CN105760735B - A kind of display methods and its device of mobile terminal encrypted content - Google Patents

A kind of display methods and its device of mobile terminal encrypted content Download PDF

Info

Publication number
CN105760735B
CN105760735B CN201610088026.5A CN201610088026A CN105760735B CN 105760735 B CN105760735 B CN 105760735B CN 201610088026 A CN201610088026 A CN 201610088026A CN 105760735 B CN105760735 B CN 105760735B
Authority
CN
China
Prior art keywords
preset
encrypted content
key information
decryption
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610088026.5A
Other languages
Chinese (zh)
Other versions
CN105760735A (en
Inventor
张烨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610088026.5A priority Critical patent/CN105760735B/en
Publication of CN105760735A publication Critical patent/CN105760735A/en
Application granted granted Critical
Publication of CN105760735B publication Critical patent/CN105760735B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention belongs to technical field of mobile terminals, disclose a kind of display methods of mobile terminal encrypted content, comprising: automatic to start the first decryption key when opening encrypted content, judge whether first decryption key matches with preset key information, the encrypted content as described in display if matching;The head portrait for needing to shoot user when starting first decryption key is decrypted;Otherwise, start the second decryption key, detect whether second decryption key matches with preset key information, the encrypted content as described in display if matching, otherwise decryption failure.The encryption method reduces every time the cumbersome of input password, improves the safety of encrypted content, and also improve the usage experience of user.

