CN106027794B - A kind of encryption method and mobile terminal of photo - Google Patents
A kind of encryption method and mobile terminal of photo Download PDFInfo
- Publication number
- CN106027794B CN106027794B CN201610509133.0A CN201610509133A CN106027794B CN 106027794 B CN106027794 B CN 106027794B CN 201610509133 A CN201610509133 A CN 201610509133A CN 106027794 B CN106027794 B CN 106027794B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- photo
- data
- terminal user
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72439—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Abstract
The embodiment of the invention provides a kind of encryption method of photo and mobile terminals.This method comprises: obtaining the image data of the photo of mobile terminal user's shooting;According to the cipher mode that the mobile terminal user selects, the first identification authentication data of the mobile terminal user is obtained;Described image data and first identification authentication data are combined, data splitting is obtained;According to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.The embodiment of the present invention ensure that the safety of saved photo by the way that the image data for the photo for needing to encrypt and the identification authentication data of current mobile terminal user to be combined;Simultaneously without migrating to photo to be encrypted, reduce the encrypting step of photo;And cryptographic operation is directly acted on to the photo for needing to encrypt, the encryption reliability of photo is stronger, protects the privacy of mobile terminal user well, and mobile terminal user's experience sense is strong.
Description
Technical field
The present invention relates to the encryption methods and mobile terminal of field of communication technology more particularly to a kind of photo.
Background technique
With mobile terminal (such as mobile phone) camera function enrich constantly with it is powerful, people increasingly like using shifting
Dynamic terminal is taken pictures.Wherein, many photos are mostly stored with inside everyone mobile phone, but in view of individual privacy, some photos are moved
Dynamic terminal user, which only wants to oneself, to be checked, be unwilling others it can be seen that.
But current mobile phone is all that photo is directly saved as visible picture after having clapped photo.So, if
Mobile terminal user want protection oneself privacy photo it is most by the way of usinging when by these photo uploads to it is some have add
In the application program of close function, other mobile terminal users are transferred to alternatively, directly copying out these photos from mobile phone
Think safe place.
Existing privacy photo protection scheme, the mainly storage location by means of changing privacy photo, that is, shine privacy
Piece is transferred to some mobile terminal users and thinks in the application program with certain safety or disk.But in this protection side
In case, privacy photo itself and unencryption, once then the application program or disk of unloading are attacked, it is same to store photo
Privacy leakage problem;Moreover, need to shift privacy photo during this protection, it is operationally also not square
Just, there is a problem of cumbersome, mobile terminal user's experience sense difference.
Summary of the invention
The embodiment of the present invention provides the encryption method and mobile terminal of a kind of photo, to solve in the prior art to photo
Existing security breaches are big when progress secret protection, secret protection effect is poor, complex for operation step and mobile terminal user
The problem of experience sense difference.
In a first aspect, the method is applied to mobile terminal the embodiment of the invention provides a kind of encryption method of photo,
The described method includes:
Obtain the image data of the photo of mobile terminal user's shooting;
According to the cipher mode that the mobile terminal user selects, the first authentication of the mobile terminal user is obtained
Data;
Described image data and first identification authentication data are combined, data splitting is obtained;
According to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.
Second aspect, the embodiment of the invention also provides a kind of mobile terminal, the mobile terminal includes:
Image data module is obtained, the image data of the photo for obtaining mobile terminal user's shooting;
Authentication data module is obtained, the cipher mode for selecting according to the mobile terminal user obtains the movement
The first identification authentication data of terminal user;
Composite module, image data and the acquisition authentication data mould for obtaining the acquisition image data module
First identification authentication data that block obtains is combined, and obtains data splitting;
Generation module, the data splitting for being obtained according to the composite module generate the two of the corresponding photo
Dimension code simultaneously saves.
