirement of the position area where the user is located currently.
Fig. 5 is a device for encrypting AR data according to an embodiment of the present application, and as shown in fig. 5, the device includes:
the identifier obtaining module 501 is configured to obtain a book identifier of a book to which augmented reality AR data belongs, and a delineation identifier of the AR data in the book to which the augmented reality AR data belongs;
a sequence obtaining module 502, configured to obtain a data identifier sequence of the AR data according to the book identifier and the delineation identifier;
a binary value obtaining module 503, configured to obtain a target binary value corresponding to the AR data;
and an encrypted data obtaining module 504, configured to obtain, according to the target secondary system value and the data identification sequence, encrypted data corresponding to the AR data.
In an optional embodiment of the present application, the encrypted data obtaining module 504 is further configured to obtain a target numerical value corresponding to the designated bit according to the data identifier sequence;
acquiring a binary number value to be operated corresponding to the AR data according to the target value;
and carrying out operation processing on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
In an optional embodiment of the present application, the encrypted data obtaining module 504 is further configured to, under the condition that the target designated bit exists in the data identifier sequence, obtain a value corresponding to the target designated bit in the data identifier sequence, to obtain a target value corresponding to the target designated bit;
under the condition that no target designated bit exists in the data identification sequence, taking a preset numerical value as a target numerical value corresponding to the target designated bit;
wherein the designated bits include the target designated bit.
In an optional embodiment of the present application, under the condition that the designated bits include at least two bits, the encrypted data obtaining module 504 is further configured to calculate a product between target values corresponding to each of the target designated bits, so as to obtain binary values to be calculated corresponding to the AR data.
In an optional embodiment of the present application, the encrypted data obtaining module 504 is further configured to perform an exclusive or operation on the binary value to be calculated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out exclusive OR operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out AND or NOT operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
performing NAND operation on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
and performing NOR operation on the binary number value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
In an optional embodiment of the present application, in a case that the designated bits include at least three bits, the encrypted data obtaining module 504 is further configured to obtain at least two predetermined bit combinations; the bit combination comprises at least two bits of designated bits; and the number of the first and second groups,
calculating the product of target numerical values corresponding to at least two bits included in each bit combination to obtain a binary numerical value to be calculated of each bit combination; the binary value to be calculated corresponding to the AR data comprises the binary value to be calculated of the at least two bit combinations.
In an optional embodiment of the present application, the encrypted data obtaining module 504 is further configured to perform a first operation on the binary value to be calculated of each bit combination and the target secondary system value, respectively, to obtain initial encrypted data; and the number of the first and second groups,
and carrying out second operation processing on the initial encrypted data to obtain encrypted data corresponding to the AR data.
The specific content of the encryption apparatus for AR data may refer to the content described in the above embodiment of the encryption method for AR data, and is not described herein again.
Fig. 6 is a block diagram of a partial structure of an electronic device according to an embodiment of the present disclosure. Referring to fig. 6, the electronic device includes: radio Frequency (RF) circuit 610, memory 620, input unit 630, display unit 640, sensor 650, audio circuit 660, wireless fidelity (WiFi) module 670, processor 680, and power supply 690. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 6 does not constitute a limitation of the electronic device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the electronic device in detail with reference to fig. 6:
the RF circuit 610 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 680; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to global system for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), and the like.
The memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications of the electronic device and data processing by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the electronic device, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a touch screen, may collect touch operations of a user (e.g., operations of the user on the touch panel 631 or near the touch panel 631 by using any suitable object or accessory such as a finger or a stylus) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 640 may be used to display information input by or provided to a user and various menus of the electronic device. The Display unit 640 may include a Display panel 641, and optionally, the Display panel 641 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-Emitting Diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 680 to determine the type of the touch event, and then the processor 680 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 6, the touch panel 631 and the display panel 641 are two separate components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the electronic device.
The electronic device may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 641 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 641 and/or the backlight when the electronic device is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration) for recognizing the attitude of the electronic device, vibration recognition related functions (such as pedometer, tapping) and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which may be further configured to the electronic device, detailed descriptions thereof are omitted.