Description

A kind of display methods and its device of mobile terminal encrypted content
Technical field
The present invention relates to the display methods of technical field of mobile terminals more particularly to a kind of mobile terminal encrypted content and its Device.
Background technique
As the intelligent terminals such as mobile phone, iPad are widely used in people's lives, mobile terminal and people's lives It is closely coupled, not only have on mobile terminal various life APP (application, usually refer exclusively on mobile phone using soft Part) application software, and the also under cover various small secrets for being reluctant to be understood by other people on the present mobile terminal of user.With not Small secret with scene is more and more, and the password number that user needs to be arranged is also more and more.This will lead to user and checks these It needs continually to input password when small secret, causes trouble to the operation of user.Moreover password is all inputted when using every time, is held Easily reveal password, especially in densely populated public place, for example, on bus, on subway etc..
For the content for needing to be encrypted on mobile terminals, current general decryption method be manually entered every time it is close Code carries out cryptographic check.If it is some encrypted contents for needing frequently to browse, require to be manually entered cryptographic check every time, It not only operates more troublesome but also verifying password to be easy to be stolen by others, causes the leakage of information.
Summary of the invention
The present invention provides the display methods and its device of a kind of mobile terminal encrypted content, it is intended to solve in the prior art The problem of needing cumbersome caused by frequently entering password and password to be easy leakage when checking encrypted content.
First aspect present invention provides a kind of display methods of mobile terminal encrypted content, comprising:
It is automatic to start the first decryption key when opening encrypted content, judge first decryption key and preset key Whether information matches, the encrypted content as described in display if matching;
Otherwise, start the second decryption key, detect whether second decryption key matches with preset key information, such as Matching then shows the encrypted content, otherwise decryption failure.
With reference to first aspect, in the first possible implementation of the first aspect, it is also wrapped before opening encrypted content Include following steps:
The key information that the content setting encrypted will be needed preset, the preset key information include that mobile terminal is all The prediction picture and presetting cipher of person, the prediction picture are merged with the presetting cipher.
With reference to first aspect, in the second possible implementation of the first aspect, the automatic starting first is decrypted Secret key, judges whether first decryption key matches with preset key information, if matching encrypted content as described in display Step specifically includes:
Automatic starting camera, is continuously shot the head portrait of the user of preset quantity in preset time;
The head portrait of the user of the preset quantity is matched with the prediction picture respectively, such as a wherein head portrait With the prediction picture successful match, then preset key information is obtained, transfers the presetting cipher in the key information to institute It states encrypted content to be decrypted automatically, to show the encrypted content.
With reference to first aspect, second of possibility of the first possibility of first aspect or first aspect, in first aspect The third possible implementation in, the head portrait of the user of the preset quantity is matched with the prediction picture respectively When, specifically:
The image information of the head portrait of the user of preset quantity is extracted respectively;
Extract the image feature data of prediction picture;
The image information of the head portrait and the image feature data of the prediction picture are compared, as correlation data accords with Prerequisite is closed, then successful match, otherwise it fails to match.
With reference to first aspect, second of possibility of the first possibility of first aspect or first aspect, in first aspect The 4th kind of possible implementation in, start the second decryption key, detecting the second decryption key with preset key information is No matching, specifically includes the following steps:
Display is manually entered the prompting frame of password;
The password in the prompting frame is received, the password received and the preset key information are compared by turn, If comparing result is identical, then matches, otherwise mismatch.
Second aspect of the present invention provides a kind of display device of mobile terminal encrypted content, comprising:
First deciphering module, for starting the first decryption key automatically first, by described first when opening encrypted content Decryption key is matched with preset key information, the encrypted content as described in display if successful match;
Second deciphering module will be described for starting the second decryption key after first deciphering module decryption failure Second decryption key is matched with preset key information, the encrypted content as described in display if successful match;Otherwise decryption is lost It loses.
In conjunction with second aspect, in the first possible implementation of the second aspect, the display device further includes pre- Module is set,
The preset key information of the content setting that the preset module is used to need to encrypt, the preset key information Prediction picture and presetting cipher including user, the prediction picture are merged with the presetting cipher.
In conjunction with second aspect, in a second possible implementation of the second aspect, first deciphering module includes:
Image acquisition submodule, for starting camera automatically, in preset time in first deciphering module starting Inside it is continuously shot the head portrait of the user of preset quantity;
Matched sub-block, for by the head portrait of the user of the preset quantity respectively with it is preset in the preset module Image is matched, such as wherein head portrait and the prediction picture successful match, then obtains preset key information, transfer institute The presetting cipher stated in key information decrypts the encrypted content automatically, to show the encrypted content.
The first possible or second aspect second in conjunction with second aspect, second aspect is possible, in second aspect The third possible implementation in, the matched sub-block includes first extracting subelement, second extracting subelement and right Compare subelement;
Described first extracts subelement, the image information of the head portrait of the user for extracting preset quantity respectively;
The second extraction subelement is used to extract the image feature data of prediction picture;
The image information that the contrast subunit is used to extract described first in subelement is extracted with described second respectively Image feature data in subelement compares, and if correlation data meets prerequisite, then successful match, otherwise matches and lose It loses.