In this way, the embodiment of the present invention passes through the image data for the photo that will need to encrypt and the body of current mobile terminal user
Part authentication data is combined, and ensure that the safety of saved photo;Simultaneously without being migrated to photo to be encrypted, reduce
The encrypting step of photo;And cryptographic operation is directly acted on to the photo for needing to encrypt, the encryption reliability of photo is stronger,
The privacy of mobile terminal user is protected well, and mobile terminal user's experience sense is strong.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the flow chart of the encryption method of the photo of first embodiment of the invention;
Fig. 2 is the flow chart of the encryption method of the photo of second embodiment of the invention;
Fig. 3 is the block diagram of the mobile terminal of third embodiment of the invention;
Fig. 4 is the block diagram of another mobile terminal of third embodiment of the invention;
Fig. 5 is the block diagram of the another mobile terminal of third embodiment of the invention;
Fig. 6 is the block diagram of the mobile terminal of fourth embodiment of the invention;
Fig. 7 is the structural schematic diagram of the mobile terminal of fifth embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
First embodiment
Referring to Fig.1, the flow chart of the encryption method of the photo of one embodiment of the invention is shown, is applied to mobile whole
End, this method can specifically include following steps:
Step 101, the image data of the photo of mobile terminal user's shooting is obtained.
Wherein, after mobile terminal user, which shoots, completes photo, the embodiment of the present invention can acquire the image data of the photo.
Step 102, the cipher mode selected according to the mobile terminal user, obtains the first of the mobile terminal user
Identification authentication data.
Wherein it is possible to obtain mobile terminal user difference according to the selected different cipher modes of mobile terminal user
The identification authentication data of type, identification authentication data here, which can be, the identity of mobile terminal user is recognized as uniqueness
The data of card.
Step 103, described image data and first identification authentication data are combined, obtain data splitting.
Wherein it is possible to which the image data that will acquire is recognized with the identity that can make uniqueness authentication for mobile terminal user
Card data are combined, and obtain data splitting.
Step 104, according to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.
Wherein it is possible to form the two dimensional code of the photo and preservation based on the data splitting.
In this way, the embodiment of the present invention passes through the image data for the photo that will need to encrypt and the body of current mobile terminal user
Part authentication data is combined, and ensure that the safety of saved photo;Simultaneously without being migrated to photo to be encrypted, reduce
The encrypting step of photo;And cryptographic operation is directly acted on to the photo for needing to encrypt, the encryption reliability of photo is stronger,
The privacy of mobile terminal user is protected well, and mobile terminal user's experience sense is strong.
Second embodiment
Referring to Fig. 2, the flow chart of the encryption method of the photo of another embodiment of the present invention is shown, is applied to mobile whole
End, this method can specifically include following steps:
Step 201, detect whether the mobile terminal user has selected image encryption operation.
Wherein, in order to realize to photo encryption flexible choice, improve the controllability of encryption, can be in mobile terminal (example
Such as mobile phone) preview interface of taking pictures the button either similar cue button of one " privacy preservations " is set, then mobile end
End subscriber if necessary to encrypt to the photo that will be shot, then can be clicked and be taken pictures in preview interface during taking pictures
" privacy preservation " button, realize image encryption operation selection.The selection that the image encryption operates can thus be carried out
Detection, to determine whether that the photo to subsequent shooting carries out cryptographic operation.
Step 202, when detecting that the mobile terminal user has selected image encryption to operate, the mobile terminal is received
The photographing instruction of user.
So after mobile terminal user clicks " privacy preservation " button, mobile terminal user can click take pictures it is pre-
The shooting button look on interface completes the shooting of photo, can receive what mobile terminal user shot current needs here
The photographing instruction of image.
Step 203, it is taken pictures according to the photographing instruction, generates photo.
Wherein it is possible to be shot based on photographing instruction to described image, so that it may it is current to obtain mobile terminal user
The image data of the photo of shooting is simultaneously cached, and subsequent encryption is facilitated.
Then, from the data cached middle image data for obtaining the photo, for encrypting.
Step 204, encrypting fingerprint mode and photo acquisition cipher mode the mobile terminal user is supplied to select
It selects.
Wherein, in order to improve the reliability to photo cryptographic operation, encryption brought by only a kind of cipher mode is avoided
The case where failure, can will be supplied to movement using encrypting fingerprint and in the way of Image Acquisition encryption in the present embodiment
Terminal user selects.Certainly, two kinds of cipher modes are only schematically listed in the present embodiment, as long as substantially should
Cipher mode is capable of providing above-mentioned first identification authentication data, the present invention for cipher mode form and be not especially limited.
Step 205, the first of the mobile terminal user is obtained according to the cipher mode that the mobile terminal user selects
Identification authentication data.
