CN104253933A - Shooting method and device - Google Patents

Shooting method and device Download PDF

Info

Publication number
CN104253933A
CN104253933A CN201310259996.3A CN201310259996A CN104253933A CN 104253933 A CN104253933 A CN 104253933A CN 201310259996 A CN201310259996 A CN 201310259996A CN 104253933 A CN104253933 A CN 104253933A
Authority
CN
China
Prior art keywords
encryption
mode
shooting
encrypted
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310259996.3A
Other languages
Chinese (zh)
Inventor
张凯
王冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201310259996.3A priority Critical patent/CN104253933A/en
Publication of CN104253933A publication Critical patent/CN104253933A/en
Pending legal-status Critical Current

Links

Landscapes

  • Studio Devices (AREA)

Abstract

The invention discloses a shooting method and device. The method comprises: determining a shooting pattern as an encrypted shooting pattern; obtaining an encryption mode for the encrypted shooting pattern; obtaining encrypted password data corresponding to the encryption mode; and shooting a picture or a video and carrying out encryption on the shot picture or video according to the encrypted password data, thereby obtaining encrypted shooting data. According to the shooting method and device that are provided by the embodiment of the invention, an encrypted picture or video can be obtained while shooting is completed, thereby improving security of the shot picture or video.

Description

Shooting method and equipment
Technical Field
The present invention relates to the field of information technology, and more particularly, to a method and apparatus for photographing.
Background
At present, photographing devices, such as a mobile phone, a tablet computer, a digital camera and a single lens reflex … …, are available everywhere, and basically, the mobile terminal has a photographing function. This is an age emphasizing personal privacy, especially the confidentiality of photos or videos. However, these existing photographing devices (any device with a photographing function) generally do not have a data encryption function, so there are several privacy security threats as follows:
firstly, when the photographing device or a storage medium on the photographing device is lost, others can browse photos and video contents on the device at will, so that personal privacy is leaked;
second, the photographing device (such as a digital camera) may be a device shared by a group or a family, and if the content that some individuals want to hide is not deleted in time, privacy disclosure is easy to occur.
The photo or video encryption method commonly adopted at present is to introduce the photo or video into a computer and encrypt the photo or video through certain encryption software. So there are many inconvenient places:
first, the hysteresis of encryption, from photo or video formation to encryption, is a concern with respect to the confidentiality of important information for an individual.
Secondly, the existing encryption of photos or videos is to generate an encrypted file from a file obtained by imaging photos or videos by using encryption algorithm software. The browsing encrypted file can be browsed only after being decrypted by a corresponding decryption algorithm. This is cumbersome and requires the user to have a certain computer capacity.
Disclosure of Invention
The embodiment of the invention provides a shooting method and equipment, which can improve the confidentiality of a shot picture or video.
In a first aspect, a method for shooting is provided, including: determining that the shooting mode is an encrypted shooting mode; acquiring an encryption mode used for the encryption shooting mode; acquiring encrypted password data corresponding to the encryption mode; and shooting the picture or the video, and encrypting the shot picture or the video according to the encrypted password data to obtain encrypted shooting data.
In a first possible implementation manner, before determining that the shooting mode is the encryption shooting mode, the method further includes: requesting a user to select the encryption shooting mode or the non-encryption shooting mode; determining the shooting mode as an encrypted shooting mode, comprising: and determining the shooting mode as the encryption shooting mode according to the selection of the user.
With reference to the first aspect or the first possible implementation manner of the first aspect, in a second possible implementation manner, the obtaining an encryption manner used for the encrypted shooting mode includes: acquiring the encryption mode selected by the user; or acquiring a default encryption mode; the encryption mode comprises text encryption, fingerprint encryption, image encryption or sound encryption.
With reference to the first aspect or the first or second possible implementation manner of the first aspect, in a third possible implementation manner, the obtaining of the encrypted password data corresponding to the encryption manner includes: if the encryption mode is text encryption, requesting a user to input a password, and taking the password input by the user as the encryption password data; if the encryption mode is fingerprint encryption, fingerprint data of a user is collected as the encryption password data; if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data; if the encryption mode is voice encryption, voice data of the user is collected to be used as the encrypted password data.
With reference to the first aspect or any one possible implementation manner of the first to third possible implementation manners of the first aspect, in a fourth possible implementation manner, the method further includes: determining that the shooting mode is a non-encryption shooting mode; and taking a picture or a video to obtain non-encrypted shot data.
With reference to the first aspect or any one of the first to the fourth possible implementation manners of the first aspect, in a fifth possible implementation manner, the method further includes: when the user accesses the encrypted shot data, the encryption mode of the encrypted shot data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encrypted password data, the user is allowed to access the encrypted shot data, and if the decryption password data is inconsistent with the encrypted password data, the user is prohibited from accessing the encrypted shot data.
With reference to the first aspect or any one of the first to the fifth possible implementation manners of the first aspect, in a sixth possible implementation manner, the method further includes: when a user changes the encryption state of the encrypted shooting data, the encryption mode of the encrypted shooting data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encryption password data, the user is allowed to change the encryption state of the encrypted shooting data, and if the decryption password data is inconsistent with the encryption password data, the user is forbidden to change the encryption state of the encrypted shooting data.