The third in conjunction with second aspect is possible, in the fourth possible implementation of the second aspect, described second Deciphering module includes receiving unit and detection unit;
The receiving unit is used to receive the password for being manually entered in the prompting frame of password;
The detection unit opens encryption if matching for detecting whether the password matches with preset key information Content, otherwise prompt decoding failure.
From the embodiments of the present invention it is found that the present invention by starting the first decryption key first, the first decryption of starting is close It is decrypted when spoon by shooting the head portrait of user, in the case where the first decryption key decrypts and fails, restarts the second solution Secret key.Two kinds of manner of decryption are combined, reduces every time the cumbersome of input password, improves the safety of encrypted content, And also improve the usage experience of user.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those skilled in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is a kind of structural block diagram of mobile terminal;
Fig. 2 is the implementation process schematic diagram of the display methods of mobile terminal encrypted content in first embodiment of the invention;
Fig. 3 is the implementation process schematic diagram of the display methods of mobile terminal encrypted content in second embodiment of the invention;
Fig. 4 is the structural schematic diagram of the display device of mobile terminal encrypted content in third embodiment of the invention;
Fig. 5 is the structural schematic diagram of the display device of mobile terminal encrypted content in fourth embodiment of the invention;
Fig. 6 is the structural schematic diagram of matched sub-block in Fig. 5.
Specific embodiment
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality Applying example is only a part of the embodiment of the present invention, and not all embodiments.Based on the embodiments of the present invention, those skilled in the art Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of structural block diagram of mobile terminal.Mobile terminal encrypted content provided in an embodiment of the present invention Display methods can be applied in mobile terminal 10 as shown in Figure 1, and mobile terminal 10 can be, but not limited to include: that need to rely on battery Maintain smart phone, notebook, tablet computer, the wearing smart machine etc. that operate normally and support network and download function.
As shown in Figure 1, mobile terminal 10 includes memory 101, storage control 102, one or more (is only shown in figure One) processor 103, Peripheral Interface 104, radio-frequency module 105, key module 106, audio-frequency module 107 and Touch Screen 108.These components are mutually communicated by one or more communication bus/signal wire 109.
It is appreciated that structure shown in FIG. 1 is only to illustrate, the structure of mobile terminal is not caused to limit.It is mobile whole End 10 may also include than shown in Fig. 1 more perhaps less component or with the configuration different from shown in Fig. 1.It is shown in FIG. 1 Each component can be realized using hardware, software, or its combination.
Memory 101 can be used for storing software program and module, in the mobile terminal encryption in the embodiment of the present invention The display methods and its device of appearance are storable in memory 101 in corresponding program instruction or module, and processor 103 passes through fortune The software program and module that row is stored in memory 101 are realized thereby executing various function application and data processing The display methods of above-mentioned mobile terminal 10.
Memory 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 101 can further comprise The memory remotely located relative to processor 103, these remote memories can pass through network connection to mobile terminal 10.On The example for stating network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.Processor 103 And other possible components can carry out the access of memory 101 under the control of storage control 102.
Various input/output devices are couple CPU (Central Processing Unit, center by Peripheral Interface 104 Processor) and memory 101.Various softwares, instruction in 103 run memory 101 of processor are to execute mobile terminal 10 Various functions and carry out data processing.
In some embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips It realizes.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus with Communication network or other equipment are communicated.Radio-frequency module 105 may include various existing for executing the electricity of these functions Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, user's identity module (SIM) Card, memory etc..Radio-frequency module 105 can with various networks for example internet, intranet, preset type wireless network into Row communication is communicated by the wireless network of preset type with other equipment.The wireless network of above-mentioned preset type can Including cellular telephone networks, WLAN or Metropolitan Area Network (MAN).The wireless network of above-mentioned preset type can be used various logical Beacon standard, agreement and technology, including but not limited to global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE) is wide Band Code Division Multiple Access (Wideband Code Division Multiple Access, W-CDMA), Code Division Multiple Access (Code Division Access, CDMA), time division multiple access technology (Time Division Multiple Access, TDMA), Bluetooth, adopting wireless fidelity technology (Wireless-Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), the networking telephone (Voice over Internet Protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other for mail, instant messaging and short message agreement and any other is suitable Communications protocol.
Key module 106 provides user's interface inputted to mobile terminal, and user can be by pressing difference Key so that mobile terminal 10 executes different functions.Key in key module 106 can be physical button, be also possible to Virtual touch key-press.
Audio-frequency module 107 to user provide audio interface, may include one or more microphones, one or more Loudspeaker and voicefrequency circuit.Voicefrequency circuit receives voice data from Peripheral Interface 104, and voice data is converted to telecommunications Breath, is transmitted to loudspeaker for power information.Power information is converted to the sound wave that human ear can be heard by loudspeaker.Voicefrequency circuit is also from Mike Receive power information at wind, convert electrical signals to voice data, and by data transmission in network telephony carried out into Peripheral Interface 104 into The processing of one step.Audio data can obtain from memory 101 or through radio-frequency module 105.In addition, audio data can also To store into memory 101 or be sent by radio-frequency module 105.In some instances, audio-frequency module 107 can also wrap It includes an earphone and broadcasts hole, for providing audio interface to earphone or other equipment.