Wherein, when the mobile terminal user selects the encrypting fingerprint mode, the step 205 can be by following
Mode is realized: detecting whether the mobile terminal is stored with finger print information;When not having to store finger print information, the shifting is reminded
Dynamic terminal user carries out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information;When being stored with finger print information
When, the finger print information of storage is obtained, and be denoted as the first finger print information.
Wherein, can detecte the system of the mobile terminal first, whether finger print information is crossed in typing, if do not appointed
What finger print information is then reminded the mobile terminal user to carry out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger
Line information;And if finger print information is crossed in typing, when an only finger print information, then available finger print information;And if
The excessively a plurality of finger print information of typing, then mobile terminal user can select a finger print information to encrypt from a plurality of finger print information
Purposes, and it is denoted as the first finger print information.
And it can be with if when the mobile terminal user selects the photo acquisition cipher mode, if the step 205
It is accomplished by the following way: the mobile terminal user being reminded to provide encryption photo;The mobile terminal user is received to provide
Encryption picture data, and be denoted as the first encryption picture data.
Wherein, the encryption photo that mobile terminal user provides can be the mobile terminal being stored in advance in mobile phone photo album
The human face photo of user is also possible to the human face photo of collection in worksite shooting, and if the security requirement to encryption is not high
It can directly select the photo without mobile terminal user's face as the first encryption photo from mobile phone photo album.
Step 206, the image data of the caching and first identification authentication data are combined, obtain number of combinations
According to.
Wherein, when described image data include multiple images data segment, and first identification authentication data includes multiple
Identification authentication data section, the specific implementation of the step 206 can be according to scheduled inserted modes by the multiple authentication
Data segment is inserted into respectively between the multiple images data segment of the caching, is obtained the data splitting and is cached;
Specifically, the first identification authentication data for example here is the first finger print information, P the first fingerprints are specifically included
Message segment data1, image data include Q image data section data0, wherein it can be inserted into M data1 every N number of data0,
Until P data1 data are entirely insertable, data splitting data2 is obtained.Wherein, P, Q, M and N are positive integer, and N is less than etc.
It is less than or equal to P in Q, M.It should be noted that here only schematically schematically illustrate an inserted mode, other it is any can be real
The scheduled inserted mode that existing two kinds of data segments are mutually inserted is all within protection scope of the present invention.
Step 207, according to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.
Wherein, caching process is still done before data splitting data2 coding not save, can save memory space in this way,
Two dimensional code has been obtained after the completion of coding and has finally been saved, to realize the local cipher to photo, reduces photo
The security breaches of encryption, secret protection effect are good.
So after completing to the cryptographic operation of photo, after step 207, when any mobile terminal user wants to look into
See the mobile phone the above-mentioned encrypted photo in photograph album when, encryption method according to an embodiment of the present invention may also include that reception
Active user to the photo (for example, in photograph album) check operation (that is, when mobile terminal user need to check it is encrypted
When photo, the photo can be clicked);So after receiving this and checking operation, so that it may directly acquire the two dimension of the photo
Code;The two dimensional code is decoded, the data splitting is obtained;According to it is corresponding with the scheduled inserted mode make a reservation for it is inverse
Inserted mode handles the data splitting, obtains described image data and first identification authentication data and is delayed
It deposits;
Wherein, which is the inverse process of the scheduled inserted mode.
Then, in order to realize the authentication to the mobile terminal user for currently checking photo, mobile terminal user is protected
Privacy, after above-mentioned inverse the step of being inserted into, encryption method according to an embodiment of the present invention may also include that acquisition active user's
Second identification authentication data;According to first identification authentication data of the mobile terminal user of caching to the current use
Second identification authentication data at family is matched;When successful match, according to the described image data of caching to the photo into
Row display.
Wherein, when the mobile terminal user selects the encrypting fingerprint mode, the acquisition current mobile terminal is used
The step of second identification authentication data at family, comprising: prompt the current mobile terminal user typing fingerprint;It receives described current
The fingerprint of mobile terminal user's typing is denoted as the second finger print information;Described in the mobile terminal user according to caching
The step of first identification authentication data matches the second identification authentication data of the active user, comprising: by described
One finger print information and second finger print information compare;When comparing result is identical, then according to the described image of caching
Data show the photo.
