CN105635100A - Information encryption method, information decryption method and terminal - Google Patents
Information encryption method, information decryption method and terminal Download PDFInfo
- Publication number
- CN105635100A CN105635100A CN201510459177.2A CN201510459177A CN105635100A CN 105635100 A CN105635100 A CN 105635100A CN 201510459177 A CN201510459177 A CN 201510459177A CN 105635100 A CN105635100 A CN 105635100A
- Authority
- CN
- China
- Prior art keywords
- information
- terminal
- user
- image information
- face image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Facsimile Transmission Control (AREA)
Abstract
The invention provides an information encryption method, an information decryption method and a terminal. The information encryption method comprises following steps: receiving a sending instruction for the information; encrypting the information according to the face image information corresponding to a receiving terminal for the information; sending the encrypted information to the receiving terminal, wherein the receiving terminal decrypts the encrypted information through face identification. Through the technical scheme, when the user sends encrypted information to the opposite terminal, the face image information of the opposite user is set as the encryption key of the encrypted information; the opposite terminal can decrypt the encrypted information only through obtaining the face image information of the user; the face image information is obtained by an image obtaining service such as a front camera; the security of the encrypted information is promoted; the encrypted information is effectively prevented from being leaked; moreover, the decryption process of the receiving terminal of the encrypted information is very convenient; the user operation of the receiving terminal is simplified; and the user experience is promoted.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of information ciphering method, a kind of information decryption method and a kind of terminal.
Background technology
At present, user, when the information such as the note in mobile phone are encrypted, generally require and will realize encryption in the encryption folders such as information importing safety box such as note.
But, this method operation that the information such as note are encrypted is more complicated, user itself or receive the password being required for input safety box when this user adding confidential information checks the content of the information such as note, it has not been convenient to the use of user. It addition, when the password leakage of safety box, can bring about the hidden danger of leakage of information, safety is relatively low.
Accordingly, it would be desirable to a kind of new technical scheme, it is possible to while guarantee adds the safety of confidential information, simplify the operation of user.
Summary of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, it is possible to while guarantee adds the safety of confidential information, simplifies the operation of user.
In view of this, a first aspect of the present invention proposes a kind of information ciphering method, for terminal, including: receive the transmission order of information; Described information is encrypted by facial image information corresponding to reception terminal according to described information; Described information after encryption is sent to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, also include: described reception terminal is arranged the described facial image information of correspondence.
In this technical scheme, can be that each the reception terminal on user terminal arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
A second aspect of the present invention proposes a kind of terminal, uses the information ciphering method in above-mentioned first aspect, including: receive unit, receive the transmission order of information; Ciphering unit, is encrypted described information according to the facial image information that the reception terminal of described information is corresponding; Transmitting element, is sent the described information after encryption to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that also include: unit is set, before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, described reception terminal is arranged the described facial image information of correspondence.
In this technical scheme, can be that each the reception terminal on user terminal arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
A third aspect of the present invention proposes a kind of information decryption method, for terminal, including: reception adds confidential information from transmission terminal; According to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that the user's face image information in the described terminal of described use adds before confidential information is decrypted to described, also includes: obtained the described user's face image information of described terminal by image acquiring device; Or from described terminal, obtain the described user's face image information stored.
In this technical scheme, the image acquiring device of user terminal can be utilized (such as, the front-facing camera of terminal, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of user terminal storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, preferably, described basis receive to the described viewing command adding confidential information, the described confidential information that adds is decrypted by the user's face image information using described terminal, specifically includes: the described user's face image information of described terminal as decruption key, the described confidential information that adds is decrypted; When described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, adds the encryption content of confidential information, otherwise described in display, decipher unsuccessfully, show random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then the encryption content adding confidential information displayed on the terminals, if comparison is inconsistent, will random error information displayed on the terminals (such as, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
A fourth aspect of the present invention proposes one terminal, use as the information decryption method according to any one of the above-mentioned third aspect, including: receiving unit, reception adds confidential information from transmission terminal; Decryption unit, according to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, preferably, also include: acquiring unit, user's face image information in the described terminal of described use adds before confidential information is decrypted to described, obtains the described user's face image information of described terminal by image acquiring device or obtains the described user's face image information stored from described terminal.