In a second aspect, there is provided an apparatus for photographing, comprising: the determining module is used for determining that the shooting mode is an encrypted shooting mode; a first obtaining module, configured to obtain an encryption mode used in the encrypted shooting mode; the second acquisition module is used for acquiring the encrypted password data corresponding to the encryption mode; and the encryption shooting module is used for shooting the photo or the video and encrypting the shot photo or the video according to the encryption password data to obtain the encryption shooting data.
In a first possible implementation manner, the apparatus further includes: a request module for requesting a user to select the encryption shooting mode or the non-encryption shooting mode before the determination module determines that the shooting mode is the encryption shooting mode; the determining module is specifically configured to determine, according to a selection of a user, that the shooting mode is the encrypted shooting mode.
With reference to the second aspect or the first possible implementation manner of the second aspect, in a second possible implementation manner, the first obtaining module is specifically configured to obtain the encryption manner selected by the user, or obtain the default encryption manner, where the encryption manner includes text encryption, fingerprint encryption, image encryption, or sound encryption.
With reference to the second aspect or the first or second possible implementation manner of the second aspect, in a third possible implementation manner, the second obtaining module is specifically configured to, if the encryption manner is text encryption, request a user to input a password, and use the password input by the user as the encryption password data; if the encryption mode is fingerprint encryption, fingerprint data of a user is collected as the encryption password data; if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data; if the encryption mode is voice encryption, voice data of the user is collected to be used as the encrypted password data.
With reference to the second aspect or any one possible implementation manner of the first to third possible implementation manners of the second aspect, in a fourth possible implementation manner, the determining module is further configured to determine that the shooting mode is an unencrypted shooting mode; the apparatus further comprises: and the non-encryption shooting module is used for shooting a picture or a video to obtain non-encryption shooting data when the determining module determines that the shooting mode is the non-encryption shooting mode.
With reference to the second aspect or any possible implementation manner of the first to fourth possible implementation manners of the second aspect, in a fifth possible implementation manner, the apparatus further includes: and the access module is used for determining the encryption mode of the encrypted shooting data when the user accesses the encrypted shooting data, acquiring decryption password data corresponding to the encryption mode, allowing the user to access the encrypted shooting data if the decryption password data is consistent with the encrypted password data, and forbidding the user to access the encrypted shooting data if the decryption password data is inconsistent with the encrypted password data.
With reference to the second aspect or any possible implementation manner of the first to fifth possible implementation manners of the second aspect, in a sixth possible implementation manner, the apparatus further includes: the change module is used for determining the encryption mode of the encrypted shooting data when a user changes the encryption state of the encrypted shooting data, acquiring decryption password data corresponding to the encryption mode, allowing the user to change the encryption state of the encrypted shooting data if the decryption password data is consistent with the encryption password data, and forbidding the user to change the encryption state of the encrypted shooting data if the decryption password data is inconsistent with the encryption password data.
Based on the technical scheme, the shooting method and the shooting equipment provided by the embodiment of the invention can obtain the encrypted photo or video after shooting is finished by obtaining the encryption mode and the encryption password data corresponding to the encryption mode when the shooting mode is determined to be the encryption shooting mode and encrypting the shot photo or video according to the encryption password data when the photo or video is shot, so that the confidentiality of the shot photo or video can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow diagram of a method of photographing according to an embodiment of the present invention.
Fig. 2 is a schematic flowchart of a method of photographing according to another embodiment of the present invention.
Fig. 3 is a schematic flowchart of a method of photographing according to still another embodiment of the present invention.
Fig. 4 is a flowchart of a method of photographing according to still another embodiment of the present invention.
Fig. 5 is a flowchart of a method of accessing photographing data according to an embodiment of the present invention.
Fig. 6 is a flowchart of a method of changing an encryption state of photographing data according to an embodiment of the present invention.
Fig. 7 is a schematic block diagram of an apparatus for photographing according to an embodiment of the present invention.
Fig. 8 is a schematic configuration diagram of a photographed apparatus according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, the photographing apparatus is an apparatus having a photographing and/or photographing function, for example, a camera, a video camera, a mobile phone, a personal digital assistant, a tablet computer, and the like.
Fig. 1 shows a schematic flow diagram of a method 100 of filming according to an embodiment of the invention. The method of fig. 1 is performed by a device for photography, as shown in fig. 1, the method 100 comprising:
s110, determining that the shooting mode is an encrypted shooting mode;
s120, acquiring an encryption mode used for the encryption shooting mode;
s130, acquiring encrypted password data corresponding to the encryption mode;
s140, shooting the picture or the video, and encrypting the shot picture or the video according to the encryption password data to obtain the encrypted shooting data.
In the embodiment of the invention, in order to improve the confidentiality of the shot photo or video, an encryption shooting mode can be used during shooting. When the shooting mode is determined to be the encryption shooting mode, the shooting device firstly obtains an encryption mode used for encrypting the shooting mode, such as text encryption, fingerprint encryption, image encryption or sound encryption, and then obtains encryption password data corresponding to the encryption mode, such as allowing a user to input a password, and acquiring a fingerprint, an image or sound of the user, and then encrypts the shot photo or video according to the encryption password data when the photo or video is shot, so as to obtain the encryption shooting data. That is, the shooting device acquires the encrypted password data before shooting, and immediately encrypts the shot picture or video according to the encrypted password data when the shot picture or video is formed, so that the shot picture or video is the encrypted picture or video, and the confidentiality of the shot picture or video can be improved.