Wherein, when only storing a finger print information in the system of mobile terminal, then current mobile terminal can be prompted
User's typing finger print information, is denoted as the second finger print information;And if can make to work as when storing a plurality of finger print information in system
Preceding mobile terminal user selects these finger print informations, and selection result is denoted as the second finger print information;Then
Second finger print information is compared with the first finger print information when encryption, if the same indicates current mobile terminal user
For the mobile terminal user encrypted originally to this photo, so that it may according to the image data of caching to the photo of the encryption into
Row display.
On the contrary, the acquisition is current mobile whole when the mobile terminal user selects the photo acquisition cipher mode
The step of second identification authentication data of end subscriber, comprising: the current mobile terminal user is reminded to provide encryption photo;It receives
The encryption picture data that the mobile terminal user provides, and it is denoted as the second encryption picture data;It is described according to caching
First identification authentication data of mobile terminal user to the second identification authentication data of the current mobile terminal user into
The step of row matching, comprising: compare the first encryption picture data and the second encryption picture data;Work as comparison
When being as a result identical, then the photo is shown according to the described image data of caching.
Wherein, if photo encryption photo for using in encryption can remind this currently for human face photo
Mobile terminal user carries out the shooting of face, and the picture data of shooting is denoted as the second encryption picture data;And if the photo
The encryption photo used in encryption is does not have the photo of the face of the mobile terminal user of encryption photo in photograph album, then just
Current mobile terminal user is reminded to select a photo as the second encryption picture data from photograph album;Then, so that it may by
One encryption photo and the second encryption photo are compared, and if the same indicate that current mobile terminal user is originally to this photo
The mobile terminal user encrypted, so that it may be shown according to photo of the image data of caching to the encryption.
It should be noted that since the first identification authentication data in the present embodiment has only related to finger print information and face
The image data of photo or non-face photo, so being provided solely in the selection for providing cipher mode for mobile terminal user
Encrypting fingerprint mode and photo cipher mode.But first identification authentication data is not merely limited to above- mentioned information, also
It can be other data, such as identification card number, social security number etc. that can make uniqueness certification for the identity of mobile terminal user,
Correspondingly, the cipher mode corresponding to identification card number and social security number, method can also be provided when providing the selection of cipher mode
Similar, details are not described herein.
By means of the technical solution of the above embodiment of the present invention, the embodiment of the present invention can encrypt photo and tested
During card, the data that pilot process is obtained are cached, and are not done preservation processing, have not only been saved memory space, also
Improve encryption, the verifying speed of system performance and photo;Moreover, when being encrypted to photo, it can also be by authentication number
Insertion process is carried out according to image data, improve data splitting cracks difficulty, improves the safety of photo;In addition, this
Inventive embodiments combine the encryption of photo with two dimensional code, and more usages can be provided for encrypted photo, move
Dynamic end-user experience sense is good.
3rd embodiment
Referring to Fig. 3, the block diagram of the mobile terminal of one embodiment of the invention is shown.Mobile terminal 300 shown in Fig. 3 wraps
It includes:
Image data module 301 is obtained, the image data of the photo for obtaining mobile terminal user's shooting.
Authentication data module 302 is obtained, the cipher mode for selecting according to the mobile terminal user obtains the shifting
The first identification authentication data of dynamic terminal user.
Composite module 303, image data and the acquisition for obtaining the acquisition image data module authenticate number
It is combined according to first identification authentication data that module 302 obtains, obtains data splitting.
Generation module 304, the data splitting for being obtained according to the composite module 303 generate the corresponding photograph
The two dimensional code of piece and preservation.
Referring to Fig. 4, on the basis of Fig. 3, optionally, the mobile terminal 300 may also include that
Detection module 305, for detecting whether the mobile terminal user has selected image encryption operation.
Photographing instruction module 306 is received, for detecting that the mobile terminal user selects when the detection module 305
When image encryption operates, the photographing instruction of the mobile terminal user is received.
Photo module 307 is generated, for carrying out according to the received photographing instruction of the reception photographing instruction module 306
It takes pictures, generates photo.
The composite module 303, comprising:
It is inserted into submodule 3031, for including multiple images data segment when described image data, and first identity is recognized
When card data include multiple identification authentication data sections, the multiple identification authentication data section is distinguished according to scheduled inserted mode
It is inserted between described multiple images data segment, obtains the data splitting and caches.
