CN105635100A - Information encryption method, information decryption method and terminal - Google Patents

Information encryption method, information decryption method and terminal Download PDF

Info

Publication number
CN105635100A
CN105635100A CN201510459177.2A CN201510459177A CN105635100A CN 105635100 A CN105635100 A CN 105635100A CN 201510459177 A CN201510459177 A CN 201510459177A CN 105635100 A CN105635100 A CN 105635100A
Authority
CN
China
Prior art keywords
information
terminal
user
image information
face image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510459177.2A
Other languages
Chinese (zh)
Inventor
安欣龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510459177.2A priority Critical patent/CN105635100A/en
Publication of CN105635100A publication Critical patent/CN105635100A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The invention provides an information encryption method, an information decryption method and a terminal. The information encryption method comprises following steps: receiving a sending instruction for the information; encrypting the information according to the face image information corresponding to a receiving terminal for the information; sending the encrypted information to the receiving terminal, wherein the receiving terminal decrypts the encrypted information through face identification. Through the technical scheme, when the user sends encrypted information to the opposite terminal, the face image information of the opposite user is set as the encryption key of the encrypted information; the opposite terminal can decrypt the encrypted information only through obtaining the face image information of the user; the face image information is obtained by an image obtaining service such as a front camera; the security of the encrypted information is promoted; the encrypted information is effectively prevented from being leaked; moreover, the decryption process of the receiving terminal of the encrypted information is very convenient; the user operation of the receiving terminal is simplified; and the user experience is promoted.