In this technical scheme, the image acquiring device of user terminal can be utilized (such as, the front-facing camera of terminal, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of user terminal storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, preferably, described decryption unit specifically for: the described confidential information that adds is decrypted by the described user's face image information of described terminal as decruption key, wherein, when described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, the encryption content of confidential information is added described in display, otherwise, decipher unsuccessfully, show random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then the encryption content adding confidential information displayed on the terminals, if comparison is inconsistent, will random error information displayed on the terminals (such as, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
Pass through technical scheme, when user adds confidential information to distant terminal transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, as long as the facial image information that distant terminal obtains user by image acquiring devices such as front-facing cameras can be decrypted adding confidential information, so, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also the decrypting process of the reception terminal adding confidential information it is very easy to, simplify the operation of recipient user, improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 illustrates the flow chart of information ciphering method according to an embodiment of the invention;
Fig. 2 illustrates the block diagram of terminal according to an embodiment of the invention;
Fig. 3 illustrates the flow chart of information decryption method according to an embodiment of the invention;
Fig. 4 illustrates the block diagram of terminal according to another embodiment of the invention;
Fig. 5 illustrates that transmission according to an embodiment of the invention adds the terminal interface schematic diagram of confidential information;
Fig. 6 illustrates the acquisition user's face image according to an embodiment of the invention terminal interface schematic diagram as decruption key;
Fig. 7 illustrates mess code information schematic diagram according to an embodiment of the invention;
Fig. 8 illustrates insignificant cleartext information schematic diagram according to an embodiment of the invention.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail. It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the flow chart of information ciphering method according to an embodiment of the invention.
As it is shown in figure 1, information ciphering method according to an embodiment of the invention, for terminal, including:
Step 102, receives the transmission order of information.
Step 104, is encrypted information according to the facial image information that the reception terminal of information is corresponding.
Step 106, sends the information after encryption to receiving terminal, the information after encryption is decrypted by facial recognition for receiving terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation receiving terminal use, improve Consumer's Experience.
In technique scheme, it is preferable that before step 104, also include: to receiving terminal, corresponding facial image information is set.
In this technical scheme, can be that each the reception terminal in terminal arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
Fig. 2 illustrates the block diagram of terminal according to an embodiment of the invention.
As in figure 2 it is shown, terminal 200 according to an embodiment of the invention, use the information ciphering method shown in Fig. 1, including: receive unit 202, receive the transmission order of information; Ciphering unit 204, is encrypted information according to the facial image information that the reception terminal of information is corresponding; Transmitting element 206, sends the information after encryption to receiving terminal, the information after encryption is decrypted by facial recognition for receiving terminal.
In this technical scheme, to when receiving terminal transmission information, can will receive facial image information corresponding to the terminal encryption key as this information, after this information is sent to reception terminal, receive terminal and just can be obtained the facial image information of own user by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that also include: arrange unit 208, before information is encrypted by facial image information corresponding to the reception terminal according to information, to the facial image information receiving terminal and arranging correspondence.
In this technical scheme, can be that each the reception terminal in terminal 200 arranges corresponding face-image, so just can automatically obtain the facial image information corresponding with receiving terminal when the information of transmission, and this facial image information is set to the encryption key of information. Pass through technique scheme, it is to avoid user will obtain the problem of once corresponding with receiving terminal face-image before each transmission information, convenient for users to use, improves Consumer's Experience.
Fig. 3 illustrates the flow chart of information decryption method according to an embodiment of the invention.
As it is shown on figure 3, information decryption method according to an embodiment of the invention, for terminal, including:
Step 302, reception adds confidential information from transmission terminal.
Step 304, according to receive to the viewing command adding confidential information, use the user's face image information of terminal to be decrypted adding confidential information.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, it is preferable that before step 304, also include: obtained the user's face image information of terminal by image acquiring device; Or from terminal, obtain the user's face image information stored.
In this technical scheme, the image acquiring device of user terminal can be utilized (such as, the front-facing camera of terminal, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of user terminal storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, it is preferable that step 304 specifically includes: the user's face image information of terminal is decrypted as decruption key adding confidential information; When terminal user's face image information with add in confidential information as the facial image information of preset-key consistent time, successful decryption, display adds the encryption content of confidential information, otherwise, decipher unsuccessfully, shows random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then the encryption content adding confidential information displayed on the terminals, if comparison is inconsistent, will random error information displayed on the terminals (such as, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
Fig. 4 illustrates the block diagram of terminal according to another embodiment of the invention.
As shown in Figure 4, terminal 400 according to another embodiment of the invention, use the information decryption method shown in Fig. 3, including: receiving unit 402, reception adds confidential information from transmission terminal; Decryption unit 404, according to receive to the viewing command adding confidential information, use the user's face image information of terminal 400 to be decrypted adding confidential information.
In this technical scheme, receive send terminal send add confidential information after, when user click this add confidential information time, the facial image information of own user just can be obtained by photographic head or other modes, this information received is decrypted by the facial image information thereby through own user, so, when receive terminal for the facial image information deciphered consistent with the facial image information in the encryption key of information time, namely can determine whether successful decryption, show the full content of this information. Such as, when user adds confidential information to the other user's transmission, the facial image information of the other user can be set to add the encryption key of confidential information, so, the terminal of the other user just can be opened front-facing camera and be obtained the facial image information of the other user when receiving and adding confidential information, thereby through this facial image information, this is added confidential information and is decrypted. Pass through technique scheme, employ the higher face recognition function of safety as encryption key, improve the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also it is very easy to the decrypting process of the reception terminal adding confidential information, simplifies the operation of recipient user, improve Consumer's Experience.
In technique scheme, preferably, also include: acquiring unit 406, using the user's face image information of terminal 400 to adding before confidential information is decrypted, obtain the user's face image information of terminal 400 by image acquiring device or from terminal 400, obtain the user's face image information stored.
In this technical scheme, the image acquiring device of user terminal 400 can be utilized (such as, the front-facing camera of mobile phone, post-positioned pick-up head etc.) obtain user's face image information, user's face image information can also be obtained from the picture library of terminal 400 storage, so, improve the multiformity obtaining user's face image information and convenience.
In technique scheme, preferably, decryption unit 404 specifically for: the user's face image information of terminal 400 is decrypted as decruption key adding confidential information, wherein, when terminal 400 user's face image information with add in confidential information as the facial image information of preset-key consistent time, successful decryption, display adds the encryption content of confidential information, otherwise, decipher unsuccessfully, show random error information or predetermined error message.
In this technical scheme, user's face image information can be utilized to be decrypted adding confidential information, the user's face image information of acquisition is compared with the facial image information as preset-key, if comparison result is consistent, then in terminal 400, display adds the encryption content of confidential information, if comparison is inconsistent, random error information will be shown (such as in terminal 400, mess code information) or predetermined error message, wherein, the content user of predetermined error message can oneself be write. By technique scheme, effectively prevent the leakage adding confidential information, and simple and quick, improve Consumer's Experience.
Fig. 5 illustrates that transmission according to an embodiment of the invention adds the terminal interface schematic diagram of confidential information.
As it is shown in figure 5, user is when adding confidential information to recipient's transmission, selects recipient's face-image to be encrypted as encryption key, just can click transmission button after confirmation is errorless, Encrypted short message is sent to recipient.
Fig. 6 illustrates the acquisition user's face image according to an embodiment of the invention terminal interface schematic diagram as decruption key.
As shown in Figure 6, when reception terminal receives and adds confidential information, the face-image that will automatically open up front-facing camera acquisition recipient is decrypted, if successful decryption, then can show correct encrypted content information in reception terminal.
If it addition, decipher unsuccessfully, then can show mess code information as shown in Figure 7 or insignificant cleartext information as shown in Figure 8 in reception terminal.
Technical scheme is described in detail above in association with accompanying drawing, pass through technical scheme, when user adds confidential information to distant terminal transmission, the facial image information of the other user can be set to add the encryption key of confidential information, as long as the facial image information that distant terminal obtains user by image acquiring devices such as front-facing cameras can be decrypted adding confidential information, thus improving the safety adding confidential information, effectively prevent the leakage adding confidential information, simultaneously, also the decrypting process of the reception terminal adding confidential information it is very easy to, simplify the operation receiving terminal use, improve Consumer's Experience.
In the present invention, term " first ", " second ", " the 3rd ", " the 4th " only for descriptive purposes, and it is not intended that instruction or hint relative importance. For the ordinary skill in the art, it is possible to understand above-mentioned term concrete meaning in the present invention as the case may be.
In the description of this specification, specific features, structure, material or feature that the description of term " embodiment ", " another embodiment " etc. means in conjunction with this embodiment or example describe are contained at least one embodiment or the example of the present invention. In this manual, the schematic representation of above-mentioned term is not necessarily referring to identical embodiment or example. And, the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiments or example.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations. All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.
Claims (10)
1. an information ciphering method, for terminal, it is characterised in that including:
The transmission order of reception information;
Described information is encrypted by facial image information corresponding to reception terminal according to described information;
Described information after encryption is sent to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
2. information ciphering method according to claim 1, it is characterised in that before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, also include:
Described reception terminal is arranged the described facial image information of correspondence.
3. a terminal, uses information ciphering method as claimed in claim 1 or 2, it is characterised in that including:
Receive unit, receive the transmission order of information;
Ciphering unit, is encrypted described information according to the facial image information that the reception terminal of described information is corresponding;
Transmitting element, is sent the described information after encryption to described reception terminal, by facial recognition, the described information after encryption is decrypted for described reception terminal.
4. terminal according to claim 3, it is characterised in that also include:
Unit is set, before described information is encrypted by the described facial image information corresponding according to the reception terminal of described information, described reception terminal is arranged the described facial image information of correspondence.
5. an information decryption method, for terminal, it is characterised in that including:
Reception adds confidential information from transmission terminal;
According to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
6. information decryption method according to claim 5, it is characterised in that the user's face image information in the described terminal of described use adds before confidential information is decrypted to described, also includes:
The described user's face image information of described terminal is obtained by image acquiring device; Or
The described user's face image information stored is obtained from described terminal.
7. the information decryption method according to claim 5 or 6, it is characterised in that described basis receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted, specifically include:
The described confidential information that adds is decrypted by the described user's face image information of described terminal as decruption key;
When described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, adds the encryption content of confidential information, otherwise described in display, decipher unsuccessfully, show random error information or predetermined error message.
8. a terminal, uses the information decryption method as according to any one of claim 5 to 7, it is characterised in that including:
Receiving unit, reception adds confidential information from transmission terminal;
Decryption unit, according to receive to the described viewing command adding confidential information, use the user's face image information of described terminal that the described confidential information that adds is decrypted.
9. terminal according to claim 8, it is characterised in that also include:
Acquiring unit, user's face image information in the described terminal of described use adds before confidential information is decrypted to described, obtains the described user's face image information of described terminal by image acquiring device or obtains the described user's face image information stored from described terminal.
10. terminal according to claim 8 or claim 9, it is characterised in that described decryption unit specifically for:
The described confidential information that adds is decrypted by the described user's face image information of described terminal as decruption key, wherein, when described terminal described user's face image information with described add in confidential information as the facial image information of preset-key consistent time, successful decryption, the encryption content of confidential information is added described in display, otherwise, decipher unsuccessfully, show random error information or predetermined error message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510459177.2A CN105635100A (en) | 2015-07-30 | 2015-07-30 | Information encryption method, information decryption method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510459177.2A CN105635100A (en) | 2015-07-30 | 2015-07-30 | Information encryption method, information decryption method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105635100A true CN105635100A (en) | 2016-06-01 |
Family
ID=56049596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510459177.2A Pending CN105635100A (en) | 2015-07-30 | 2015-07-30 | Information encryption method, information decryption method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105635100A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038389A (en) * | 2017-03-13 | 2017-08-11 | 上海青橙实业有限公司 | Data encryption processing method, data deciphering processing method and mobile terminal |
CN111787400A (en) * | 2020-07-24 | 2020-10-16 | 苏州浪潮智能科技有限公司 | Video communication identity authentication method, device, equipment and readable medium |
CN111859423A (en) * | 2020-07-17 | 2020-10-30 | 山东广鹏信息科技有限公司 | Information security encryption method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970659A (en) * | 2012-11-12 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method for encryption transmission of short message |
CN103400082A (en) * | 2013-08-16 | 2013-11-20 | 中科创达软件股份有限公司 | File encryption/decryption method and system |
CN104023332A (en) * | 2014-06-25 | 2014-09-03 | 上海斐讯数据通信技术有限公司 | Electronic terminal and short message encrypting and decrypting method thereof |
-
2015
- 2015-07-30 CN CN201510459177.2A patent/CN105635100A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970659A (en) * | 2012-11-12 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method for encryption transmission of short message |
CN103400082A (en) * | 2013-08-16 | 2013-11-20 | 中科创达软件股份有限公司 | File encryption/decryption method and system |
CN104023332A (en) * | 2014-06-25 | 2014-09-03 | 上海斐讯数据通信技术有限公司 | Electronic terminal and short message encrypting and decrypting method thereof |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038389A (en) * | 2017-03-13 | 2017-08-11 | 上海青橙实业有限公司 | Data encryption processing method, data deciphering processing method and mobile terminal |
CN111859423A (en) * | 2020-07-17 | 2020-10-30 | 山东广鹏信息科技有限公司 | Information security encryption method and device |
CN111787400A (en) * | 2020-07-24 | 2020-10-16 | 苏州浪潮智能科技有限公司 | Video communication identity authentication method, device, equipment and readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8457308B2 (en) | Communication system and method for protecting messages between two mobile phones | |
WO2016045469A1 (en) | Information encryption method and mobile terminal | |
CN108200093B (en) | Encryption and decryption method and encryption and decryption device for transmission file | |
WO2016045464A1 (en) | Decryption method and mobile terminal | |
US20160314720A1 (en) | Information encryption system and information encryption method using optical character recognition | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
CN105656870B (en) | A kind of data transmission method, apparatus and system | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
US20130251149A1 (en) | Method and system for wireless transmission of content | |
CN101296349A (en) | Video file enciphering/deciphering system and method | |
CN105281897A (en) | File encryption method and device and file decryption method and device | |
CN109246110A (en) | data sharing method and device | |
KR101067146B1 (en) | Method for processing encrypted message in portable terminal and portable terminal | |
CN109547196B (en) | Watch token system implementation method, watch token system and device | |
CN112182624A (en) | Encryption method, encryption device, storage medium and electronic equipment | |
CN105635100A (en) | Information encryption method, information decryption method and terminal | |
US11444897B2 (en) | System and method for providing privacy control to message based communications | |
CN105391677A (en) | Information transmission method and mobile terminal | |
CN101754209A (en) | Method for protecting contents of mobile phone | |
CN111818466B (en) | Information sending and receiving method and device, electronic equipment and readable storage medium | |
CN105120452A (en) | Information transmission method, device and system | |
CN112243000A (en) | Application data processing method and device, computer equipment and storage medium | |
US20150156173A1 (en) | Communication system utilizing fingerprint information and use thereof | |
CN103632077A (en) | Mobile terminal protection method and system and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160601 |
|
RJ01 | Rejection of invention patent application after publication |