Module 308 is checked in reception, checks operation to the photo for receiving the mobile terminal user.
Two dimensional code module 309 is obtained, for obtaining the two dimensional code of the photo.
Decoder module 310, the two dimensional code for obtaining to the acquisition two dimensional code module 309 are decoded, obtain
The data splitting.
Inverse insertion module 311, for making a reservation for inverse inserted mode to described according to corresponding with the scheduled inserted mode
The data splitting that decoder module 310 obtains is handled, and described image data and first identification authentication data are obtained
And it is cached.
Authentication data module 312 is acquired, for acquiring the second identification authentication data of active user's input.
Matching module 313, for first identification authentication data according to the mobile terminal user of caching, to institute
Second identification authentication data for stating active user's input matches.
Display module 314, for being shown to the photo according to described image data when successful match.
Selecting module 315 is provided, it is described mobile whole for encrypting fingerprint mode and photo acquisition cipher mode to be supplied to
End subscriber is selected.
Referring to Fig. 5, on the basis of fig. 4, optionally, when the mobile terminal user selects the encrypting fingerprint mode
When, the acquisition authentication data module 302 includes:
Detection sub-module 3021 is used for when the mobile terminal user selects the encrypting fingerprint mode, described in detection
Whether mobile terminal is stored with finger print information.
First reminds submodule 3022, for detecting that the mobile terminal does not store when the detection sub-module 3021
When finger print information, the mobile terminal user is reminded to carry out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first fingerprint
Information.
Fingerprint module 316 is obtained, for detecting that the mobile terminal is stored with fingerprint when the detection sub-module 3021
When information, the finger print information of storage is obtained, and is denoted as the first finger print information.
Correspondingly, the acquisition authentication data module 312 includes:
Prompting submodule 3121, for prompting active user's typing fingerprint.
It receives fingerprint submodule 3122 and is denoted as the second finger print information for receiving the fingerprint of active user's typing.
Correspondingly, the matching module 313 includes:
First comparison submodule 3131, for comparing first finger print information and second finger print information.
Correspondingly, the display module 314, is also used to when comparing result is identical, then according to described image data pair
The photo is shown.
The acquisition authentication data module 302 further include:
Second reminds submodule 3023, is used for when the mobile terminal user selects the photo acquisition cipher mode,
The mobile terminal user is reminded to provide encryption photo.
Picture data submodule 3024 is received, the encryption picture data provided for receiving the mobile terminal user, and
It is denoted as the first encryption picture data.
Correspondingly, the acquisition authentication data module 312 further include:
Encryption photo submodule 3123 is reminded, for reminding the active user to provide encryption photo.
Encryption photo submodule 3124 is obtained, for obtaining the encryption picture data of current shooting, and is denoted as the second encryption
Picture data.
Correspondingly, the matching module 313 includes:
Second comparison submodule 3132, for the first encryption picture data and the acquisition to be encrypted photo submodule
The the second encryption picture data obtained compares.
Correspondingly, the display module 314, is also used to when comparing result is identical, then according to described image data pair
The photo is shown.
Mobile terminal 300 can be realized the photograph for encrypting needs that mobile terminal in the embodiment of the method for Fig. 1 to Fig. 2 is realized
The image data of piece and the identification authentication data of current mobile terminal user are combined, and guarantee the safety of saved photo;
Simultaneously without migrating to photo to be encrypted, the encrypting step of photo is reduced;And cryptographic operation is directly acted on into needs
The encryption reliability of the photo of encryption, photo is stronger, protects the privacy of mobile terminal user, mobile terminal user's experience well
Sense is strong, and to avoid repeating, which is not described herein again.
Fourth embodiment
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the invention.Mobile terminal 600 shown in fig. 6 includes: at least
One processor 601, memory 602, at least one network interface 604 and user interface 603.It is each in mobile terminal 600
Component is coupled by bus system 605.It is understood that bus system 605 is logical for realizing the connection between these components
Letter.Bus system 605 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus.But it is
For the sake of clear explanation, in Fig. 6 various buses are all designated as bus system 605.
Wherein, user interface 603 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM
(ErasablePROM, EPROM), electrically erasable programmable read-only memory (ElectricallyEPROM, EEPROM) dodge
It deposits.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is slow to be used as external high speed
It deposits.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory
(SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memory 602 of the system and method for description of the embodiment of the present invention is intended to include but unlimited
In the memory of these and any other suitable type.