Description

Information ciphering method, information decryption method and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of information ciphering method, a kind of information decryption method and a kind of terminal.
Background technology
At present, user, when the information such as the note in mobile phone are encrypted, generally require and will realize encryption in the encryption folders such as information importing safety box such as note.
But, this method operation that the information such as note are encrypted is more complicated, user itself or receive the password being required for input safety box when this user adding confidential information checks the content of the information such as note, it has not been convenient to the use of user. It addition, when the password leakage of safety box, can bring about the hidden danger of leakage of information, safety is relatively low.
Accordingly, it would be desirable to a kind of new technical scheme, it is possible to while guarantee adds the safety of confidential information, simplify the operation of user.
Summary of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, it is possible to while guarantee adds the safety of confidential information, simplifies the operation of user.
In view of this, a first aspect of the present invention proposes a kind of information ciphering method, for terminal, including: receive the transmission order of information; Described information is encrypted by facial image information corresponding to reception terminal according to described information; Described information after encryption is sent to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, also include: described reception terminal is arranged the described facial image information of correspondence.
In this technical scheme, can be that each the reception terminal on user terminal arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
A second aspect of the present invention proposes a kind of terminal, uses the information ciphering method in above-mentioned first aspect, including: receive unit, receive the transmission order of information; Ciphering unit, is encrypted described information according to the facial image information that the reception terminal of described information is corresponding; Transmitting element, is sent the described information after encryption to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that also include: unit is set, before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, described reception terminal is arranged the described facial image information of correspondence.
In this technical scheme, can be that each the reception terminal on user terminal arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
A third aspect of the present invention proposes a kind of information decryption method, for terminal, including: reception adds confidential information from transmission terminal; According to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that the user's face image information in the described terminal of described use adds before confidential information is decrypted to described, also includes: obtained the described user's face image information of described terminal by image acquiring device; Or from described terminal, obtain the described user's face image information stored.
In this technical scheme, the image acquiring device of user terminal can be utilized (such as, the front-facing camera of terminal, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of user terminal storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, preferably, described basis receive to the described viewing command adding confidential information, the described confidential information that adds is decrypted by the user's face image information using described terminal, specifically includes: the described user's face image information of described terminal as decruption key, the described confidential information that adds is decrypted; When described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, adds the encryption content of confidential information, otherwise described in display, decipher unsuccessfully, show random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then the encryption content adding confidential information displayed on the terminals, if comparison is inconsistent, will random error information displayed on the terminals (such as, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
A fourth aspect of the present invention proposes one terminal, use as the information decryption method according to any one of the above-mentioned third aspect, including: receiving unit, reception adds confidential information from transmission terminal; Decryption unit, according to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, preferably, also include: acquiring unit, user's face image information in the described terminal of described use adds before confidential information is decrypted to described, obtains the described user's face image information of described terminal by image acquiring device or obtains the described user's face image information stored from described terminal.
In this technical scheme, the image acquiring device of user terminal can be utilized (such as, the front-facing camera of terminal, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of user terminal storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, preferably, described decryption unit specifically for: the described confidential information that adds is decrypted by the described user's face image information of described terminal as decruption key, wherein, when described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, the encryption content of confidential information is added described in display, otherwise, decipher unsuccessfully, show random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then the encryption content adding confidential information displayed on the terminals, if comparison is inconsistent, will random error information displayed on the terminals (such as, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
Pass through technical scheme, when user adds confidential information to distant terminal transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, as long as the facial image information that distant terminal obtains user by image acquiring devices such as front-facing cameras can be decrypted adding confidential information, so, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also the decrypting process of the reception terminal adding confidential information it is very easy to, simplify the operation of recipient user, improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 illustrates the flow chart of information ciphering method according to an embodiment of the invention;
Fig. 2 illustrates the block diagram of terminal according to an embodiment of the invention;
Fig. 3 illustrates the flow chart of information decryption method according to an embodiment of the invention;
Fig. 4 illustrates the block diagram of terminal according to another embodiment of the invention;
Fig. 5 illustrates that transmission according to an embodiment of the invention adds the terminal interface schematic diagram of confidential information;
Fig. 6 illustrates the acquisition user's face image according to an embodiment of the invention terminal interface schematic diagram as decruption key;
Fig. 7 illustrates mess code information schematic diagram according to an embodiment of the invention;
Fig. 8 illustrates insignificant cleartext information schematic diagram according to an embodiment of the invention.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail. It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the flow chart of information ciphering method according to an embodiment of the invention.
As it is shown in figure 1, information ciphering method according to an embodiment of the invention, for terminal, including:
Step 102, receives the transmission order of information.
Step 104, is encrypted information according to the facial image information that the reception terminal of information is corresponding.
Step 106, sends the information after encryption to receiving terminal, the information after encryption is decrypted by facial recognition for receiving terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation receiving terminal use, improve Consumer's Experience.
In technique scheme, it is preferable that before step 104, also include: to receiving terminal, corresponding facial image information is set.
In this technical scheme, can be that each the reception terminal in terminal arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
Fig. 2 illustrates the block diagram of terminal according to an embodiment of the invention.
As in figure 2 it is shown, terminal 200 according to an embodiment of the invention, use the information ciphering method shown in Fig. 1, including: receive unit 202, receive the transmission order of information; Ciphering unit 204, is encrypted information according to the facial image information that the reception terminal of information is corresponding; Transmitting element 206, sends the information after encryption to receiving terminal, the information after encryption is decrypted by facial recognition for receiving terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that also include: arrange unit 208, before information is encrypted by facial image information corresponding to the reception terminal according to information, to the facial image information receiving terminal and arranging correspondence.
In this technical scheme, can be that each the reception terminal in terminal 200 arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
Fig. 3 illustrates the flow chart of information decryption method according to an embodiment of the invention.
As it is shown on figure 3, information decryption method according to an embodiment of the invention, for terminal, including:
Step 302, reception adds confidential information from transmission terminal.
Step 304, according to receive to the viewing command adding confidential information, use the user's face image information of terminal to be decrypted adding confidential information.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that before step 304, also include: obtained the user's face image information of terminal by image acquiring device; Or from terminal, obtain the user's face image information stored.
In this technical scheme, the image acquiring device of user terminal can be utilized (such as, the front-facing camera of terminal, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of user terminal storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, it is preferable that step 304 specifically includes: the user's face image information of terminal is decrypted as decruption key adding confidential information; When terminal user's face image information with add in confidential information as the facial image information of preset-key consistent time, successful decryption, display adds the encryption content of confidential information, otherwise, decipher unsuccessfully, shows random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then the encryption content adding confidential information displayed on the terminals, if comparison is inconsistent, will random error information displayed on the terminals (such as, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
Fig. 4 illustrates the block diagram of terminal according to another embodiment of the invention.
As shown in Figure 4, terminal 400 according to another embodiment of the invention, use the information decryption method shown in Fig. 3, including: receiving unit 402, reception adds confidential information from transmission terminal; Decryption unit 404, according to receive to the viewing command adding confidential information, use the user's face image information of terminal 400 to be decrypted adding confidential information.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, preferably, also include: acquiring unit 406, using the user's face image information of terminal 400 to adding before confidential information is decrypted, obtain the user's face image information of terminal 400 by image acquiring device or from terminal 400, obtain the user's face image information stored.
In this technical scheme, the image acquiring device of user terminal 400 can be utilized (such as, the front-facing camera of mobile phone, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of terminal 400 storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, preferably, decryption unit 404 specifically for: the user's face image information of terminal 400 is decrypted as decruption key adding confidential information, wherein, when terminal 400 user's face image information with add in confidential information as the facial image information of preset-key consistent time, successful decryption, display adds the encryption content of confidential information, otherwise, decipher unsuccessfully, show random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then in terminal 400, display adds the encryption content of confidential information, if comparison is inconsistent, random error information will be shown (such as in terminal 400, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
Fig. 5 illustrates that transmission according to an embodiment of the invention adds the terminal interface schematic diagram of confidential information.
As it is shown in figure 5, user is when adding confidential information to recipient's transmission, selects recipient's face-image to be encrypted as encryption key, just can click transmission button after confirmation is errorless, Encrypted short message is sent to recipient.
Fig. 6 illustrates the acquisition user's face image according to an embodiment of the invention terminal interface schematic diagram as decruption key.
As shown in Figure 6, when reception terminal receives and adds confidential information, the face-image that will automatically open up front-facing camera acquisition recipient is decrypted, if successful decryption, then can show correct encrypted content information in reception terminal.
If it addition, decipher unsuccessfully, then can show mess code information as shown in Figure 7 or insignificant cleartext information as shown in Figure 8 in reception terminal.
Technical scheme is described in detail above in association with accompanying drawing, pass through technical scheme, when user adds confidential information to distant terminal transmission, the facial image information of the other user can be set to add the encryption key of confidential information, as long as the facial image information that distant terminal obtains user by image acquiring devices such as front-facing cameras can be decrypted adding confidential information, thus improving the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also the decrypting process of the reception terminal adding confidential information it is very easy to, simplify the operation receiving terminal use, improve Consumer's Experience.
In the present invention, term " first ", " second ", " the 3rd ", " the 4th " only for descriptive purposes, and it is not intended that instruction or hint relative importance. For the ordinary skill in the art, it is possible to understand above-mentioned term concrete meaning in the present invention as the case may be.
In the description of this specification, specific features, structure, material or feature that the description of term " embodiment ", " another embodiment " etc. means in conjunction with this embodiment or example describe are contained at least one embodiment or the example of the present invention. In this manual, the schematic representation of above-mentioned term is not necessarily referring to identical embodiment or example. And, the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiments or example.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations. All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (10)

