CN113704701A - Method and system for encrypting and decrypting data - Google Patents

Method and system for encrypting and decrypting data Download PDF

Info

Publication number
CN113704701A
CN113704701A CN202011096368.4A CN202011096368A CN113704701A CN 113704701 A CN113704701 A CN 113704701A CN 202011096368 A CN202011096368 A CN 202011096368A CN 113704701 A CN113704701 A CN 113704701A
Authority
CN
China
Prior art keywords
data
picture
video
characteristic value
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011096368.4A
Other languages
Chinese (zh)
Inventor
霍飞龙
杭云
郭宁
施唯佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Digital Life Technology Co Ltd
Original Assignee
Tianyi Smart Family Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Smart Family Technology Co Ltd filed Critical Tianyi Smart Family Technology Co Ltd
Priority to CN202011096368.4A priority Critical patent/CN113704701A/en
Publication of CN113704701A publication Critical patent/CN113704701A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention provides a method and a system for encrypting and decrypting data. The system comprises: the picture video acquisition module is used for responding to the data encryption request to shoot a picture or a video in real time; the picture video characteristic value extraction module is used for extracting the characteristic value of the picture or video shot in real time; the data encryption module is used for encrypting data by using the characteristic value as a key; a storage module for storing the live-shot picture or video in association with the data; and a data decryption module configured to: in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted; extracting a characteristic value of the picture or the video; and decrypting the data using the characteristic value as a key.