Therefore, according to the shooting method provided by the embodiment of the invention, when the shooting mode is determined to be the encryption shooting mode, the encryption mode and the encryption password data corresponding to the encryption mode are obtained, and the shot picture or video is encrypted according to the encryption password data when the picture or video is shot, so that the encrypted picture or video can be obtained when the shooting is finished, and the confidentiality of the shot picture or video can be improved.
In S110, the photographing apparatus determines the photographing mode as the encryption photographing mode.
When a user starts shooting, a device for shooting first determines a shooting mode.
Alternatively, the shooting mode may default to the encryption shooting mode, or the shooting mode may only be the encryption shooting mode, in which case the shooting mode is the encryption shooting mode after the user starts shooting.
When the photographing mode includes an encryption photographing mode and a non-encryption photographing mode, the user may be allowed to select the photographing mode.
Therefore, as shown in fig. 2, optionally before S110, the method 100 further includes:
s150, requesting the user to select the encrypted shooting mode or the non-encrypted shooting mode;
s110 includes:
and S111, determining the shooting mode to be the encrypted shooting mode according to the selection of the user.
Specifically, when the shooting mode includes an encrypted shooting mode and a non-encrypted shooting mode, and a user starts shooting, the shooting device firstly enables the user to select the encrypted shooting mode or the non-encrypted shooting mode, and when the user selects the encrypted shooting mode, the encrypted shooting is performed according to the steps from S120 to S140.
In S120, the photographed apparatus acquires an encryption scheme for encrypting the photographing mode.
After determining that the shooting mode is the encryption shooting mode, the shooting device acquires an encryption mode, for example, an encryption mode such as text encryption, fingerprint encryption, image encryption, or sound encryption. The encryption mode can be selected by the user, or a default encryption mode can be adopted.
Thus, optionally, S120 comprises:
acquiring the encryption mode selected by the user; or,
and acquiring the default encryption mode.
Specifically, after the shooting mode is determined to be the encryption shooting mode, the shooting device enables the user to select the encryption mode and uses the encryption mode selected by the user. Or, the shooting device defaults to an encryption mode, uses the default encryption mode under the condition that the user does not select the encryption mode, and then uses the encryption mode selected by the user if the user changes the encryption mode.
In S130, the photographed apparatus acquires the encrypted password data corresponding to the encryption scheme.
After the encryption mode is obtained, the shooting device obtains the encryption password data corresponding to the encryption mode before shooting.
Optionally, S130 may include at least one of:
if the encryption mode is text encryption, requesting a user to input a password, and taking the password input by the user as the encryption password data;
if the encryption mode is fingerprint encryption, fingerprint data of a user is collected as the encryption password data;
if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data;
if the encryption mode is voice encryption, voice data of the user is collected to be used as the encrypted password data.
Specifically, when a text encryption method is adopted, the shooting device requests the user to input a password, the password is validated after confirmation, the password is used as encrypted password data, and then the shot and formed photo or video is encrypted according to the method.
When the shooting equipment has a fingerprint acquisition function, a fingerprint encryption mode can be adopted, the shooting equipment acquires the fingerprint of a user, and after the fingerprint is acquired, encrypted password data corresponding to the fingerprint encryption mode is generated.
When the image encryption mode is adopted, the shooting equipment collects the image of the current user, such as a human face, and generates encryption password data corresponding to the image encryption mode.
When the voice encryption mode is adopted, the shooting equipment collects the voice of the current user and generates the collected voice into the encryption password data corresponding to the voice encryption mode.
It should be understood that the encryption manner is not limited in the embodiment of the present invention, and the encryption manner may also include other encryption manners, for example, a sliding encryption manner on the touch screen device, a graphic encryption manner, and the like.
In S140, the photographing apparatus photographs a picture or video and encrypts the photographed picture or video according to the encryption password data to obtain encrypted photographing data.
After the encryption mode and the encryption password data corresponding to the encryption mode are obtained, the shooting device starts to shoot a picture or a video, and the formed picture or video is immediately encrypted according to the encryption password data.
When the photos are taken, each photo can be encrypted, namely, each photo is encrypted when formed; the encryption may be performed every time a certain number of photos are formed, and the embodiment of the present invention is not limited to this.
When the video is shot, the whole video can be encrypted; or the whole video segment can be divided into small segments, and each small segment is encrypted, namely, each small segment of video is encrypted; each frame may also be encrypted, which is not limited in the embodiments of the present invention.
In the embodiment of the present invention, as shown in fig. 3, optionally, the method 100 further includes:
s160, determining that the shooting mode is a non-encryption shooting mode;
s170, shooting a photo or a video to obtain non-encrypted shooting data.
When the shooting mode comprises an encrypted shooting mode and a non-encrypted shooting mode, if the shooting mode is determined to be the non-encrypted shooting mode, the shooting device carries out non-encrypted shooting, namely, the shot picture or video is not encrypted when the picture or video is shot.
The non-encryption photographing mode may be selected by a user, that is, the user is requested to select an encryption photographing mode or a non-encryption photographing mode, and the non-encryption photographing mode is employed when the user selects the non-encryption photographing mode. The shooting mode can be set as a non-encryption shooting mode by default, and if the user wants to select the encryption shooting mode, the shooting mode can be changed.