1. an information ciphering method, for terminal, it is characterised in that including:
The transmission order of reception information;
Described information is encrypted by facial image information corresponding to reception terminal according to described information;
Described information after encryption is sent to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
2. information ciphering method according to claim 1, it is characterised in that before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, also include:
Described reception terminal is arranged the described facial image information of correspondence.
3. a terminal, uses information ciphering method as claimed in claim 1 or 2, it is characterised in that including:
Receive unit, receive the transmission order of information;
Ciphering unit, is encrypted described information according to the facial image information that the reception terminal of described information is corresponding;
Transmitting element, is sent the described information after encryption to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
4. terminal according to claim 3, it is characterised in that also include:
Unit is set, before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, described reception terminal is arranged the described facial image information of correspondence.
5. an information decryption method, for terminal, it is characterised in that including:
Reception adds confidential information from transmission terminal;
According to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
6. information decryption method according to claim 5, it is characterised in that the user's face image information in the described terminal of described use adds before confidential information is decrypted to described, also includes:
The described user's face image information of described terminal is obtained by image acquiring device; Or
The described user's face image information stored is obtained from described terminal.
7. the information decryption method according to claim 5 or 6, it is characterised in that described basis receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted, specifically include:
The described confidential information that adds is decrypted by the described user's face image information of described terminal as decruption key;
When described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, adds the encryption content of confidential information, otherwise described in display, decipher unsuccessfully, show random error information or predetermined error message.
8. a terminal, uses the information decryption method as according to any one of claim 5 to 7, it is characterised in that including:
Receiving unit, reception adds confidential information from transmission terminal;
Decryption unit, according to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
9. terminal according to claim 8, it is characterised in that also include:
Acquiring unit, user's face image information in the described terminal of described use adds before confidential information is decrypted to described, obtains the described user's face image information of described terminal by image acquiring device or obtains the described user's face image information stored from described terminal.
10. terminal according to claim 8 or claim 9, it is characterised in that described decryption unit specifically for:
The described confidential information that adds is decrypted by the described user's face image information of described terminal as decruption key, wherein, when described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, the encryption content of confidential information is added described in display, otherwise, decipher unsuccessfully, show random error information or predetermined error message.
CN201510459177.2A 2015-07-30 2015-07-30 Information encryption method, information decryption method and terminal Pending CN105635100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510459177.2A CN105635100A (en) 2015-07-30 2015-07-30 Information encryption method, information decryption method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510459177.2A CN105635100A (en) 2015-07-30 2015-07-30 Information encryption method, information decryption method and terminal