Description

Method and system for encrypting and decrypting data
Technical Field
The present invention relates to the field of information security, and more particularly, to methods and systems for encrypting and decrypting data.
Background
At present, there are many protection forms for data security, such as fingerprint identification, iris authentication, face identification, etc., which are all used to verify whether a user is legal or not, whether an operation authority for data exists or not, etc. But the security of the data file in the process of propagation cannot be controlled, because once the password is given to other people, the password can be transmitted to other people indefinitely, and the existence of the password becomes possible or impossible.
In addition, if an independent password is set for massive data files, the requirements of human faces, irises, fingerprints and the like cannot be met, and the safety protection of independent encryption cannot be performed on massive independent files due to the characteristics of safety authentication. Only the password in the character string format needs to be changed continuously to meet the requirement, but the requirement is also very inconvenient, and a user needs to actively store the massive passwords, otherwise, the password cannot be changed only by memory.
Accordingly, in order to greatly increase the security level and achieve encryption of mass data files, it is desirable to provide an improved method and system for encrypting and decrypting data.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The invention provides a method and a system for encrypting and decrypting data by using pictures or videos. The invention uses the picture or video shot in real time as the data encryption form, can encrypt each required data individually, and can remotely control to keep the data file in a controllable state in the process of transmission.
According to an aspect of the present invention, there is provided a method of encrypting data, the method comprising:
taking a picture or video in real time in response to a request to encrypt data;
extracting characteristic values of pictures or videos shot in real time; and
and encrypting the data by using the characteristic value as a key.
According to an embodiment of the present invention, extracting the feature value of the picture or video taken in real time further includes:
converting the picture or video to a color waveform; and
and generating a continuous coordinate point array set on the color waveform as the characteristic value.
According to a further embodiment of the invention, the method further comprises:
storing the live-taken picture or video on a local or remote server in association with the data.
According to another aspect of the present invention, there is provided a method of decrypting data, the method comprising:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
According to one embodiment of the invention, the obtaining step and the extracting step are performed by a remote server, and the method further comprises:
and the server sends the extracted characteristic value to the terminal requesting to decrypt the data.
According to still another aspect of the present invention, there is provided a system for encrypting and decrypting data, the system including:
the picture video acquisition module is used for responding to the data encryption request to shoot a picture or a video in real time;
the picture video characteristic value extraction module is used for extracting the characteristic value of the picture or video shot in real time;
the data encryption module is used for encrypting data by using the characteristic value as a key;
a storage module for storing the live-shot picture or video in association with the data; and
a data decryption module configured to:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
According to one embodiment of the invention, the storage module is located locally or on a remote server.
According to a further embodiment of the invention, the characteristic values comprise at least one of: an array of sets of consecutive coordinate points of a waveform of a picture or video frame image color or other feature vectors, hash values, MD5, or combinations thereof.
According to a further embodiment of the invention, the system further comprises:
an interaction control module configured to:
responding to clicking or long data to be encrypted as required, popping up a picture or video encryption option; and
and opening the picture video acquisition module in response to clicking the picture or video encryption using option.
According to a further embodiment of the invention, the interaction control module is further configured to:
responding to clicking or long data to be decrypted as required, popping up a picture or video decryption option; and
and operating the data decryption module in response to clicking the use picture or video decryption option.
Compared with the scheme in the prior art, the method and the system for encrypting and decrypting data provided by the invention have the advantages that:
(1) the method makes a breakthrough in the form of data encryption, has extremely strong theft prevention, theoretically, each shot picture or shot video file has uniqueness, and because the current environment, the picture or video formed by the imaging of an object in a lens, the shake of a hand during shooting, light rays and the like are unique in the expression form of a color waveform, an array set formed by each coordinate point forming the ripple is unique. When data is encrypted by these massive two-dimensional arrays, the probability of being cracked is extremely small.
(2) The remote protection of data, the existing data protection form is a given password, and the user can not control the password to unlock the data.
(3) The password generation mode is simple and can not be repeated, and a specific password can be generated for a single data file.
These and other features and advantages will become apparent upon reading the following detailed description and upon reference to the accompanying drawings. It is to be understood that both the foregoing general description and the following detailed description are explanatory only and are not restrictive of aspects as claimed.
Drawings
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only some typical aspects of this invention and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
Fig. 1 is an exemplary architecture diagram of a system for encrypting and decrypting data using pictures and video according to one embodiment of the present invention.