Audio circuit 660, speaker 661, and microphone 662 can provide an audio interface between a user and an electronic device. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signals into electrical signals, which are received by the audio circuit 660 and converted into audio data, which are processed by the audio data output processor 680 and then passed through the RF circuit 610 for transmission to, for example, another electronic device, or output to the memory 620 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the electronic equipment can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the WiFi module 670, and provides wireless broadband Internet access for the user. Although fig. 6 shows the WiFi module 670, it is understood that it does not belong to the essential constitution of the electronic device, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 680 is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby monitoring the electronic device as a whole. Optionally, processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
The electronic device also includes a power supply 690 (e.g., a battery) for powering the various components, which may be logically coupled to the processor 680 via a power management system to manage charging, discharging, and power consumption via the power management system.
Although not shown, the electronic device may further include a camera, a bluetooth module, and the like, which are not described in detail herein.
In this embodiment of the present invention, the processor 680 included in the electronic device may perform the process of the encryption method for AR data described in this embodiment of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed encryption method for AR data, encryption apparatus for AR data, and electronic device may be implemented in other ways. For example, the above-described embodiments of the electronic device are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method for encrypting AR data, comprising:
acquiring a book mark of a book to which augmented reality AR data belongs and a delineation mark of the AR data in the book to which the augmented reality AR data belongs;
acquiring a data identification sequence of the AR data according to the book identification and the delineation identification;
acquiring a target binary number value corresponding to the AR data;
and acquiring encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
2. The method according to claim 1, wherein the obtaining encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence includes:
acquiring a target numerical value corresponding to the designated bit according to the data identification sequence;
acquiring a binary number value to be operated corresponding to the AR data according to the target value;
and carrying out operation processing on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
3. The method according to claim 2, wherein the obtaining the target value corresponding to the designated bit according to the data identification sequence comprises:
under the condition that the target designated bit exists in the data identification sequence, acquiring a numerical value corresponding to the target designated bit in the data identification sequence to obtain a target numerical value corresponding to the target designated bit;
under the condition that no target designated bit exists in the data identification sequence, taking a preset numerical value as a target numerical value corresponding to the target designated bit;
wherein the designated location comprises the target designated location.
4. The method of claim 3, wherein, in a case that the designated bit includes at least two bits, the obtaining, according to the target value, a binary value to be calculated corresponding to the AR data includes:
and calculating the product of the target numerical values corresponding to each target designation bit to obtain the binary numerical value to be calculated corresponding to the AR data.
5. The method according to claim 4, wherein the performing operation processing on the binary value to be operated and the target secondary system value to obtain the encrypted data corresponding to the AR data includes:
carrying out XOR operation processing on the binary number to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out exclusive OR operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
carrying out AND or NOT operation processing on the binary number value to be operated and the target secondary system value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
performing NAND operation on the binary numerical value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data; alternatively, the first and second electrodes may be,
and performing NOR operation on the binary number value to be operated and the target secondary system numerical value to obtain encrypted data corresponding to the AR data.
6. The method according to claim 3, wherein, in a case that the designated bit includes at least three bits, the obtaining a binary value to be calculated corresponding to the AR data according to the target value includes:
acquiring at least two predetermined bit combinations; the bit combination comprises at least two bits of the designated bits;
calculating the product of target numerical values corresponding to at least two bits included in each bit combination to obtain a binary numerical value to be calculated of each bit combination; the binary value to be calculated corresponding to the AR data comprises the binary value to be calculated of the at least two bit combinations.
7. The method according to claim 6, wherein the performing operation processing on the binary value to be operated and the target secondary system value to obtain the encrypted data corresponding to the AR data includes:
respectively carrying out primary operation processing on the binary value to be operated of each bit combination and the target secondary system numerical value to obtain initial encrypted data;
and carrying out second operation processing on the initial encrypted data to obtain encrypted data corresponding to the AR data.