In some embodiments, memory 602 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 6021 and application program 6022.
Wherein, operating system 6021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 6022 includes various application programs, such as media
Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side
The program of method may be embodied in application program 6022.
In embodiments of the present invention, by the program or instruction of calling memory 602 to store, specifically, can be application
The program or instruction stored in program 6022, processor 601 are used to obtain the image data of the photo of mobile terminal user's shooting;
According to the cipher mode that the mobile terminal user selects, the first identification authentication data of the mobile terminal user is obtained;It will
Described image data and first identification authentication data are combined, and obtain data splitting;According to the data splitting, generate
Correspond to the two dimensional code of the photo and preservation.
The method that the embodiments of the present invention disclose can be applied in processor 601, or be realized by processor 601.
Processor 601 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing
Device 601 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit
(ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic
Device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention
Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention
The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor
In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can
In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage
Medium is located at memory 602, and processor 601 reads the information in memory 602, and the step of the above method is completed in conjunction with its hardware
Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware,
Microcode or combinations thereof is realized.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (App
LicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device
(ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray,
FPGA), general processor, controller, microcontroller, microprocessor, other electronics lists for executing herein described function
In member or combinations thereof.
For software implementations, can by execute the embodiment of the present invention described in function module (such as process, function etc.) come
Realize technology described in the embodiment of the present invention.Software code is storable in memory and is executed by processor.Memory can
With portion realizes in the processor or outside the processor.
Optionally, processor 601 is also used to: detecting whether the mobile terminal user has selected image encryption operation;When
When detecting that the mobile terminal user has selected image encryption to operate, the photographing instruction of the mobile terminal user is received;Root
It takes pictures according to the photographing instruction, generates photo.
Optionally, processor 601 is also used to: when described image data include multiple images data segment, and first body
When part authentication data includes multiple identification authentication data sections, according to scheduled inserted mode by the multiple identification authentication data section
It is inserted between described multiple images data segment, obtains the data splitting and caches respectively.
Optionally, processor 601 is also used to: being received active user and is checked operation to the photo;Obtain the photo
Two dimensional code;The two dimensional code is decoded, the data splitting is obtained;According to corresponding with the scheduled inserted mode
Predetermined inverse inserted mode handles the data splitting, obtains described image data and first identification authentication data simultaneously
It is cached.
Optionally, processor 601 is also used to: acquiring the second identification authentication data of active user's input;According to slow
First identification authentication data of the mobile terminal user deposited recognizes second identity of active user input
Card data are matched;When successful match, the photo is shown according to described image data.
Optionally, processor 601 is also used to: encrypting fingerprint mode and photo acquisition cipher mode are supplied to the movement
Terminal user selects.Detect whether the mobile terminal is stored with finger print information;When not having to store finger print information, remind
The mobile terminal user carries out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information.
Optionally, processor 601 is also used to: when being stored with finger print information, being obtained the finger print information of storage, and is denoted as
One finger print information.
Optionally, processor 601 is also used to: prompting active user's typing fingerprint;Receive active user's typing
Fingerprint, be denoted as the second finger print information.
Optionally, processor 601 is also used to: first finger print information and second finger print information are compared;
When comparing result is identical, then the photo is shown according to described image data.
Optionally, processor 601 is also used to: when the mobile terminal user selects the photo acquisition cipher mode,
The mobile terminal user is reminded to provide encryption photo;The encryption picture data that the mobile terminal user provides is received, and is remembered
For the first encryption picture data.
Optionally, processor 601 is also used to: the active user being reminded to provide encryption photo;Obtain adding for current shooting
Close picture data, and it is denoted as the second encryption picture data.
Optionally, processor 601 is also used to: by it is described first encryption picture data and it is described second encryption picture data into
Row comparison;When comparing result is identical, then the photo is shown according to described image data.
Mobile terminal 600 can be realized the safety for the photo that the guarantee that mobile terminal is realized in previous embodiment is saved
Property, reduce that the encrypting step of photo, the encryption reliability of photo are stronger, mobile terminal user secret protection is strong and mobile end
End user experience sense is strong, and to avoid repeating, which is not described herein again.
5th embodiment
Fig. 7 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7
700 can be mobile phone, tablet computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer
Deng.