During photographing, the photographing apparatus can switch between the encryption photographing mode and the non-encryption photographing mode according to a user's selection. After the user changes the photographing mode, the photographed apparatus re-determines the photographing mode and then performs encryption photographing or non-encryption photographing accordingly. The shooting device can also switch between different encryption modes according to the selection of a user. After the user changes the encryption mode, the shooting equipment acquires the encryption mode again, and then carries out encryption shooting according to the changed encryption mode.
Therefore, according to the shooting method provided by the embodiment of the invention, the user is provided with the option of the encrypted shooting mode or the non-encrypted shooting mode, so that the encrypted photo or video can be obtained when shooting is completed in the encrypted shooting mode, and the confidentiality of the shot photo or video can be improved.
In this embodiment of the present invention, optionally, the method 100 further includes:
when the user accesses the encrypted shot data, the encryption mode of the encrypted shot data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encrypted password data, the user is allowed to access the encrypted shot data, and if the decryption password data is inconsistent with the encrypted password data, the user is prohibited from accessing the encrypted shot data.
For the encrypted shot data of the shot, decryption is required to access it. When a user accesses shot data, a shot device determines whether the data is encrypted shot data. If the shot data is encrypted, decryption is required first. The shooting equipment acquires the encryption mode of the encrypted shooting data and acquires corresponding decryption password data for decryption according to the encryption mode. For example, if the encryption mode is a text encryption mode, the user is allowed to input a password as decryption password data; if the encryption mode is fingerprint, image or voice encryption mode, the fingerprint, image or voice of the user is collected as decryption password data. Then, the shooting equipment verifies whether the decryption password data is consistent with the encryption password data, if so, the decryption is successful, and a video or a picture is opened for a user to access; if not, the decryption fails, and no operation can be performed on the encrypted shot data.
If the user accesses the non-encrypted shot data, the user can directly access the non-encrypted shot data. The shooting device can also encrypt the non-encrypted shooting data according to the selection of a user, for example, one of text encryption, fingerprint encryption, image encryption or sound encryption is selected to obtain corresponding encrypted password data, and the non-encrypted shooting data is encrypted according to the encrypted password data.
In this embodiment of the present invention, optionally, the method 100 further includes:
when a user changes the encryption state of the encrypted shooting data, the encryption mode of the encrypted shooting data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encryption password data, the user is allowed to change the encryption state of the encrypted shooting data, and if the decryption password data is inconsistent with the encryption password data, the user is forbidden to change the encryption state of the encrypted shooting data.
For the encrypted photographic data, the encryption state thereof may be changed, for example, from the encryption state of one encryption manner to the encryption state of another encryption manner, or the encryption state may be deleted, and the encrypted photographic data may be changed to the non-encrypted photographic data. The change of the encryption state of the encrypted photographic data also requires decryption first. When a user requests to change the encryption state of shot data, a shooting device determines whether the data is encrypted shot data. If the shot data is encrypted, decryption is required first. The shooting equipment acquires the encryption mode of the encrypted shooting data and acquires corresponding decryption password data for decryption according to the encryption mode. For example, if the encryption mode is a text encryption mode, the user is allowed to input a password as decryption password data; if the encryption mode is fingerprint, image or voice encryption mode, the fingerprint, image or voice of the user is collected as decryption password data. Then, the shooting equipment verifies whether the decryption password data is consistent with the encryption password data, and if so, the decryption is successful; if not, the decryption fails. And deleting the encryption state of the shot data which is successfully decrypted according to the request of the user or carrying out re-encryption according to the encryption mode selected by the user again. For the shot data that fails in decryption, no operation can be performed thereon.
An embodiment of the present invention will be described in detail below with reference to fig. 4 to 6. It should be noted that this is only for helping those skilled in the art better understand the embodiments of the present invention, and does not limit the scope of the embodiments of the present invention.
Fig. 4 is a flowchart of a method of photographing according to an embodiment of the present invention. Fig. 4 illustrates photographing as an example, and as shown in fig. 4, a specific flow of photographing is as follows.
After the user starts shooting 401, the shooting device lets the user select a shooting mode, that is, an encryption shooting mode or a non-encryption shooting mode.
When the user selects the non-encrypted shooting mode, 402, shooting is directly performed to obtain a non-encrypted picture.
When the user selects the encryption shooting mode, the shooting device lets the user select the encryption mode 403. For example, the user selects one encryption mode from four encryption modes, namely text encryption, fingerprint encryption, image encryption and voice encryption.
404, after the user selects the encryption mode, the shooting device obtains the encryption password data corresponding to the encryption mode. If a text encryption mode is adopted, a user inputs a password which is used as encryption password data; if a fingerprint encryption mode is adopted, the fingerprint of the user is collected to generate encrypted password data; if an image encryption mode is adopted, acquiring an image of a user, such as a human face, and generating encrypted password data; if the voice encryption mode is adopted, the voice of the user is collected, and the encrypted password data is generated.
And 405, the shot device takes a picture and encrypts the shot picture according to the encryption password data to obtain an encrypted shot picture.
406, when the user needs to modify the encryption method, go back to 403 to let the user reselect the encryption method.
407, when the user needs to modify the shooting mode, go back to 401 to let the user reselect the shooting mode.