Fig. 2 is a flowchart of a method for encrypting data using pictures and video according to one embodiment of the present invention.
Fig. 3 is a flowchart of a method for decrypting data using pictures and video according to an embodiment of the present invention.
Detailed Description
The present invention will be described in detail below with reference to the attached drawings, and the features of the present invention will be further apparent from the following detailed description.
Fig. 1 is an exemplary architecture diagram of a system 100 for encrypting and decrypting data using pictures and video, according to one embodiment of the invention. As shown in fig. 1, the system 100 of the present invention comprises: the system comprises an interaction control module 101, a picture video acquisition module 102, a picture video characteristic value extraction module 103, a data encryption module 104, a storage module 105 and a data decryption module 106.
In the encryption process, the interactive control module 101 pops up a picture taking or video recording button according to the relevant interactive operation. As an example, the picture video control module 101 may use a picture or video encryption option by clicking or long-pressing a data file pop-up, and run the picture video capture module 102 by clicking on the option. The picture video acquisition module 102 then records live videos or takes live pictures in response to a data encryption request, ensuring the uniqueness thereof, and these pictures or videos are stored in the storage module 105 as keys for data in association with the data. For example, if local decryption is required, the storage module 105 may be located locally, i.e., saving the picture or video locally. If remote decryption is required, the storage module 105 may be located at a remote server, i.e. uploading pictures or video to the server. The picture video feature value extraction module 103 extracts feature values in a shot picture or a recorded video. The feature value may be, for example, an array set of consecutive coordinate points of a waveform of a picture or video frame image color or other feature vector, a hash value, MD5, or a combination thereof. As another example, the feature value may also be an array set of consecutive coordinate points of a voiceprint waveform of the recorded video. As another example, the feature value may also be a combination of a set of arrays of consecutive coordinate points of a voiceprint waveform of the video and a set of arrays of consecutive coordinate points of a color waveform of each frame of a picture in the video. The data encryption module 104 then encrypts the data using the extracted feature value as a key.
In the decryption process, the data decryption module 106, in response to a request to decrypt data, retrieves from the storage module 105 (located at a local or remote server) respective pictures or video files stored in association with the data, wherein the pictures or videos were taken in real-time at the time of the request to encrypt the data. The data decryption module 106 then extracts feature values (e.g., a set of arrays of consecutive coordinate points of a color waveform) of these pictures or videos by the picture video feature value extraction module 103, and decrypts the data using these feature values as a key. If the storage module 105 is located at a remote server, the above operations of acquiring a picture or video and extracting feature values are performed by the remote server, and these extracted feature values are transmitted to a terminal requesting decryption of data for decryption.
Those skilled in the art will appreciate that the system of the present invention and its various modules may be implemented in either hardware or software, and that the modules may be combined or combined in any suitable manner.
Fig. 2 is a flow diagram of a method 200 for encrypting data using pictures and video according to one embodiment of the invention. The method begins at step 201 with a request to encrypt data. For example, the user may click on data encrypted or as long as desired by the interactive control module 101, pop up a use picture or video encryption option in response to the operation, click on this option, and open the picture video capture module 102.
At step 202, a picture or video is taken in real-time in response to a request to encrypt data. For example, a picture or video may be taken in real-time by operating the picture video acquisition module 102. Alternatively, the captured picture or video may be stored in the storage module 105 (e.g., a local or remote server) in association with the data.
In step 203, the picture video feature value extraction module 103 is operated to extract feature values included in the shot picture or video. For example, a picture or a video may be converted into a color waveform by the picture video feature value extraction module 103 and coordinates of all points of the waveform are recorded as feature values in a set form.
The data encryption module 104 then encrypts the data using the extracted feature value as a key at step 204.
Fig. 3 is a flow diagram of a method 300 for decrypting data using pictures and video according to one embodiment of the invention. The method begins at step 301 with requesting decryption of data. For example, the user clicks or has a data file decrypted as needed through the interactive control module 101, pops up a usage picture or video decryption option in response to the operation, clicks this option, and runs the data decryption module 106.
In step 302, in response to a request to decrypt data, a picture or video stored in association with the data is obtained, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted. For example, if it is remote decryption, the data decryption module 106 obtains a corresponding picture or video from a remote server. If the decryption is local, the data decryption module 106 obtains the corresponding picture or video locally.
In step 303, feature values are extracted from the acquired picture or video by the picture video feature value extraction module 103. For example, a feature value may be extracted from the acquired picture or video in correspondence with an extracted feature value in the encryption method.
At step 304, the data is decrypted using the extracted feature value as a key.
What has been described above includes examples of aspects of the claimed subject matter. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the claimed subject matter, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Accordingly, the disclosed subject matter is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.

Claims (10)

1. A method of encrypting data, the method comprising:
taking a picture or video in real time in response to a request to encrypt data;
extracting characteristic values of pictures or videos shot in real time; and
and encrypting the data by using the characteristic value as a key.
2. The method of claim 1, wherein extracting feature values of a picture or video taken in real-time further comprises:
converting the picture or video to a color waveform; and
and generating a continuous coordinate point array set on the color waveform as the characteristic value.
3. The method of claim 1, wherein the method further comprises:
storing the live-taken picture or video on a local or remote server in association with the data.
4. A method of decrypting data, the method comprising:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
5. The method of decrypting data according to claim 4, wherein the obtaining step and the extracting step are performed by a remote server, and the method further comprises:
and the server sends the extracted characteristic value to the terminal requesting to decrypt the data.
6. A system for encrypting and decrypting data, the system comprising:
the picture video acquisition module is used for responding to the data encryption request to shoot a picture or a video in real time;
the picture video characteristic value extraction module is used for extracting the characteristic value of the picture or video shot in real time;
the data encryption module is used for encrypting data by using the characteristic value as a key;
a storage module for storing the live-shot picture or video in association with the data; and
a data decryption module configured to:
in response to a request to decrypt data, obtaining a picture or video stored in association with the data, wherein the picture or video was taken in real-time at the time the data was requested to be encrypted;
extracting a characteristic value of the picture or the video; and
and decrypting the data by using the characteristic value as a key.
7. The system of claim 6, wherein the storage module is located locally or on a remote server.
8. The system of claim 6, wherein the characteristic values comprise at least one of: an array of sets of consecutive coordinate points of a waveform of a picture or video frame image color or other feature vectors, hash values, MD5, or combinations thereof.
9. The system of claim 6, further comprising:
an interaction control module configured to:
responding to clicking or long data to be encrypted as required, popping up a picture or video encryption option; and
and opening the picture video acquisition module in response to clicking the picture or video encryption using option.
10. The system of claim 9, wherein the interaction control module is further configured to:
responding to clicking or long data to be decrypted as required, popping up a picture or video decryption option; and
and operating the data decryption module in response to clicking the use picture or video decryption option.
CN202011096368.4A 2020-10-14 2020-10-14 Method and system for encrypting and decrypting data Pending CN113704701A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011096368.4A CN113704701A (en) 2020-10-14 2020-10-14 Method and system for encrypting and decrypting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011096368.4A CN113704701A (en) 2020-10-14 2020-10-14 Method and system for encrypting and decrypting data

Publications (1)

Publication Number Publication Date
CN113704701A true CN113704701A (en) 2021-11-26

Family

ID=78646717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011096368.4A Pending CN113704701A (en) 2020-10-14 2020-10-14 Method and system for encrypting and decrypting data

Country Status (1)

Country Link
CN (1) CN113704701A (en)

Similar Documents

Publication Publication Date Title
DE102015215120B4 (en) METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE
US10181952B2 (en) Encryption using biometric image-based key
US10284885B1 (en) Method and apparatus for redacting video for compression and identification of releasing party
EP2813961B1 (en) Biometric verification with improved privacy and network performance in client-server networks
US20080285751A1 (en) Deterring Theft of Media Recording Devices by Encrypting Recorded Media Files
US20020056043A1 (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
JP7024788B2 (en) Devices and methods for authenticating user equipment
KR20020021080A (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
US20200382308A1 (en) User Apparatus and Method for the Protection of Confidential Data
Moon et al. An efficient selective encryption of fingerprint images for embedded processors
KR101847618B1 (en) Method for privacy object masking and key management for user authentication in video surveillance system and video surveillance system using the same
KR20210084806A (en) Method for Restoring Distortion Video Based on Iris Recognition
CN113704701A (en) Method and system for encrypting and decrypting data
Suruthikeerthana et al. An Extended Visual Cryptography With Dynamically Authenticated Error Avoidance Scheme For Bank Applications
KR102258957B1 (en) Door control apparatus for controlling the lock and unlock the door based on facial recognition and the operating method thereof
KR102236897B1 (en) Video data protection system and method
CN116158072A (en) Image processing circuit and image processing method
KR20210084805A (en) Method for Restoring Distortion Video Based on Finger Print Recognition
CN111353168A (en) Multimedia file management method, device, equipment and storage medium
KR20210084804A (en) Method for Restoring Distortion Video Based on Identification Card Recognition
Maček et al. Secure modular authentication systems based on conventional XOR biometrics
Muhammed A secured approach to visual cryptographic biometric template
KR102469380B1 (en) Method and system for de-identifying and restoring personal information of image data
KR102530463B1 (en) Image security device and method using pedestrian face detection information
Alshaikhli et al. Security threats of finger print biometric in network system environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220210

Address after: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200072

Applicant after: Tianyi Digital Life Technology Co.,Ltd.

Address before: 201702 3rd floor, 158 Shuanglian Road, Qingpu District, Shanghai

Applicant before: Tianyi Smart Family Technology Co.,Ltd.