Touch Screen 108 provides an output and input interface simultaneously between mobile terminal and user.Specifically, it touches It controls screen 108 and shows video output to user, the content of these videos output may include text, figure, video and its any Combination.Some outputs are the result is that correspond to some user interface objects.Touch Screen 108 also receives the input of user, example The click of such as user, sliding gesture operation, so that user interface object responds the input of these users.Inspection The technology for surveying user's input can be based on resistance-type, condenser type or any other possible touch control detection technology.Touch-control The specific example of 108 display unit of screen includes but is not limited to liquid crystal display or light emitting polymer displays.
Referring to Fig. 2, Fig. 2 is the realization of the display methods for the mobile terminal encrypted content that first embodiment of the invention provides Flow diagram.Display methods provided in this embodiment can be applied in mobile terminal 10 as shown in Figure 1, mainly include following Step:
Step 201, when opening encrypted content, it is automatic to start the first decryption key, judge the first decryption key with it is preset Whether key information matches, and shows encrypted content if matching;Need to shoot the head portrait of user when starting the first decryption key It is decrypted.
Encrypted content is generally user according to oneself the meaning, it is believed that program, information, data of need for confidentiality etc., than Such as, short message, QQ chat tool, wechat, photo, some file for preserving significant data etc..User is first in setting First selection needs the content encrypted, then inputs key information.Identical key letter can be set in the content of all encryptions Breath, also can according to need and different key informations is respectively set.When needing to open, the key information that only inputs with it is preset Key information could unanimously open, encrypted content of otherwise not opening.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close The one kind such as code, face information, finger print information, eyeball information, two or more of combinations.When preset key information be two kinds or When a variety of password combinations, when opening encrypted content in actual use, two or more manner of decryption can be used, as long as wherein A kind of password correctly be openable encrypted content.
Step 202, otherwise, starts the second decryption key, the second decryption key of detection and preset key information whether Match, show encrypted content if matching, otherwise decryption failure.
Second decryption key is matched with preset key information, refers to the two comparison, identical.For example, preset Having numerical ciphers in key information is 123123, then the second decryption key inputted also must be 123123, and the two is mobile whole Matching Shi Caineng is carried out in end 10 to match, and is read to open encrypted content for user.If the second decryption of input is close Spoon is 122123, then it fails to match with preset key information for the second decryption key, cannot open encrypted content.
It should be understood that starting the first decryption key first, second is just opened in the case where the first decryption key opens and fails Decryption key, this is only one such embodiment.Certainly, it according to the habit of user or needs, also can choose Start the second decryption key first, just opens the first decryption key, Huo Zhe in the case where the second decryption key opens and fails Second decryption key is abandoned opening in the case where opening failure.
Referring to Fig. 3, being the realization stream of the display methods for the mobile terminal encrypted content that second embodiment of the invention provides Journey schematic diagram.It mainly comprises the steps that
Step 301, the key information that the content setting encrypted will be needed preset, preset key information includes mobile terminal The prediction picture and presetting cipher of the owner, prediction picture are merged with presetting cipher.By prediction picture and presetting cipher Quick calling presetting cipher when can be convenient decryption is merged to be decrypted.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close The one kind such as code, face information, finger print information, eyeball information, acoustic information, two or more of combinations.When preset key is believed When breath is two or more password combinations, when opening encrypted content in actual use, two or more decryption sides can be used Formula, as long as one such password is correctly openable encrypted content.It is, for example, possible to use face informations and digital cipher code set It closes, is perhaps combined or can be used eyeball information and numerical ciphers using face information and digital alphabet mixed cipher Combination, double or use acoustic information and digital password combination etc..When preset image is face information, the first decryption of starting When secret key is decrypted, the facial image for needing to shoot user is decrypted;When preset image is eyeball information, starting When first decryption key is decrypted, the eyeball image for needing to shoot user is decrypted.
Prediction picture is user when password is arranged, the head image information of the user of storage.The head portrait of storage can be One width, is also possible to several at two width.In the multiple portraits of storage, the head portrait of a people can be, be also possible to two people or more Personal head portrait.Or prediction picture can be shot the palm of user or some object with feature simultaneously It is stored using as prediction picture.Excessive limitation is not done to the prediction picture of storage, user can be according to oneself Actual needs go to be arranged.Presetting cipher is typically chosen numerical ciphers, and digit is traditionally arranged to be 6 or 8.
The head image information of user and preset password are merged, corresponding string number code can be generated.Into When row decoding, it cracking can be positioned by corresponding string number code and extract presetting cipher to be decoded.
When user needs to change preset key information, either modification prediction picture still modifies presetting cipher, Or both modify simultaneously, the presetting cipher in storage region and corresponding string number code also all synchronize change.
When step 302, unlatching encrypted content, automatic first decryption key that starts is decrypted.It clicks to open and needs to look into When the encrypted content seen, system can automatic jump to the opening program of the first decryption key.When starting the first decryption key, backstage Automatic starting camera, is continuously shot the head portrait of the user of preset quantity in preset time.During shooting, if It detects ambient light deficiency, flash lamp can be automatically turned on.Preset quantity takes natural number, and general value is 1,2,3,4,5 etc., in advance Setting the time is generally several seconds, for example, one second, two seconds, three seconds, four seconds etc..
The head portrait of the user of the preset quantity taken, can carry out preliminary image procossing, then with preset image It is matched.
Image procossing (image processing) refers generally to Digital Image Processing.Digital picture refer to industrial camera, The equipment such as video camera, scanner pass through the big two-dimensional array that shooting obtains, and the element of the array is known as pixel, and value claims For gray value.Image processing techniques generally comprises compression of images, enhancing, recovery, matching, description and identifies this part.
Image procossing will extract certain features or specific information included in image, these features or information for being extracted Image often is analyzed for computer, and convenience is provided.The process of extraction feature or information is the pre- place of pattern-recognition or computer vision Reason.The feature of extraction may include many aspects, such as frequency domain character, gray scale or color characteristic, boundary characteristic, provincial characteristics, line Manage feature, shape feature, topological characteristic and relational structure etc..The head portrait taken and prediction picture are carried out simply in the present invention Image procossing, two images are compared and analyzed with facilitating.
The head portrait that step 303, circulation extract user is matched with prediction picture respectively.
Specifically, the image information of the head portrait of the user of preset quantity is extracted respectively, in general, the head portrait of user can To shoot multiple.
Extract the image feature data of prediction picture.
The image information of the head portrait of multiple users is compared with the image feature data of prediction picture respectively, it is such as right Than data fit prerequisite, then successful match, otherwise it fails to match.
Prerequisite may be configured as the similarity obtained after two image comparisons be greater than 95%, or be greater than 98%.
Step 304 judges whether matching succeeds.Wherein a head portrait and prediction picture successful match, then calculate successful match. By the matching of multiple pictures, as long as improving the success rate of the first decryption key decryption even if there is a successful match success. Such as successful match, then step 305 is gone to;Otherwise step 307 is gone to.
Step 305, the automatic preset key information obtained with head image information binding.It is quickly found out according to prediction picture Presetting cipher in merging data.
Step 306, the presetting cipher transferred in key information are decrypted automatically, and decryption terminates.From click encrypted content The head portrait of user is shot to starting the first decryption key, then to automatic starting camera, then will be shot resulting Photo is matched with prediction picture, unlocks password or inextricable password, in total the time-consuming time for generally requiring several seconds.
Whether step 307, the second decryption key of detection match with preset key information.When opening the second decryption key, Display is manually entered the prompting frame of password.Input password prompting frame can be shown in the display interface of mobile terminal, or Person is in display along with voice messaging prompts.
Whether the password in step 308, reception prompting frame, the password for detecting input match with preset key information.
When judging whether the password of input matches with the presetting cipher in preset key information, need in complete correspondence, Just think successful match, otherwise it fails to match.Each digit in the numerical ciphers inputted requires the phase with presetting cipher The each digit answered is identical.
Step 309 judges that the password of input matches with preset key information and whether succeeds, and step is executed if successful match Rapid 310;It is no to then follow the steps 311.
Step 310 opens encrypted content, successful decryption using presetting cipher.User can see the content of encryption.
Step 311, decryption failure, show decryption failure, or be output by voice on the display interface of the mobile terminal Decryption failure.User cannot see that the content of encryption.
First, second kind of embodiment of the invention is due to being no longer that ciphertext letter is decrypted by being manually entered password every time Breath, but first passes through automatic camera, and whether the image for detecting currently used person is information phase with the prediction picture prestored Match.It is decrypted automatically if it does, then obtaining with the key information for prestoring the binding of user's information, if it does not match, opening Dynamic second decryption key, that is, provide and be manually entered password window, is manually entered password decryption.By by both manner of decryption phases In conjunction with greatly facilitating user, reduce and need to input the troublesome operation of password every time, improve mobile terminal uses body It tests, while also improving the safety of encrypted content.
Referring to Fig. 4, Fig. 4 is the knot of the display device for the mobile terminal encrypted content that the third embodiment of the invention provides Structure schematic diagram, the display device of the mobile terminal specifically include that the first deciphering module 401 and the second deciphering module 402.Each function Detailed description are as follows for module:
First deciphering module 401, for starting the first decryption key automatically first, by first when opening encrypted content Decryption key is matched with preset key information, shows that encrypted content, the first decryption key include if successful match The head portrait of user.
Encrypted content is generally user according to oneself the meaning, it is believed that program, information, data of need for confidentiality etc., than Such as, short message, QQ chat tool, wechat, photo, some file for preserving significant data etc..User is first in setting First selection needs the content encrypted, then inputs key information.Identical key letter can be set in the content of all encryptions Breath, also can according to need and different key informations is respectively set.When needing to open, the key information that only inputs with it is preset Key information could unanimously open, encrypted content of otherwise not opening.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close The one kind such as code, face information, finger print information, eyeball information, two or more of combinations.When preset key information be two kinds or When a variety of password combinations, when opening encrypted content in actual use, two or more manner of decryption can be used, as long as wherein A kind of password correctly be openable encrypted content.
Second deciphering module 402, for starting the second decryption key, by the after the decryption failure of the first deciphering module 401 Two decryption keys are matched with preset key information, and encrypted content is opened if successful match;Otherwise decryption failure.
The decryption failure of first deciphering module 401, i.e., carry out automatic camera by the first decryption key, and make what is taken The head portrait of user is compared with prediction picture, and obtained comparison similarity is poor, is not met preset similarity data, cannot be beaten Open encrypted content.
Second decryption key is generally traditional manner of decryption, i.e., is decoded by way of inputting password, as institute is defeated The password entered and preset password are completely the same, then can open encrypted content, otherwise cannot open encrypted content.
It should be understood that starting the first decryption key first, second is just opened in the case where the first decryption key opens and fails Decryption key, this is only one such embodiment.Certainly, it according to the habit of user or needs, also can choose Start the second decryption key first, just opens the first decryption key, Huo Zhe in the case where the second decryption key opens and fails Second decryption key is abandoned opening in the case where opening failure.
Fig. 5 and Fig. 6 are please referred to, is the display device for the mobile terminal encrypted content that the 4th kind of embodiment of the invention provides Structural schematic diagram, the display device of the mobile terminal specifically include that preset module 50, the first deciphering module 51 and the second decryption mould Block 52.Detailed description are as follows for each functional module:
Preset module 50, the preset key information of content setting for that will need to encrypt, preset key information include The prediction picture and presetting cipher of user, prediction picture are merged with presetting cipher.
Preset key information includes various forms of passwords, for example, can be numerical ciphers, digital alphabet mixing it is close The one kind such as code, face information, finger print information, eyeball information, acoustic information, two or more of combinations.When preset key is believed When breath is two or more password combinations, when opening encrypted content in actual use, two or more decryption sides can be used Formula, as long as one such password is correctly openable encrypted content.It is, for example, possible to use face informations and digital cipher code set It closes, is perhaps combined or can be used eyeball information and numerical ciphers using face information and digital alphabet mixed cipher Combination, double or use acoustic information and digital password combination etc..
Prediction picture is user when password is arranged, the head image information of the user of storage.The head portrait of storage can be One width, is also possible to several at two width.In the multiple portraits of storage, the head portrait of a people can be, be also possible to two people or more Personal head portrait.Or prediction picture can be shot the palm of user or some object with feature simultaneously It is stored using as prediction picture.Excessive limitation is not done to the prediction picture of storage, user can be according to oneself Actual needs go to be arranged.Presetting cipher is typically chosen numerical ciphers, and digit is traditionally arranged to be 6 or 8.
The head image information of user and preset password are merged, corresponding string number code can be generated.Into When row decoding, passing through corresponding string number code cracking positioning and can extract presetting cipher to be decoded, so as to Improve decoded speed.
When user needs to change preset key information, either modification prediction picture still modifies presetting cipher, Or both modify simultaneously, the presetting cipher in storage region and corresponding string number code also all synchronize change.
First deciphering module 51 may include following submodule:
Image acquisition submodule 511, for starting camera automatically, when preset in the starting of the first deciphering module 51 The head portrait of the interior user for being continuously shot preset quantity.Preset time generally using the second as magnitude unit, for example, one second, two seconds, Three seconds, four seconds etc..Preset quantity is natural number, and general value is 1,2,3,4,5 etc..By two head portrait pictures and prediction picture into Row compares and carries out the decoded time and compares five head portrait pictures and prediction picture and carry out decoded time phase difference And less.
Matched sub-block 512, for by the head portrait of the user of preset quantity respectively with the preset figure in preset module 50 As being matched, such as wherein a head portrait and prediction picture successful match then obtain preset key information, transfer key information In presetting cipher decrypted automatically;Otherwise start the second deciphering module 52.
Referring to Fig. 6, successively executing first when being matched and extracting the extraction of subelement 5121, second 5122 and of subelement Contrast subunit 5123.
First extracts subelement 5121, the image information of the head portrait of the user for extracting preset quantity respectively.
Second extracts subelement 5122, for extracting the image feature data of prediction picture.
Contrast subunit 5123 extracts son list for extracting the image information in subelement 5121 by first with second respectively Image feature data in member 5122 compares, and if correlation data meets prerequisite, then successful match, otherwise matches and lose It loses.
Second deciphering module 52 specifically includes receiving unit 521 and detection unit 522.The function of each unit specifically:
Receiving unit 521, for receiving the password in the prompting frame for supplying to be manually entered password.Mould is decrypted in starting second When block 52, the processor that receiving unit 512 controls in mobile terminal please input the prompt of password in the interface display of mobile terminal Frame, and be after user inputs password, by the cipher feedback of input to detection unit 522.
Whether detection unit 522 matches for detecting password with preset key information, opens in encryption if matching Hold, otherwise prompt decoding failure.After decoding failure, user can execute the second deciphering module 52 again, input password again It is decrypted.
When the encryption device that the above embodiment of the present invention provides carries out opening encrypted content, automatic camera is selected first, is mentioned It is derived from the image information of the head portrait of the dynamic user taken, image information is matched with prediction picture, such as successful match Key information is then obtained to be decrypted automatically, it is as unsuccessful in matched, select second of manner of decryption, i.e., it is close by being manually entered The mode of code is decrypted.Both manner of decryption are used in combination with, the cumbersome behaviour for needing to input password every time is reduced Make, improves the usage experience of user, and also improve the safety of encrypted content.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, encryption device embodiment described above is only schematical, for example, the module is drawn Point, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple module or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some interfaces, the INDIRECT COUPLING of device or module Or communication connection, it can be electrical property, mechanical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in a processing module It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
It should be noted that for the various method embodiments described above, describing for simplicity, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules might not all be this hair Necessary to bright.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
The above are to a kind of description of video recording method and device based on multi-cam provided by the present invention, for Those skilled in the art, thought according to an embodiment of the present invention have change in specific embodiments and applications Place, to sum up, the contents of this specification are not to be construed as limiting the invention.

Claims (6)

1. a kind of display methods of mobile terminal encrypted content characterized by comprising
It is automatic to start the first decryption key when opening encrypted content, judge first decryption key and preset key information Whether match, the encrypted content as described in display if matching;
Otherwise, start the second decryption key, detect whether second decryption key matches with preset key information, such as match Then show the encrypted content, otherwise decryption failure;
It is further comprising the steps of before opening encrypted content:
The key information that the content setting encrypted will be needed preset, the preset key information includes the mobile terminal owner Prediction picture and presetting cipher, the prediction picture are merged with the presetting cipher;
First decryption key of automatic starting, judges whether first decryption key matches with preset key information, such as The step of matching then shows the encrypted content specifically includes:
Automatic starting camera, is continuously shot the head portrait of the user of preset quantity in preset time;
The head portrait of the user of the preset quantity is matched with the prediction picture respectively, such as wherein a head portrait and institute Prediction picture successful match is stated, then obtains preset key information, the presetting cipher transferred in the key information adds to described Close content is decrypted automatically, to show the encrypted content.
2. display methods according to claim 1, which is characterized in that distinguish the head portrait of the user of the preset quantity When being matched with the prediction picture, specifically:
The image information of the head portrait of the user of preset quantity is extracted respectively;
Extract the image feature data of prediction picture;
The image information of the head portrait and the image feature data of the prediction picture are compared, as correlation data meet it is pre- Condition is set, then successful match, otherwise it fails to match.
3. display methods according to claim 1 or 2, which is characterized in that the second decryption key of starting, the second decryption of detection Whether secret key matches with preset key information, specifically includes the following steps:
Display is manually entered the prompting frame of password;
The password in the prompting frame is received, the password received and the preset key information are compared by turn, it is such as right It is more identical than result, then it matches, otherwise mismatches.
4. a kind of display device of mobile terminal encrypted content characterized by comprising
First deciphering module, for starting the first decryption key automatically first, described first being decrypted when opening encrypted content Secret key is matched with preset key information, the encrypted content as described in display if successful match;
Second deciphering module, for starting the second decryption key, by described second after first deciphering module decryption failure Decryption key is matched with preset key information, the encrypted content as described in display if successful match;Otherwise decryption failure;Institute Stating display device further includes preset module,
The preset key information of the content setting that the preset module is used to need to encrypt, the preset key information include The prediction picture and presetting cipher of user, the prediction picture are merged with the presetting cipher;
First deciphering module includes:
Image acquisition submodule, for starting camera automatically, connecting in preset time in first deciphering module starting The head portrait of the user of continuous shooting preset quantity;
Matched sub-block, for by the head portrait of the user of the preset quantity respectively with the prediction picture in the preset module It is matched, such as wherein head portrait and the prediction picture successful match, then obtains preset key information, transfer described close Presetting cipher in key information decrypts the encrypted content automatically, to show the encrypted content.
5. display device according to claim 4, which is characterized in that the matched sub-block includes that the first extraction is single Member, second extract subelement and contrast subunit;
Described first extracts subelement, the image information of the head portrait of the user for extracting preset quantity respectively;
The second extraction subelement is used to extract the image feature data of prediction picture;
It is single that the image information that the contrast subunit is used to extract in subelement by described first extracts son with described second respectively Image feature data in member compares, and if correlation data meets prerequisite, then successful match, otherwise it fails to match.
6. display device according to claim 4 or 5, which is characterized in that second deciphering module includes receiving unit And detection unit;
The receiving unit is used to receive the password for being manually entered in the prompting frame of password;
The detection unit is opened in encryption if matching for detecting whether the password matches with preset key information Hold, otherwise prompt decoding failure.
CN201610088026.5A 2016-02-16 2016-02-16 A kind of display methods and its device of mobile terminal encrypted content Expired - Fee Related CN105760735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610088026.5A CN105760735B (en) 2016-02-16 2016-02-16 A kind of display methods and its device of mobile terminal encrypted content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610088026.5A CN105760735B (en) 2016-02-16 2016-02-16 A kind of display methods and its device of mobile terminal encrypted content

Publications (2)

Publication Number Publication Date
CN105760735A CN105760735A (en) 2016-07-13
CN105760735B true CN105760735B (en) 2019-04-23

Family

ID=56330779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610088026.5A Expired - Fee Related CN105760735B (en) 2016-02-16 2016-02-16 A kind of display methods and its device of mobile terminal encrypted content

Country Status (1)

Country Link
CN (1) CN105760735B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983924A (en) * 2006-05-30 2007-06-20 华为技术有限公司 Decoding switch method, decoder and terminal equipment
CN103425912A (en) * 2012-04-27 2013-12-04 网秦无限(北京)科技有限公司 Safety device and display method thereof
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN104915583A (en) * 2015-05-30 2015-09-16 广东欧珀移动通信有限公司 Interface decryption processing method and mobile terminal
CN105260669A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Transmission method and system of pictures
CN105262756A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus
CN105303085A (en) * 2015-10-28 2016-02-03 广东欧珀移动通信有限公司 File sharing method and sharing system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983924A (en) * 2006-05-30 2007-06-20 华为技术有限公司 Decoding switch method, decoder and terminal equipment
CN103425912A (en) * 2012-04-27 2013-12-04 网秦无限(北京)科技有限公司 Safety device and display method thereof
CN104700010A (en) * 2013-12-05 2015-06-10 腾讯科技(深圳)有限公司 Personal information protection method and protection device
CN104915583A (en) * 2015-05-30 2015-09-16 广东欧珀移动通信有限公司 Interface decryption processing method and mobile terminal
CN105260669A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Transmission method and system of pictures
CN105262756A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Data encryption method, data decryption method, data encryption apparatus, and data decryption apparatus
CN105303085A (en) * 2015-10-28 2016-02-03 广东欧珀移动通信有限公司 File sharing method and sharing system

Also Published As

Publication number Publication date
CN105760735A (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN103916233B (en) A kind of information ciphering method and device
CN104700010A (en) Personal information protection method and protection device
CN106101743B (en) Panoramic video recognition methods and device
CN106484484B (en) Application program installs management method and terminal device
CN104182675A (en) Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN104967511A (en) Processing method for enciphered data, and apparatus thereof
CN104994098B (en) Document transmission method and relevant apparatus and Transmission system
US20070150415A1 (en) Method and apparatus for creating and entering a PIN code
CN106454800B (en) Auth method, apparatus and system
CN106611402B (en) Image processing method and device
CN104834847A (en) Identity verification method and device
CN104038613B (en) The method and apparatus of information security management
CN109561056B (en) Secret communication method, system, mobile terminal and wearable device
CN104333643B (en) Add the method for contact person, system and terminal
CN104270516B (en) Decryption method and mobile terminal
CN108702607A (en) A kind of more equipment wireless connection methods and equipment
CN106406947B (en) The method and device that prevents system service process from restarting, mobile terminal
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN108347464A (en) Operating status synchronous method, system and the electronic equipment of application program
CN105610873A (en) Identity authentication method and device
CN109828810A (en) Screen shots intercept method, watermark adding method, device, equipment and medium
KR101633965B1 (en) User security authentication system in internet and method thereof
CN107678798A (en) A kind of SIM card fast initializing method, device and computer-readable recording medium
CN105281907A (en) Encrypted data processing method and apparatus
KR102351491B1 (en) Security management system using user mobile terminal and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190423