8. An apparatus for encrypting AR data, comprising:
the identification acquisition module is used for acquiring book identifications of books to which augmented reality AR data belong and delineating identifications of the AR data in the books to which the AR data belong;
the sequence identification acquisition module is used for acquiring a data identification sequence of the AR data according to the book identification and the delineation identification;
the binary number value acquisition module is used for acquiring a target binary number value corresponding to the AR data;
and the encrypted data acquisition module is used for acquiring encrypted data corresponding to the AR data according to the target secondary system value and the data identification sequence.
9. An electronic device comprising a processor and a memory coupled to the processor and the memory for storing computer program instructions that, when executed by the processor, cause the electronic device to perform the method of encryption of AR data of any of claims 1 to 7.
10. A computer storage medium having stored therein program instructions that, when run on an electronic device, cause the electronic device to perform the method of encryption of AR data as claimed in any one of claims 1 to 7.
CN202010420740.6A 2020-05-18 2020-05-18 AR data encryption method and device, electronic equipment and storage medium Pending CN111638782A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010420740.6A CN111638782A (en) 2020-05-18 2020-05-18 AR data encryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010420740.6A CN111638782A (en) 2020-05-18 2020-05-18 AR data encryption method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111638782A true CN111638782A (en) 2020-09-08

Family

ID=72329678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010420740.6A Pending CN111638782A (en) 2020-05-18 2020-05-18 AR data encryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111638782A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023692A (en) * 2016-05-13 2016-10-12 广东博士早教科技有限公司 AR interest learning system and method based on entertainment interaction
CN109213303A (en) * 2017-06-29 2019-01-15 深圳市掌网科技股份有限公司 Books browsing method and system based on augmented reality
CN110490182A (en) * 2019-08-19 2019-11-22 广东小天才科技有限公司 A kind of point reads production method, system, storage medium and the electronic equipment of data
CN110795747A (en) * 2019-10-18 2020-02-14 浪潮电子信息产业股份有限公司 Data encryption storage method, device, equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023692A (en) * 2016-05-13 2016-10-12 广东博士早教科技有限公司 AR interest learning system and method based on entertainment interaction
CN109213303A (en) * 2017-06-29 2019-01-15 深圳市掌网科技股份有限公司 Books browsing method and system based on augmented reality
CN110490182A (en) * 2019-08-19 2019-11-22 广东小天才科技有限公司 A kind of point reads production method, system, storage medium and the electronic equipment of data
CN110795747A (en) * 2019-10-18 2020-02-14 浪潮电子信息产业股份有限公司 Data encryption storage method, device, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US10169639B2 (en) Method for fingerprint template update and terminal device
RU2621012C2 (en) Method, device and terminal equipment for processing gesture-based communication session
CN104852885B (en) Method, device and system for verifying verification code
US10353883B2 (en) Method, device and storage medium for providing data statistics
CN106506321B (en) Group message processing method and terminal device
CN107506732B (en) Method, device, mobile terminal and computer storage medium for mapping
US11182593B2 (en) Image processing method, computer device, and computer readable storage medium
CN107944414B (en) Image processing method, image processing device, electronic equipment and computer readable storage medium
CN108958606B (en) Split screen display method and device, storage medium and electronic equipment
CN111464825B (en) Live broadcast method based on geographic information and related device
CN106569910A (en) Data backup and transmission method, and mobile terminal
CN110462620A (en) Sensitive data is decomposed to be stored in different application environment
CN112989148A (en) Error correction word ordering method and device, terminal equipment and storage medium
CN107864086B (en) Information rapid sharing method, mobile terminal and computer readable storage medium
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN108737618B (en) Information processing method and device, electronic equipment and computer readable storage medium
CN108256466B (en) Data processing method and device, electronic equipment and computer readable storage medium
US20190080152A1 (en) Method for collecting facial information and related products
CN106127004B (en) A kind of document handling method and terminal device
CN106293407B (en) Picture display method and terminal equipment
CN116010991A (en) Data encryption method, data decryption method, electronic device, and readable storage medium
CN111638782A (en) AR data encryption method and device, electronic equipment and storage medium
CN110908586A (en) Keyboard display method and device and terminal equipment
CN111163533B (en) Network connection method and related product
CN109831770B (en) Pairing method and device of mobile terminal, storage medium and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination