CN105760735B - A kind of display methods and its device of mobile terminal encrypted content - Google Patents
A kind of display methods and its device of mobile terminal encrypted content Download PDFInfo
- Publication number
- CN105760735B CN105760735B CN201610088026.5A CN201610088026A CN105760735B CN 105760735 B CN105760735 B CN 105760735B CN 201610088026 A CN201610088026 A CN 201610088026A CN 105760735 B CN105760735 B CN 105760735B
- Authority
- CN
- China
- Prior art keywords
- preset
- encrypted content
- key information
- decryption
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 239000000284 extract Substances 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 11
- 238000000605 extraction Methods 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 4
- 210000003128 head Anatomy 0.000 description 41
- 230000015654 memory Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 210000005252 bulbus oculi Anatomy 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 5
- 230000002093 peripheral effect Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention belongs to technical field of mobile terminals, disclose a kind of display methods of mobile terminal encrypted content, comprising: automatic to start the first decryption key when opening encrypted content, judge whether first decryption key matches with preset key information, the encrypted content as described in display if matching;The head portrait for needing to shoot user when starting first decryption key is decrypted;Otherwise, start the second decryption key, detect whether second decryption key matches with preset key information, the encrypted content as described in display if matching, otherwise decryption failure.The encryption method reduces every time the cumbersome of input password, improves the safety of encrypted content, and also improve the usage experience of user.
Description
Technical field
The present invention relates to the display methods of technical field of mobile terminals more particularly to a kind of mobile terminal encrypted content and its
Device.
Background technique
As the intelligent terminals such as mobile phone, iPad are widely used in people's lives, mobile terminal and people's lives
It is closely coupled, not only have on mobile terminal various life APP (application, usually refer exclusively on mobile phone using soft
Part) application software, and the also under cover various small secrets for being reluctant to be understood by other people on the present mobile terminal of user.With not
Small secret with scene is more and more, and the password number that user needs to be arranged is also more and more.This will lead to user and checks these
It needs continually to input password when small secret, causes trouble to the operation of user.Moreover password is all inputted when using every time, is held
Easily reveal password, especially in densely populated public place, for example, on bus, on subway etc..
For the content for needing to be encrypted on mobile terminals, current general decryption method be manually entered every time it is close
Code carries out cryptographic check.If it is some encrypted contents for needing frequently to browse, require to be manually entered cryptographic check every time,
It not only operates more troublesome but also verifying password to be easy to be stolen by others, causes the leakage of information.
Summary of the invention
The present invention provides the display methods and its device of a kind of mobile terminal encrypted content, it is intended to solve in the prior art
The problem of needing cumbersome caused by frequently entering password and password to be easy leakage when checking encrypted content.
First aspect present invention provides a kind of display methods of mobile terminal encrypted content, comprising:
It is automatic to start the first decryption key when opening encrypted content, judge first decryption key and preset key
Whether information matches, the encrypted content as described in display if matching;
Otherwise, start the second decryption key, detect whether second decryption key matches with preset key information, such as
Matching then shows the encrypted content, otherwise decryption failure.
With reference to first aspect, in the first possible implementation of the first aspect, it is also wrapped before opening encrypted content
Include following steps:
The key information that the content setting encrypted will be needed preset, the preset key information include that mobile terminal is all
The prediction picture and presetting cipher of person, the prediction picture are merged with the presetting cipher.
With reference to first aspect, in the second possible implementation of the first aspect, the automatic starting first is decrypted
Secret key, judges whether first decryption key matches with preset key information, if matching encrypted content as described in display
Step specifically includes:
Automatic starting camera, is continuously shot the head portrait of the user of preset quantity in preset time;
The head portrait of the user of the preset quantity is matched with the prediction picture respectively, such as a wherein head portrait
With the prediction picture successful match, then preset key information is obtained, transfers the presetting cipher in the key information to institute
It states encrypted content to be decrypted automatically, to show the encrypted content.
With reference to first aspect, second of possibility of the first possibility of first aspect or first aspect, in first aspect
The third possible implementation in, the head portrait of the user of the preset quantity is matched with the prediction picture respectively
When, specifically:
The image information of the head portrait of the user of preset quantity is extracted respectively;
Extract the image feature data of prediction picture;
The image information of the head portrait and the image feature data of the prediction picture are compared, as correlation data accords with
Prerequisite is closed, then successful match, otherwise it fails to match.
With reference to first aspect, second of possibility of the first possibility of first aspect or first aspect, in first aspect
The 4th kind of possible implementation in, start the second decryption key, detecting the second decryption key with preset key information is
No matching, specifically includes the following steps:
Display is manually entered the prompting frame of password;
The password in the prompting frame is received, the password received and the preset key information are compared by turn,
If comparing result is identical, then matches, otherwise mismatch.
Second aspect of the present invention provides a kind of display device of mobile terminal encrypted content, comprising:
First deciphering module, for starting the first decryption key automatically first, by described first when opening encrypted content
Decryption key is matched with preset key information, the encrypted content as described in display if successful match;
Second deciphering module will be described for starting the second decryption key after first deciphering module decryption failure
Second decryption key is matched with preset key information, the encrypted content as described in display if successful match;Otherwise decryption is lost
It loses.
In conjunction with second aspect, in the first possible implementation of the second aspect, the display device further includes pre-
Module is set,
The preset key information of the content setting that the preset module is used to need to encrypt, the preset key information
Prediction picture and presetting cipher including user, the prediction picture are merged with the presetting cipher.
In conjunction with second aspect, in a second possible implementation of the second aspect, first deciphering module includes:
Image acquisition submodule, for starting camera automatically, in preset time in first deciphering module starting
Inside it is continuously shot the head portrait of the user of preset quantity;
Matched sub-block, for by the head portrait of the user of the preset quantity respectively with it is preset in the preset module
Image is matched, such as wherein head portrait and the prediction picture successful match, then obtains preset key information, transfer institute
The presetting cipher stated in key information decrypts the encrypted content automatically, to show the encrypted content.
The first possible or second aspect second in conjunction with second aspect, second aspect is possible, in second aspect
The third possible implementation in, the matched sub-block includes first extracting subelement, second extracting subelement and right
Compare subelement;
Described first extracts subelement, the image information of the head portrait of the user for extracting preset quantity respectively;
The second extraction subelement is used to extract the image feature data of prediction picture;
The image information that the contrast subunit is used to extract described first in subelement is extracted with described second respectively
Image feature data in subelement compares, and if correlation data meets prerequisite, then successful match, otherwise matches and lose
It loses.
The third in conjunction with second aspect is possible, in the fourth possible implementation of the second aspect, described second
Deciphering module includes receiving unit and detection unit;
The receiving unit is used to receive the password for being manually entered in the prompting frame of password;
The detection unit opens encryption if matching for detecting whether the password matches with preset key information
Content, otherwise prompt decoding failure.
From the embodiments of the present invention it is found that the present invention by starting the first decryption key first, the first decryption of starting is close
It is decrypted when spoon by shooting the head portrait of user, in the case where the first decryption key decrypts and fails, restarts the second solution
Secret key.Two kinds of manner of decryption are combined, reduces every time the cumbersome of input password, improves the safety of encrypted content,
And also improve the usage experience of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those skilled in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 is a kind of structural block diagram of mobile terminal;
Fig. 2 is the implementation process schematic diagram of the display methods of mobile terminal encrypted content in first embodiment of the invention;
Fig. 3 is the implementation process schematic diagram of the display methods of mobile terminal encrypted content in second embodiment of the invention;
Fig. 4 is the structural schematic diagram of the display device of mobile terminal encrypted content in third embodiment of the invention;
Fig. 5 is the structural schematic diagram of the display device of mobile terminal encrypted content in fourth embodiment of the invention;
Fig. 6 is the structural schematic diagram of matched sub-block in Fig. 5.
Specific embodiment
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality
Applying example is only a part of the embodiment of the present invention, and not all embodiments.Based on the embodiments of the present invention, those skilled in the art
Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of structural block diagram of mobile terminal.Mobile terminal encrypted content provided in an embodiment of the present invention
Display methods can be applied in mobile terminal 10 as shown in Figure 1, and mobile terminal 10 can be, but not limited to include: that need to rely on battery
Maintain smart phone, notebook, tablet computer, the wearing smart machine etc. that operate normally and support network and download function.
As shown in Figure 1, mobile terminal 10 includes memory 101, storage control 102, one or more (is only shown in figure
One) processor 103, Peripheral Interface 104, radio-frequency module 105, key module 106, audio-frequency module 107 and Touch Screen
108.These components are mutually communicated by one or more communication bus/signal wire 109.
It is appreciated that structure shown in FIG. 1 is only to illustrate, the structure of mobile terminal is not caused to limit.It is mobile whole
End 10 may also include than shown in Fig. 1 more perhaps less component or with the configuration different from shown in Fig. 1.It is shown in FIG. 1
Each component can be realized using hardware, software, or its combination.
Memory 101 can be used for storing software program and module, in the mobile terminal encryption in the embodiment of the present invention
The display methods and its device of appearance are storable in memory 101 in corresponding program instruction or module, and processor 103 passes through fortune
The software program and module that row is stored in memory 101 are realized thereby executing various function application and data processing
The display methods of above-mentioned mobile terminal 10.
Memory 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 101 can further comprise
The memory remotely located relative to processor 103, these remote memories can pass through network connection to mobile terminal 10.On
The example for stating network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.Processor 103
And other possible components can carry out the access of memory 101 under the control of storage control 102.
Various input/output devices are couple CPU (Central Processing Unit, center by Peripheral Interface 104
Processor) and memory 101.Various softwares, instruction in 103 run memory 101 of processor are to execute mobile terminal 10
Various functions and carry out data processing.
In some embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips
It realizes.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus with
Communication network or other equipment are communicated.Radio-frequency module 105 may include various existing for executing the electricity of these functions
Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, user's identity module (SIM)
Card, memory etc..Radio-frequency module 105 can with various networks for example internet, intranet, preset type wireless network into
Row communication is communicated by the wireless network of preset type with other equipment.The wireless network of above-mentioned preset type can
Including cellular telephone networks, WLAN or Metropolitan Area Network (MAN).The wireless network of above-mentioned preset type can be used various logical
Beacon standard, agreement and technology, including but not limited to global system for mobile communications (Global System for Mobile
Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE) is wide
Band Code Division Multiple Access (Wideband Code Division Multiple Access, W-CDMA), Code Division Multiple Access
(Code Division Access, CDMA), time division multiple access technology (Time Division Multiple Access, TDMA),
Bluetooth, adopting wireless fidelity technology (Wireless-Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE
802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), the networking telephone (Voice over
Internet Protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for
Microwave Access, Wi-Max), other for mail, instant messaging and short message agreement and any other is suitable
Communications protocol.
Key module 106 provides user's interface inputted to mobile terminal, and user can be by pressing difference
Key so that mobile terminal 10 executes different functions.Key in key module 106 can be physical button, be also possible to
Virtual touch key-press.
Audio-frequency module 107 to user provide audio interface, may include one or more microphones, one or more
Loudspeaker and voicefrequency circuit.Voicefrequency circuit receives voice data from Peripheral Interface 104, and voice data is converted to telecommunications
Breath, is transmitted to loudspeaker for power information.Power information is converted to the sound wave that human ear can be heard by loudspeaker.Voicefrequency circuit is also from Mike
Receive power information at wind, convert electrical signals to voice data, and by data transmission in network telephony carried out into Peripheral Interface 104 into
The processing of one step.Audio data can obtain from memory 101 or through radio-frequency module 105.In addition, audio data can also
To store into memory 101 or be sent by radio-frequency module 105.In some instances, audio-frequency module 107 can also wrap
It includes an earphone and broadcasts hole, for providing audio interface to earphone or other equipment.
Touch Screen 108 provides an output and input interface simultaneously between mobile terminal and user.Specifically, it touches
It controls screen 108 and shows video output to user, the content of these videos output may include text, figure, video and its any
Combination.Some outputs are the result is that correspond to some user interface objects.Touch Screen 108 also receives the input of user, example
The click of such as user, sliding gesture operation, so that user interface object responds the input of these users.Inspection
The technology for surveying user's input can be based on resistance-type, condenser type or any other possible touch control detection technology.Touch-control
The specific example of 108 display unit of screen includes but is not limited to liquid crystal display or light emitting polymer displays.
Referring to Fig. 2, Fig. 2 is the realization of the display methods for the mobile terminal encrypted content that first embodiment of the invention provides
Flow diagram.Display methods provided in this embodiment can be applied in mobile terminal 10 as shown in Figure 1, mainly include following
Step:
Step 201, when opening encrypted content, it is automatic to start the first decryption key, judge the first decryption key with it is preset
Whether key information matches, and shows encrypted content if matching;Need to shoot the head portrait of user when starting the first decryption key
It is decrypted.
Encrypted content is generally user according to oneself the meaning, it is believed that program, information, data of need for confidentiality etc., than
Such as, short message, QQ chat tool, wechat, photo, some file for preserving significant data etc..User is first in setting
First selection needs the content encrypted, then inputs key information.Identical key letter can be set in the content of all encryptions
Breath, also can according to need and different key informations is respectively set.When needing to open, the key information that only inputs with it is preset
Key information could unanimously open, encrypted content of otherwise not opening.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close
The one kind such as code, face information, finger print information, eyeball information, two or more of combinations.When preset key information be two kinds or
When a variety of password combinations, when opening encrypted content in actual use, two or more manner of decryption can be used, as long as wherein
A kind of password correctly be openable encrypted content.
Step 202, otherwise, starts the second decryption key, the second decryption key of detection and preset key information whether
Match, show encrypted content if matching, otherwise decryption failure.
Second decryption key is matched with preset key information, refers to the two comparison, identical.For example, preset
Having numerical ciphers in key information is 123123, then the second decryption key inputted also must be 123123, and the two is mobile whole
Matching Shi Caineng is carried out in end 10 to match, and is read to open encrypted content for user.If the second decryption of input is close
Spoon is 122123, then it fails to match with preset key information for the second decryption key, cannot open encrypted content.
It should be understood that starting the first decryption key first, second is just opened in the case where the first decryption key opens and fails
Decryption key, this is only one such embodiment.Certainly, it according to the habit of user or needs, also can choose
Start the second decryption key first, just opens the first decryption key, Huo Zhe in the case where the second decryption key opens and fails
Second decryption key is abandoned opening in the case where opening failure.
Referring to Fig. 3, being the realization stream of the display methods for the mobile terminal encrypted content that second embodiment of the invention provides
Journey schematic diagram.It mainly comprises the steps that
Step 301, the key information that the content setting encrypted will be needed preset, preset key information includes mobile terminal
The prediction picture and presetting cipher of the owner, prediction picture are merged with presetting cipher.By prediction picture and presetting cipher
Quick calling presetting cipher when can be convenient decryption is merged to be decrypted.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close
The one kind such as code, face information, finger print information, eyeball information, acoustic information, two or more of combinations.When preset key is believed
When breath is two or more password combinations, when opening encrypted content in actual use, two or more decryption sides can be used
Formula, as long as one such password is correctly openable encrypted content.It is, for example, possible to use face informations and digital cipher code set
It closes, is perhaps combined or can be used eyeball information and numerical ciphers using face information and digital alphabet mixed cipher
Combination, double or use acoustic information and digital password combination etc..When preset image is face information, the first decryption of starting
When secret key is decrypted, the facial image for needing to shoot user is decrypted;When preset image is eyeball information, starting
When first decryption key is decrypted, the eyeball image for needing to shoot user is decrypted.
Prediction picture is user when password is arranged, the head image information of the user of storage.The head portrait of storage can be
One width, is also possible to several at two width.In the multiple portraits of storage, the head portrait of a people can be, be also possible to two people or more
Personal head portrait.Or prediction picture can be shot the palm of user or some object with feature simultaneously
It is stored using as prediction picture.Excessive limitation is not done to the prediction picture of storage, user can be according to oneself
Actual needs go to be arranged.Presetting cipher is typically chosen numerical ciphers, and digit is traditionally arranged to be 6 or 8.
The head image information of user and preset password are merged, corresponding string number code can be generated.Into
When row decoding, it cracking can be positioned by corresponding string number code and extract presetting cipher to be decoded.
When user needs to change preset key information, either modification prediction picture still modifies presetting cipher,
Or both modify simultaneously, the presetting cipher in storage region and corresponding string number code also all synchronize change.
When step 302, unlatching encrypted content, automatic first decryption key that starts is decrypted.It clicks to open and needs to look into
When the encrypted content seen, system can automatic jump to the opening program of the first decryption key.When starting the first decryption key, backstage
Automatic starting camera, is continuously shot the head portrait of the user of preset quantity in preset time.During shooting, if
It detects ambient light deficiency, flash lamp can be automatically turned on.Preset quantity takes natural number, and general value is 1,2,3,4,5 etc., in advance
Setting the time is generally several seconds, for example, one second, two seconds, three seconds, four seconds etc..
The head portrait of the user of the preset quantity taken, can carry out preliminary image procossing, then with preset image
It is matched.
Image procossing (image processing) refers generally to Digital Image Processing.Digital picture refer to industrial camera,
The equipment such as video camera, scanner pass through the big two-dimensional array that shooting obtains, and the element of the array is known as pixel, and value claims
For gray value.Image processing techniques generally comprises compression of images, enhancing, recovery, matching, description and identifies this part.
Image procossing will extract certain features or specific information included in image, these features or information for being extracted
Image often is analyzed for computer, and convenience is provided.The process of extraction feature or information is the pre- place of pattern-recognition or computer vision
Reason.The feature of extraction may include many aspects, such as frequency domain character, gray scale or color characteristic, boundary characteristic, provincial characteristics, line
Manage feature, shape feature, topological characteristic and relational structure etc..The head portrait taken and prediction picture are carried out simply in the present invention
Image procossing, two images are compared and analyzed with facilitating.
The head portrait that step 303, circulation extract user is matched with prediction picture respectively.
Specifically, the image information of the head portrait of the user of preset quantity is extracted respectively, in general, the head portrait of user can
To shoot multiple.
Extract the image feature data of prediction picture.
The image information of the head portrait of multiple users is compared with the image feature data of prediction picture respectively, it is such as right
Than data fit prerequisite, then successful match, otherwise it fails to match.
Prerequisite may be configured as the similarity obtained after two image comparisons be greater than 95%, or be greater than 98%.
Step 304 judges whether matching succeeds.Wherein a head portrait and prediction picture successful match, then calculate successful match.
By the matching of multiple pictures, as long as improving the success rate of the first decryption key decryption even if there is a successful match success.
Such as successful match, then step 305 is gone to;Otherwise step 307 is gone to.
Step 305, the automatic preset key information obtained with head image information binding.It is quickly found out according to prediction picture
Presetting cipher in merging data.
Step 306, the presetting cipher transferred in key information are decrypted automatically, and decryption terminates.From click encrypted content
The head portrait of user is shot to starting the first decryption key, then to automatic starting camera, then will be shot resulting
Photo is matched with prediction picture, unlocks password or inextricable password, in total the time-consuming time for generally requiring several seconds.
Whether step 307, the second decryption key of detection match with preset key information.When opening the second decryption key,
Display is manually entered the prompting frame of password.Input password prompting frame can be shown in the display interface of mobile terminal, or
Person is in display along with voice messaging prompts.
Whether the password in step 308, reception prompting frame, the password for detecting input match with preset key information.
When judging whether the password of input matches with the presetting cipher in preset key information, need in complete correspondence,
Just think successful match, otherwise it fails to match.Each digit in the numerical ciphers inputted requires the phase with presetting cipher
The each digit answered is identical.
Step 309 judges that the password of input matches with preset key information and whether succeeds, and step is executed if successful match
Rapid 310;It is no to then follow the steps 311.
Step 310 opens encrypted content, successful decryption using presetting cipher.User can see the content of encryption.
Step 311, decryption failure, show decryption failure, or be output by voice on the display interface of the mobile terminal
Decryption failure.User cannot see that the content of encryption.
First, second kind of embodiment of the invention is due to being no longer that ciphertext letter is decrypted by being manually entered password every time
Breath, but first passes through automatic camera, and whether the image for detecting currently used person is information phase with the prediction picture prestored
Match.It is decrypted automatically if it does, then obtaining with the key information for prestoring the binding of user's information, if it does not match, opening
Dynamic second decryption key, that is, provide and be manually entered password window, is manually entered password decryption.By by both manner of decryption phases
In conjunction with greatly facilitating user, reduce and need to input the troublesome operation of password every time, improve mobile terminal uses body
It tests, while also improving the safety of encrypted content.
Referring to Fig. 4, Fig. 4 is the knot of the display device for the mobile terminal encrypted content that the third embodiment of the invention provides
Structure schematic diagram, the display device of the mobile terminal specifically include that the first deciphering module 401 and the second deciphering module 402.Each function
Detailed description are as follows for module:
First deciphering module 401, for starting the first decryption key automatically first, by first when opening encrypted content
Decryption key is matched with preset key information, shows that encrypted content, the first decryption key include if successful match
The head portrait of user.
Encrypted content is generally user according to oneself the meaning, it is believed that program, information, data of need for confidentiality etc., than
Such as, short message, QQ chat tool, wechat, photo, some file for preserving significant data etc..User is first in setting
First selection needs the content encrypted, then inputs key information.Identical key letter can be set in the content of all encryptions
Breath, also can according to need and different key informations is respectively set.When needing to open, the key information that only inputs with it is preset
Key information could unanimously open, encrypted content of otherwise not opening.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close
The one kind such as code, face information, finger print information, eyeball information, two or more of combinations.When preset key information be two kinds or
When a variety of password combinations, when opening encrypted content in actual use, two or more manner of decryption can be used, as long as wherein
A kind of password correctly be openable encrypted content.
Second deciphering module 402, for starting the second decryption key, by the after the decryption failure of the first deciphering module 401
Two decryption keys are matched with preset key information, and encrypted content is opened if successful match;Otherwise decryption failure.
The decryption failure of first deciphering module 401, i.e., carry out automatic camera by the first decryption key, and make what is taken
The head portrait of user is compared with prediction picture, and obtained comparison similarity is poor, is not met preset similarity data, cannot be beaten
Open encrypted content.
Second decryption key is generally traditional manner of decryption, i.e., is decoded by way of inputting password, as institute is defeated
The password entered and preset password are completely the same, then can open encrypted content, otherwise cannot open encrypted content.
It should be understood that starting the first decryption key first, second is just opened in the case where the first decryption key opens and fails
Decryption key, this is only one such embodiment.Certainly, it according to the habit of user or needs, also can choose
Start the second decryption key first, just opens the first decryption key, Huo Zhe in the case where the second decryption key opens and fails
Second decryption key is abandoned opening in the case where opening failure.
Fig. 5 and Fig. 6 are please referred to, is the display device for the mobile terminal encrypted content that the 4th kind of embodiment of the invention provides
Structural schematic diagram, the display device of the mobile terminal specifically include that preset module 50, the first deciphering module 51 and the second decryption mould
Block 52.Detailed description are as follows for each functional module:
Preset module 50, the preset key information of content setting for that will need to encrypt, preset key information include
The prediction picture and presetting cipher of user, prediction picture are merged with presetting cipher.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close
The one kind such as code, face information, finger print information, eyeball information, acoustic information, two or more of combinations.When preset key is believed
When breath is two or more password combinations, when opening encrypted content in actual use, two or more decryption sides can be used
Formula, as long as one such password is correctly openable encrypted content.It is, for example, possible to use face informations and digital cipher code set
It closes, is perhaps combined or can be used eyeball information and numerical ciphers using face information and digital alphabet mixed cipher
Combination, double or use acoustic information and digital password combination etc..
Prediction picture is user when password is arranged, the head image information of the user of storage.The head portrait of storage can be
One width, is also possible to several at two width.In the multiple portraits of storage, the head portrait of a people can be, be also possible to two people or more
Personal head portrait.Or prediction picture can be shot the palm of user or some object with feature simultaneously
It is stored using as prediction picture.Excessive limitation is not done to the prediction picture of storage, user can be according to oneself
Actual needs go to be arranged.Presetting cipher is typically chosen numerical ciphers, and digit is traditionally arranged to be 6 or 8.
The head image information of user and preset password are merged, corresponding string number code can be generated.Into
When row decoding, passing through corresponding string number code cracking positioning and can extract presetting cipher to be decoded, so as to
Improve decoded speed.
When user needs to change preset key information, either modification prediction picture still modifies presetting cipher,
Or both modify simultaneously, the presetting cipher in storage region and corresponding string number code also all synchronize change.
First deciphering module 51 may include following submodule:
Image acquisition submodule 511, for starting camera automatically, when preset in the starting of the first deciphering module 51
The head portrait of the interior user for being continuously shot preset quantity.Preset time generally using the second as magnitude unit, for example, one second, two seconds,
Three seconds, four seconds etc..Preset quantity is natural number, and general value is 1,2,3,4,5 etc..By two head portrait pictures and prediction picture into
Row compares and carries out the decoded time and compares five head portrait pictures and prediction picture and carry out decoded time phase difference
And less.
Matched sub-block 512, for by the head portrait of the user of preset quantity respectively with the preset figure in preset module 50
As being matched, such as wherein a head portrait and prediction picture successful match then obtain preset key information, transfer key information
In presetting cipher decrypted automatically;Otherwise start the second deciphering module 52.
Referring to Fig. 6, successively executing first when being matched and extracting the extraction of subelement 5121, second 5122 and of subelement
Contrast subunit 5123.
First extracts subelement 5121, the image information of the head portrait of the user for extracting preset quantity respectively.
Second extracts subelement 5122, for extracting the image feature data of prediction picture.
Contrast subunit 5123 extracts son list for extracting the image information in subelement 5121 by first with second respectively
Image feature data in member 5122 compares, and if correlation data meets prerequisite, then successful match, otherwise matches and lose
It loses.
Second deciphering module 52 specifically includes receiving unit 521 and detection unit 522.The function of each unit specifically:
Receiving unit 521, for receiving the password in the prompting frame for supplying to be manually entered password.Mould is decrypted in starting second
When block 52, the processor that receiving unit 512 controls in mobile terminal please input the prompt of password in the interface display of mobile terminal
Frame, and be after user inputs password, by the cipher feedback of input to detection unit 522.
Whether detection unit 522 matches for detecting password with preset key information, opens in encryption if matching
Hold, otherwise prompt decoding failure.After decoding failure, user can execute the second deciphering module 52 again, input password again
It is decrypted.
When the encryption device that the above embodiment of the present invention provides carries out opening encrypted content, automatic camera is selected first, is mentioned
It is derived from the image information of the head portrait of the dynamic user taken, image information is matched with prediction picture, such as successful match
Key information is then obtained to be decrypted automatically, it is as unsuccessful in matched, select second of manner of decryption, i.e., it is close by being manually entered
The mode of code is decrypted.Both manner of decryption are used in combination with, the cumbersome behaviour for needing to input password every time is reduced
Make, improves the usage experience of user, and also improve the safety of encrypted content.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, encryption device embodiment described above is only schematical, for example, the module is drawn
Point, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple module or components can
To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be through some interfaces, the INDIRECT COUPLING of device or module
Or communication connection, it can be electrical property, mechanical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module
It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
It should be noted that for the various method embodiments described above, describing for simplicity, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules might not all be this hair
Necessary to bright.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
The above are to a kind of description of video recording method and device based on multi-cam provided by the present invention, for
Those skilled in the art, thought according to an embodiment of the present invention have change in specific embodiments and applications
Place, to sum up, the contents of this specification are not to be construed as limiting the invention.
Claims (6)
1. a kind of display methods of mobile terminal encrypted content characterized by comprising
It is automatic to start the first decryption key when opening encrypted content, judge first decryption key and preset key information
Whether match, the encrypted content as described in display if matching;
Otherwise, start the second decryption key, detect whether second decryption key matches with preset key information, such as match
Then show the encrypted content, otherwise decryption failure;
It is further comprising the steps of before opening encrypted content:
The key information that the content setting encrypted will be needed preset, the preset key information includes the mobile terminal owner
Prediction picture and presetting cipher, the prediction picture are merged with the presetting cipher;
First decryption key of automatic starting, judges whether first decryption key matches with preset key information, such as
The step of matching then shows the encrypted content specifically includes:
Automatic starting camera, is continuously shot the head portrait of the user of preset quantity in preset time;
The head portrait of the user of the preset quantity is matched with the prediction picture respectively, such as wherein a head portrait and institute
Prediction picture successful match is stated, then obtains preset key information, the presetting cipher transferred in the key information adds to described
Close content is decrypted automatically, to show the encrypted content.
2. display methods according to claim 1, which is characterized in that distinguish the head portrait of the user of the preset quantity
When being matched with the prediction picture, specifically:
The image information of the head portrait of the user of preset quantity is extracted respectively;
Extract the image feature data of prediction picture;
The image information of the head portrait and the image feature data of the prediction picture are compared, as correlation data meet it is pre-
Condition is set, then successful match, otherwise it fails to match.
3. display methods according to claim 1 or 2, which is characterized in that the second decryption key of starting, the second decryption of detection
Whether secret key matches with preset key information, specifically includes the following steps:
Display is manually entered the prompting frame of password;
The password in the prompting frame is received, the password received and the preset key information are compared by turn, it is such as right
It is more identical than result, then it matches, otherwise mismatches.
4. a kind of display device of mobile terminal encrypted content characterized by comprising
First deciphering module, for starting the first decryption key automatically first, described first being decrypted when opening encrypted content
Secret key is matched with preset key information, the encrypted content as described in display if successful match;
Second deciphering module, for starting the second decryption key, by described second after first deciphering module decryption failure
Decryption key is matched with preset key information, the encrypted content as described in display if successful match;Otherwise decryption failure;Institute
Stating display device further includes preset module,
The preset key information of the content setting that the preset module is used to need to encrypt, the preset key information include
The prediction picture and presetting cipher of user, the prediction picture are merged with the presetting cipher;
First deciphering module includes:
Image acquisition submodule, for starting camera automatically, connecting in preset time in first deciphering module starting
The head portrait of the user of continuous shooting preset quantity;
Matched sub-block, for by the head portrait of the user of the preset quantity respectively with the prediction picture in the preset module
It is matched, such as wherein head portrait and the prediction picture successful match, then obtains preset key information, transfer described close
Presetting cipher in key information decrypts the encrypted content automatically, to show the encrypted content.
5. display device according to claim 4, which is characterized in that the matched sub-block includes that the first extraction is single
Member, second extract subelement and contrast subunit;
Described first extracts subelement, the image information of the head portrait of the user for extracting preset quantity respectively;
The second extraction subelement is used to extract the image feature data of prediction picture;
It is single that the image information that the contrast subunit is used to extract in subelement by described first extracts son with described second respectively
Image feature data in member compares, and if correlation data meets prerequisite, then successful match, otherwise it fails to match.
6. display device according to claim 4 or 5, which is characterized in that second deciphering module includes receiving unit
And detection unit;
The receiving unit is used to receive the password for being manually entered in the prompting frame of password;
The detection unit is opened in encryption if matching for detecting whether the password matches with preset key information
Hold, otherwise prompt decoding failure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610088026.5A CN105760735B (en) | 2016-02-16 | 2016-02-16 | A kind of display methods and its device of mobile terminal encrypted content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610088026.5A CN105760735B (en) | 2016-02-16 | 2016-02-16 | A kind of display methods and its device of mobile terminal encrypted content |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105760735A CN105760735A (en) | 2016-07-13 |
CN105760735B true CN105760735B (en) | 2019-04-23 |
Family
ID=56330779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610088026.5A Expired - Fee Related CN105760735B (en) | 2016-02-16 | 2016-02-16 | A kind of display methods and its device of mobile terminal encrypted content |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105760735B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983924A (en) * | 2006-05-30 | 2007-06-20 | 华为技术有限公司 | Decoding switch method, decoder and terminal equipment |
CN103425912A (en) * | 2012-04-27 | 2013-12-04 | 网秦无限(北京)科技有限公司 | Safety device and display method thereof |
CN104700010A (en) * | 2013-12-05 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Personal information protection method and protection device |
CN104915583A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Interface decryption processing method and mobile terminal |
CN105260669A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Transmission method and system of pictures |
CN105262756A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus |
CN105303085A (en) * | 2015-10-28 | 2016-02-03 | 广东欧珀移动通信有限公司 | File sharing method and sharing system |
-
2016
- 2016-02-16 CN CN201610088026.5A patent/CN105760735B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983924A (en) * | 2006-05-30 | 2007-06-20 | 华为技术有限公司 | Decoding switch method, decoder and terminal equipment |
CN103425912A (en) * | 2012-04-27 | 2013-12-04 | 网秦无限(北京)科技有限公司 | Safety device and display method thereof |
CN104700010A (en) * | 2013-12-05 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Personal information protection method and protection device |
CN104915583A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Interface decryption processing method and mobile terminal |
CN105260669A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Transmission method and system of pictures |
CN105262756A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus |
CN105303085A (en) * | 2015-10-28 | 2016-02-03 | 广东欧珀移动通信有限公司 | File sharing method and sharing system |
Also Published As
Publication number | Publication date |
---|---|
CN105760735A (en) | 2016-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103916233B (en) | A kind of information ciphering method and device | |
CN104700010A (en) | Personal information protection method and protection device | |
CN106101743B (en) | Panoramic video recognition methods and device | |
CN106484484B (en) | Application program installs management method and terminal device | |
CN104182675A (en) | Mobile equipment terminal and application hiding system and application hiding and starting method thereof | |
CN104967511A (en) | Processing method for enciphered data, and apparatus thereof | |
CN104994098B (en) | Document transmission method and relevant apparatus and Transmission system | |
US20070150415A1 (en) | Method and apparatus for creating and entering a PIN code | |
CN106454800B (en) | Auth method, apparatus and system | |
CN106611402B (en) | Image processing method and device | |
CN104834847A (en) | Identity verification method and device | |
CN104038613B (en) | The method and apparatus of information security management | |
CN109561056B (en) | Secret communication method, system, mobile terminal and wearable device | |
CN104333643B (en) | Add the method for contact person, system and terminal | |
CN104270516B (en) | Decryption method and mobile terminal | |
CN108702607A (en) | A kind of more equipment wireless connection methods and equipment | |
CN106406947B (en) | The method and device that prevents system service process from restarting, mobile terminal | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN108347464A (en) | Operating status synchronous method, system and the electronic equipment of application program | |
CN105610873A (en) | Identity authentication method and device | |
CN109828810A (en) | Screen shots intercept method, watermark adding method, device, equipment and medium | |
KR101633965B1 (en) | User security authentication system in internet and method thereof | |
CN107678798A (en) | A kind of SIM card fast initializing method, device and computer-readable recording medium | |
CN105281907A (en) | Encrypted data processing method and apparatus | |
KR102351491B1 (en) | Security management system using user mobile terminal and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190423 |