Fig. 5 is a flowchart of a method for accessing shot data according to an embodiment of the present invention, and the specific flow is as follows.
501, it is determined whether the selected photographing data is encrypted photographing data. If the shooting data is non-encrypted shooting data, 505 is reached; if the shot data is encrypted shot data, 502 is reached.
502, determine the encryption mode.
503, obtaining the decrypted cipher data according to the determined encryption mode. For example, if the encryption mode is a text encryption mode, the user is allowed to input a password as decryption password data; if the encryption mode is fingerprint, image or voice encryption mode, the fingerprint, image or voice of the user is collected as decryption password data.
It is verified 504 whether the decryption key data and the encryption key data are identical. If the decryption password data is consistent with the encryption password data, the decryption is successful, and the step is carried out to 505; if the decryption password data is not consistent with the encryption password data, decryption fails, 506.
505, the corresponding shot data is opened. At this time, browsing the current shot data, modifying the encryption state (newly encrypting, changing the encryption method, or deleting the encryption state) may be performed.
506, no operation can be performed on the shot data.
Fig. 6 is a flowchart of a method for changing an encryption status of shooting data according to an embodiment of the present invention, and the specific flow is as follows.
601, it is determined whether the selected photographing data is encrypted photographing data. If the shooting data is non-encrypted shooting data, then 604 is reached; if the shot data is encrypted shot data, it proceeds to 602.
The shot data is decrypted 602. For details, reference may be made to 502 and 504 in the embodiment shown in fig. 5, which are not described herein again.
603, 604 if the decryption is successful, and 605 if the decryption is failed.
604, the encryption state is changed. And deleting the encryption state of the shot data which is successfully decrypted, or re-encrypting the shot data according to the encryption mode selected by the user again. The non-encrypted shot data is encrypted according to an encryption method selected by a user. For example, corresponding encryption password data is acquired according to one of text encryption, fingerprint encryption, image encryption or voice encryption selected by a user, and shooting data is encrypted according to the encryption password data.
605, no operation can be performed on the shot data.
According to the shooting method provided by the embodiment of the invention, the encryption mode and the encryption password data corresponding to the encryption mode are obtained when the shooting mode is determined to be the encryption shooting mode, and the shot picture or video is encrypted according to the encryption password data when the picture or video is shot, so that the encrypted picture or video can be obtained when the shooting is finished, the safety of the shot data is effectively enhanced, and the personal privacy of a user can be quickly and conveniently protected.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
The method of photographing according to an embodiment of the present invention is described in detail above with reference to fig. 1 to 6, and an apparatus of photographing according to an embodiment of the present invention will be described below with reference to fig. 7 and 8.
Fig. 7 shows a schematic block diagram of a photographed device 700 according to an embodiment of the present invention. As shown in fig. 7, the apparatus 700 includes:
a determining module 710 for determining the shooting mode as an encrypted shooting mode;
a first obtaining module 720, configured to obtain an encryption mode for the encrypted shooting mode;
a second obtaining module 730, configured to obtain encrypted password data corresponding to the encryption mode;
and an encrypted shooting module 740, configured to shoot a photo or a video, and encrypt the shot photo or video according to the encrypted password data to obtain encrypted shooting data.
In the embodiment of the invention, in order to improve the confidentiality of the shot photo or video, an encryption shooting mode can be used during shooting. When the determination module 710 of the photographing apparatus 700 determines that the photographing mode is the encryption photographing mode, the first obtaining module 720 obtains an encryption manner used for encrypting the photographing mode, for example, text encryption, fingerprint encryption, image encryption, or sound encryption, the second obtaining module 730 obtains encryption password data corresponding to the encryption manner, for example, a user inputs a password, and captures a fingerprint, an image, or sound of the user, and the encryption photographing module 740 encrypts a photographed picture or video according to the encryption password data when the photographed picture or video is photographed, to obtain encrypted photographing data. That is, the photographing apparatus 700 acquires the encryption password data before photographing, and encrypts the photographed picture or video according to the encryption password data immediately when the photographed picture or video is formed, so that the photographed picture or video is an encrypted picture or video, thereby improving the confidentiality of the photographed picture or video.
Therefore, according to the shooting device provided by the embodiment of the invention, when the shooting mode is determined to be the encryption shooting mode, the encryption mode and the encryption password data corresponding to the encryption mode are obtained, and the shot picture or video is encrypted according to the encryption password data when the picture or video is shot, so that the encrypted picture or video can be obtained when the shooting is finished, and the confidentiality of the shot picture or video can be improved.
In this embodiment of the present invention, optionally, the apparatus 700 further includes:
a request module for requesting a user to select the encryption photographing mode or the non-encryption photographing mode before the determination module 710 determines that the photographing mode is the encryption photographing mode;
the determining module 710 is specifically configured to determine that the shooting mode is the encrypted shooting mode according to a selection of a user.
In this embodiment of the present invention, optionally, the first obtaining module 720 is specifically configured to obtain the encryption manner selected by the user, or obtain the default encryption manner, where the encryption manner includes text encryption, fingerprint encryption, image encryption, or sound encryption.
In this embodiment of the present invention, optionally, the second obtaining module 730 is specifically configured to,
if the encryption mode is text encryption, requesting a user to input a password, and taking the password input by the user as the encryption password data;
if the encryption mode is fingerprint encryption, fingerprint data of a user is collected as the encryption password data;
if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data;
if the encryption mode is voice encryption, voice data of the user is collected to be used as the encrypted password data.
In this embodiment of the present invention, optionally, the determining module 710 is further configured to determine that the shooting mode is an unencrypted shooting mode;
the apparatus 700 further comprises:
and an unencrypted photographing module, configured to take a picture or a video to obtain unencrypted photographing data when the determining module 710 determines that the photographing mode is the unencrypted photographing mode.
In this embodiment of the present invention, optionally, the apparatus 700 further includes:
and the access module is used for determining the encryption mode of the encrypted shooting data when the user accesses the encrypted shooting data, acquiring decryption password data corresponding to the encryption mode, allowing the user to access the encrypted shooting data if the decryption password data is consistent with the encrypted password data, and forbidding the user to access the encrypted shooting data if the decryption password data is inconsistent with the encrypted password data.
In this embodiment of the present invention, optionally, the apparatus 700 further includes:
the change module is used for determining the encryption mode of the encrypted shooting data when a user changes the encryption state of the encrypted shooting data, acquiring decryption password data corresponding to the encryption mode, allowing the user to change the encryption state of the encrypted shooting data if the decryption password data is consistent with the encryption password data, and forbidding the user to change the encryption state of the encrypted shooting data if the decryption password data is inconsistent with the encryption password data.
The apparatus 700 for photographing according to the embodiment of the present invention may correspond to an executing entity in the method for photographing according to the embodiment of the present invention, and the above and other operations and/or functions of each module in the apparatus 700 for photographing are respectively for implementing corresponding flows of each method in fig. 1 to 6, and are not described herein again for brevity.
According to the shooting device provided by the embodiment of the invention, when the shooting mode is determined to be the encryption shooting mode, the encryption mode and the encryption password data corresponding to the encryption mode are obtained, and the shot picture or video is encrypted according to the encryption password data when the picture or video is shot, so that the encrypted picture or video can be obtained when the shooting is finished, the safety of the shot data is effectively enhanced, and the personal privacy of a user can be quickly and conveniently protected.
Fig. 8 shows a structure of an apparatus for photographing according to still another embodiment of the present invention, which includes at least one processor 802 (e.g., CPU), at least one network interface 805 or other communication interface, a memory 806, and at least one communication bus 803 for implementing connection communication between these devices. The processor 802 is operable to execute executable modules, such as computer programs, stored in the memory 806. The Memory 806 may comprise a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the system gateway and at least one other network element is realized through at least one network interface 805 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network and the like can be used.
In some embodiments, memory 806 stores a program 8061, which program 8061 may be executed by processor 802, including:
determining that the shooting mode is an encrypted shooting mode; acquiring an encryption mode used for the encryption shooting mode; acquiring encrypted password data corresponding to the encryption mode; and shooting the picture or the video, and encrypting the shot picture or the video according to the encrypted password data to obtain encrypted shooting data.
Optionally, before determining that the shooting mode is the encrypted shooting mode, the method further includes: requesting a user to select the encryption shooting mode or the non-encryption shooting mode; determining the shooting mode as an encrypted shooting mode, comprising: and determining the shooting mode as the encryption shooting mode according to the selection of the user.
Optionally, the obtaining an encryption mode for the encrypted shooting mode includes: acquiring the encryption mode selected by the user; or acquiring a default encryption mode; the encryption mode comprises text encryption, fingerprint encryption, image encryption or sound encryption.
Optionally, the obtaining of the encrypted password data corresponding to the encryption mode includes: if the encryption mode is text encryption, requesting a user to input a password, and taking the password input by the user as the encryption password data; if the encryption mode is fingerprint encryption, fingerprint data of a user is collected as the encryption password data; if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data; if the encryption mode is voice encryption, voice data of the user is collected to be used as the encrypted password data.
Optionally, the method further comprises: determining that the shooting mode is a non-encryption shooting mode; and taking a picture or a video to obtain non-encrypted shot data.
Optionally, the method further comprises: when the user accesses the encrypted shot data, the encryption mode of the encrypted shot data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encrypted password data, the user is allowed to access the encrypted shot data, and if the decryption password data is inconsistent with the encrypted password data, the user is prohibited from accessing the encrypted shot data.
Optionally, the method further comprises: when a user changes the encryption state of the encrypted shooting data, the encryption mode of the encrypted shooting data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encryption password data, the user is allowed to change the encryption state of the encrypted shooting data, and if the decryption password data is inconsistent with the encryption password data, the user is forbidden to change the encryption state of the encrypted shooting data.
According to the technical scheme provided by the embodiment of the invention, the encryption mode and the encryption password data corresponding to the encryption mode are obtained when the shooting mode is determined to be the encryption shooting mode, the shot photo or video is encrypted according to the encryption password data when the photo or video is shot, and the encrypted photo or video can be obtained when the shooting is finished, so that the confidentiality of the shot photo or video can be improved.
It should be understood that, in the embodiment of the present invention, the term "and/or" is only one kind of association relation describing an associated object, and means that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (14)

1. A method of photographing, comprising:
determining that the shooting mode is an encrypted shooting mode;
acquiring an encryption mode used for the encryption shooting mode;
acquiring encrypted password data corresponding to the encryption mode;
and shooting a picture or a video, and encrypting the shot picture or video according to the encrypted password data to obtain encrypted shooting data.
2. The method according to claim 1, wherein before the determining that the photographing mode is the encryption photographing mode, the method further comprises:
requesting a user to select the encryption shooting mode or the non-encryption shooting mode;
the determining that the shooting mode is the encryption shooting mode comprises the following steps:
and determining the shooting mode to be the encrypted shooting mode according to the selection of a user.
3. The method according to claim 1 or 2, wherein the obtaining the encryption mode for the encrypted shooting mode comprises:
acquiring the encryption mode selected by a user; or,
acquiring a default encryption mode;
the encryption mode comprises text encryption, fingerprint encryption, image encryption or sound encryption.
4. The method according to any one of claims 1 to 3, wherein the obtaining of the encrypted password data corresponding to the encryption mode includes:
if the encryption mode is text encryption, requesting a user to input a password, and taking the password input by the user as the encryption password data;
if the encryption mode is fingerprint encryption, fingerprint data of a user is collected to be used as the encryption password data;
if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data;
and if the encryption mode is voice encryption, acquiring voice data of a user as the encrypted password data.
5. The method according to any one of claims 1 to 4, further comprising:
determining that the shooting mode is a non-encryption shooting mode;
and taking a picture or a video to obtain non-encrypted shot data.
6. The method according to any one of claims 1 to 5, further comprising:
when the user accesses the encrypted shooting data, the encryption mode of the encrypted shooting data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encrypted password data, the user is allowed to access the encrypted shooting data, and if the decryption password data is inconsistent with the encrypted password data, the user is forbidden to access the encrypted shooting data.
7. The method according to any one of claims 1 to 6, further comprising:
when a user changes the encryption state of the encrypted shooting data, the encryption mode of the encrypted shooting data is determined, decryption password data corresponding to the encryption mode is obtained, if the decryption password data is consistent with the encryption password data, the user is allowed to change the encryption state of the encrypted shooting data, and if the decryption password data is inconsistent with the encryption password data, the user is forbidden to change the encryption state of the encrypted shooting data.
8. An apparatus for photographing, comprising:
the determining module is used for determining that the shooting mode is an encrypted shooting mode;
a first obtaining module, configured to obtain an encryption mode used for the encrypted shooting mode;
the second acquisition module is used for acquiring the encrypted password data corresponding to the encryption mode;
and the encrypted shooting module is used for shooting a picture or a video and encrypting the shot picture or video according to the encrypted password data to obtain encrypted shooting data.
9. The apparatus of claim 8, further comprising:
a request module for requesting a user to select the encryption shooting mode or the non-encryption shooting mode before the determination module determines that the shooting mode is the encryption shooting mode;
the determining module is specifically configured to determine, according to a selection of a user, that the shooting mode is the encrypted shooting mode.
10. The device according to claim 8 or 9, wherein the first obtaining module is specifically configured to obtain the encryption manner selected by the user or obtain the default encryption manner, where the encryption manner includes text encryption, fingerprint encryption, image encryption, or sound encryption.
11. The device according to any one of claims 8 to 10, characterized in that said second acquisition module is particularly adapted to,
if the encryption mode is text encryption, requesting a user to input a password, and taking the password input by the user as the encryption password data;
if the encryption mode is fingerprint encryption, fingerprint data of a user is collected to be used as the encryption password data;
if the encryption mode is image encryption, acquiring image data of a user as the encrypted password data;
and if the encryption mode is voice encryption, acquiring voice data of a user as the encrypted password data.
12. The device of any one of claims 8 to 11, wherein the determining module is further configured to determine that the shooting mode is an unencrypted shooting mode;
the apparatus further comprises:
and the non-encryption shooting module is used for shooting a picture or a video to obtain non-encryption shooting data when the determining module determines that the shooting mode is the non-encryption shooting mode.
13. The apparatus according to any one of claims 8 to 12, characterized in that it further comprises:
and the access module is used for determining the encryption mode of the encrypted shooting data when a user accesses the encrypted shooting data, acquiring decryption password data corresponding to the encryption mode, allowing the user to access the encrypted shooting data if the decryption password data is consistent with the encrypted password data, and forbidding the user to access the encrypted shooting data if the decryption password data is inconsistent with the encrypted password data.
14. The apparatus according to any one of claims 8 to 13, further comprising:
the changing module is used for determining the encryption mode of the encrypted shooting data when a user changes the encryption state of the encrypted shooting data, acquiring decryption password data corresponding to the encryption mode, allowing the user to change the encryption state of the encrypted shooting data if the decryption password data is consistent with the encryption password data, and forbidding the user to change the encryption state of the encrypted shooting data if the decryption password data is inconsistent with the encryption password data.
CN201310259996.3A 2013-06-26 2013-06-26 Shooting method and device Pending CN104253933A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310259996.3A CN104253933A (en) 2013-06-26 2013-06-26 Shooting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310259996.3A CN104253933A (en) 2013-06-26 2013-06-26 Shooting method and device

Publications (1)

Publication Number Publication Date
CN104253933A true CN104253933A (en) 2014-12-31

Family

ID=52188436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310259996.3A Pending CN104253933A (en) 2013-06-26 2013-06-26 Shooting method and device

Country Status (1)

Country Link
CN (1) CN104253933A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046167A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Generating method and apparatus for encrypted photo and electronic equipment
CN105099669A (en) * 2015-05-28 2015-11-25 努比亚技术有限公司 Recording encryption and decryption method and device
CN105138252A (en) * 2015-08-24 2015-12-09 联想(北京)有限公司 Control method and electronic equipment
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices
CN105389492A (en) * 2015-10-26 2016-03-09 联想(北京)有限公司 Control method and electronic device
CN106027794A (en) * 2016-06-29 2016-10-12 维沃移动通信有限公司 Encryption method of photo and mobile terminal
CN106161947A (en) * 2016-08-01 2016-11-23 乐视控股(北京)有限公司 Photo encryption method and system for camera terminal
CN106372522A (en) * 2016-09-29 2017-02-01 宇龙计算机通信科技(深圳)有限公司 Photo shooting method, corresponding device, photo viewing method and corresponding device
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device
CN107147850A (en) * 2017-05-27 2017-09-08 广东小天才科技有限公司 Shooting method based on mobile device and mobile device
WO2018014489A1 (en) * 2016-07-21 2018-01-25 中兴通讯股份有限公司 Photographic encryption method and apparatus
WO2018113537A1 (en) * 2016-12-22 2018-06-28 惠州Tcl移动通信有限公司 Method and system for encrypting photograph on the basis fingerprint identification
US10212168B2 (en) 2015-08-24 2019-02-19 Beijing Lenovo Software Ltd. Electronic device and control method thereof
CN111353168A (en) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 Multimedia file management method, device, equipment and storage medium
WO2024041564A1 (en) * 2022-08-24 2024-02-29 维沃移动通信有限公司 Video recording method and apparatus, electronic device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295341A (en) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 Portable equipment and data protection method thereof
CN101415099A (en) * 2007-10-18 2009-04-22 鸿富锦精密工业(深圳)有限公司 System and method for ciphering image viewfinding device
GB2462163A (en) * 2008-06-12 2010-02-03 Redzebra Mobile Ltd Digital Camera with automatic image and metadata encryption.
US20100046753A1 (en) * 2008-08-25 2010-02-25 Pfu Limited Information output system, method, and program for tampering detection
CN101753748A (en) * 2008-12-03 2010-06-23 华为终端有限公司 Image data transmission method and device thereof
CN102244734A (en) * 2011-07-08 2011-11-16 天津三星光电子有限公司 Digital video camera with face recognition encryption function
CN102891749A (en) * 2012-09-25 2013-01-23 东莞宇龙通信科技有限公司 Method and communication terminal for data encryption
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415099A (en) * 2007-10-18 2009-04-22 鸿富锦精密工业(深圳)有限公司 System and method for ciphering image viewfinding device
GB2462163A (en) * 2008-06-12 2010-02-03 Redzebra Mobile Ltd Digital Camera with automatic image and metadata encryption.
CN101295341A (en) * 2008-06-25 2008-10-29 腾讯科技(深圳)有限公司 Portable equipment and data protection method thereof
US20100046753A1 (en) * 2008-08-25 2010-02-25 Pfu Limited Information output system, method, and program for tampering detection
CN101753748A (en) * 2008-12-03 2010-06-23 华为终端有限公司 Image data transmission method and device thereof
CN102244734A (en) * 2011-07-08 2011-11-16 天津三星光电子有限公司 Digital video camera with face recognition encryption function
CN102891749A (en) * 2012-09-25 2013-01-23 东莞宇龙通信科技有限公司 Method and communication terminal for data encryption
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
熊平: "《身份认证与数字签名》", 《信息安全原理及应用 第2版》 *
胡维华: "《加密和认证技术》", 《计算机网络技术及应用》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105099669A (en) * 2015-05-28 2015-11-25 努比亚技术有限公司 Recording encryption and decryption method and device
CN105099669B (en) * 2015-05-28 2019-07-19 努比亚技术有限公司 Recording encipher-decipher method and device
CN105138252A (en) * 2015-08-24 2015-12-09 联想(北京)有限公司 Control method and electronic equipment
CN105138252B (en) * 2015-08-24 2020-08-25 联想(北京)有限公司 Control method and electronic equipment
US10212168B2 (en) 2015-08-24 2019-02-19 Beijing Lenovo Software Ltd. Electronic device and control method thereof
CN105046167B (en) * 2015-08-31 2018-09-07 宇龙计算机通信科技(深圳)有限公司 Encrypt generation method, device and the electronic equipment of photo
CN105046167A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Generating method and apparatus for encrypted photo and electronic equipment
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device
CN105389492A (en) * 2015-10-26 2016-03-09 联想(北京)有限公司 Control method and electronic device
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices
CN106027794A (en) * 2016-06-29 2016-10-12 维沃移动通信有限公司 Encryption method of photo and mobile terminal
CN107644167A (en) * 2016-07-21 2018-01-30 中兴通讯股份有限公司 Encrypt image pickup method and device
WO2018014489A1 (en) * 2016-07-21 2018-01-25 中兴通讯股份有限公司 Photographic encryption method and apparatus
CN106161947A (en) * 2016-08-01 2016-11-23 乐视控股(北京)有限公司 Photo encryption method and system for camera terminal
CN106372522A (en) * 2016-09-29 2017-02-01 宇龙计算机通信科技(深圳)有限公司 Photo shooting method, corresponding device, photo viewing method and corresponding device
WO2018113537A1 (en) * 2016-12-22 2018-06-28 惠州Tcl移动通信有限公司 Method and system for encrypting photograph on the basis fingerprint identification
US11405193B2 (en) 2016-12-22 2022-08-02 Huizhou Tcl Mobile Communication Co., Ltd. Encrypted photographing method and system based on fingerprint recognition
CN107147850A (en) * 2017-05-27 2017-09-08 广东小天才科技有限公司 Shooting method based on mobile device and mobile device
CN111353168A (en) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 Multimedia file management method, device, equipment and storage medium
WO2024041564A1 (en) * 2022-08-24 2024-02-29 维沃移动通信有限公司 Video recording method and apparatus, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN104253933A (en) Shooting method and device
US11159310B2 (en) Digital security bubble
KR102330538B1 (en) Roaming content wipe actions across devices
US10075618B2 (en) Security feature for digital imaging
EP3110161B1 (en) Method, apparatus and computer program product for controlling access to concurrently captured images
US10097666B2 (en) Accessing a service using an encrypted token
US10607035B2 (en) Method of displaying content on a screen of an electronic processing device
JPWO2008010275A1 (en) Media data processing apparatus and media data processing method
CN109688145B (en) Method and device for protecting privacy information
EP2756628A1 (en) Method and device for securely sharing images across untrusted channels
CN105678114B (en) A kind of method for previewing and device of photo
WO2016187940A1 (en) Information protecting method, mobile terminal and computer storage medium
CA3156555A1 (en) Cryptographic key management
JP4518969B2 (en) Mobile communication device, backup device, backup method, and backup program
CN105095787A (en) Information processing method and device
CN105279443A (en) Picture encrypting and decrypting methods and devices
TWI519994B (en) Image encryption and decryption method for using physiological features and device for capturing images thereof
WO2014166216A1 (en) Display method and device
KR20150100602A (en) Data storing and reading methods, apparatuses and devices
JP2020140735A (en) Apparatus and method for camera-based user authentication for content access
JP2019057880A (en) Imaging device, image processing system, image processing program, retrieval program and photographic program
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
KR101846163B1 (en) Method and system for protecting shared information
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
KR102349682B1 (en) A safe service method using an augmented reality and a mobile terminal providing the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141231