Publications (1)

Publication Number Publication Date
CN105635100A true CN105635100A (en) 2016-06-01

Family

ID=56049596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510459177.2A Pending CN105635100A (en) 2015-07-30 2015-07-30 Information encryption method, information decryption method and terminal

Country Status (1)

Country Link
CN (1) CN105635100A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038389A (en) * 2017-03-13 2017-08-11 上海青橙实业有限公司 Data encryption processing method, data deciphering processing method and mobile terminal
CN111787400A (en) * 2020-07-24 2020-10-16 苏州浪潮智能科技有限公司 Video communication identity authentication method, device, equipment and readable medium
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970659A (en) * 2012-11-12 2013-03-13 广东欧珀移动通信有限公司 Method for encryption transmission of short message
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN104023332A (en) * 2014-06-25 2014-09-03 上海斐讯数据通信技术有限公司 Electronic terminal and short message encrypting and decrypting method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970659A (en) * 2012-11-12 2013-03-13 广东欧珀移动通信有限公司 Method for encryption transmission of short message
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN104023332A (en) * 2014-06-25 2014-09-03 上海斐讯数据通信技术有限公司 Electronic terminal and short message encrypting and decrypting method thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038389A (en) * 2017-03-13 2017-08-11 上海青橙实业有限公司 Data encryption processing method, data deciphering processing method and mobile terminal
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device
CN111787400A (en) * 2020-07-24 2020-10-16 苏州浪潮智能科技有限公司 Video communication identity authentication method, device, equipment and readable medium

Similar Documents

Publication Publication Date Title
US8457308B2 (en) Communication system and method for protecting messages between two mobile phones
WO2016045469A1 (en) Information encryption method and mobile terminal
CN108200093B (en) Encryption and decryption method and encryption and decryption device for transmission file
WO2016045464A1 (en) Decryption method and mobile terminal
US20160314720A1 (en) Information encryption system and information encryption method using optical character recognition
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN105656870B (en) A kind of data transmission method, apparatus and system
CN107666395A (en) One population file management method, user terminal, group chat system
US20130251149A1 (en) Method and system for wireless transmission of content
CN101296349A (en) Video file enciphering/deciphering system and method
CN105281897A (en) File encryption method and device and file decryption method and device
CN109246110A (en) data sharing method and device
KR101067146B1 (en) Method for processing encrypted message in portable terminal and portable terminal
CN109547196B (en) Watch token system implementation method, watch token system and device
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN105635100A (en) Information encryption method, information decryption method and terminal
US11444897B2 (en) System and method for providing privacy control to message based communications
CN105391677A (en) Information transmission method and mobile terminal
CN101754209A (en) Method for protecting contents of mobile phone
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN105120452A (en) Information transmission method, device and system
CN112243000A (en) Application data processing method and device, computer equipment and storage medium
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN103632077A (en) Mobile terminal protection method and system and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160601

RJ01 Rejection of invention patent application after publication