Mobile terminal 700 in Fig. 7 includes radio frequency (RadioFrequency, RF) circuit 710, memory 720, input list
Member 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (WirelessFidelity) module 780 and power supply
790。
Wherein, input unit 730 can be used for receiving mobile terminal user input number or character information, and generate with
The mobile terminal user of mobile terminal 700 is arranged and the related signal input of function control.Specifically, the embodiment of the present invention
In, which may include touch panel 731.Touch panel 731, also referred to as touch screen collect mobile terminal and use
(for example mobile terminal user uses any suitable object or attachment such as finger, stylus for the touch operation of family on it or nearby
Operation on touch panel 731), and corresponding attachment device is driven according to preset formula.Optionally, touch panel
731 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detects mobile terminal user's
Touch orientation, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch detection
Touch information is received on device, and is converted into contact coordinate, then gives the processor 760, and can receive the hair of processor 760
Next order is simultaneously executed.Furthermore, it is possible to using the multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave reality
Existing touch panel 731.In addition to touch panel 731, input unit 730 can also include other input equipments 732, other inputs are set
Standby 732 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse
One of mark, operating stick etc. are a variety of.
Wherein, display unit 740 can be used for showing the information by mobile terminal user's input or be supplied to mobile terminal and uses
The information at family and the various menu interfaces of mobile terminal 700.Display unit 740 may include that display panel 741 optionally can
To configure display surface using the forms such as LCD or Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED)
Plate 741.
It should be noted that touch panel 731 can cover display panel 741, touch display screen is formed, when the touch display screen is examined
After measuring touch operation on it or nearby, processor 760 is sent to determine the type of touch event, is followed by subsequent processing device
760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or executing the software program and/or module that are stored in first memory 721, and calling storage
Data in second memory 722 execute the various functions and processing data of mobile terminal 700, thus to mobile terminal 700
Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 721 in software program and/or module and/
Or the data in the second memory 722, processor 760 obtain the image data of the photo of mobile terminal user's shooting;According to
The cipher mode of mobile terminal user's selection, obtains the first identification authentication data of the mobile terminal user;It will be described
Image data and first identification authentication data are combined, and obtain data splitting;According to the data splitting, generates and correspond to
The two dimensional code of the photo and preservation.
Optionally, processor 760 is also used to: detecting whether the mobile terminal user has selected image encryption operation;When
When detecting that the mobile terminal user has selected image encryption to operate, the photographing instruction of the mobile terminal user is received;Root
It takes pictures according to the photographing instruction, generates photo.
Optionally, processor 760 is also used to: when described image data include multiple images data segment, and first body
When part authentication data includes multiple identification authentication data sections, according to scheduled inserted mode by the multiple identification authentication data section
It is inserted between described multiple images data segment, obtains the data splitting and caches respectively.
Optionally, processor 760 is also used to: being received active user and is checked operation to the photo;Obtain the photo
Two dimensional code;The two dimensional code is decoded, the data splitting is obtained;According to corresponding with the scheduled inserted mode
Predetermined inverse inserted mode handles the data splitting, obtains described image data and first identification authentication data simultaneously
It is cached.
Optionally, processor 760 is also used to: acquiring the second identification authentication data of active user's input;According to slow
First identification authentication data of the mobile terminal user deposited recognizes second identity of active user input
Card data are matched;When successful match, the photo is shown according to described image data.
Optionally, processor 760 is also used to: encrypting fingerprint mode and photo acquisition cipher mode are supplied to the movement
Terminal user selects.Detect whether the mobile terminal is stored with finger print information;When not having to store finger print information, remind
The mobile terminal user carries out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information.
Optionally, processor 760 is also used to: when being stored with finger print information, being obtained the finger print information of storage, and is denoted as
One finger print information.
Optionally, processor 760 is also used to: prompting active user's typing fingerprint;Receive active user's typing
Fingerprint, be denoted as the second finger print information.
Optionally, processor 760 is also used to: first finger print information and second finger print information are compared;
When comparing result is identical, then the photo is shown according to described image data.
Optionally, processor 760 is also used to: when the mobile terminal user selects the photo acquisition cipher mode,
The mobile terminal user is reminded to provide encryption photo;The encryption picture data that the mobile terminal user provides is received, and is remembered
For the first encryption picture data.
Optionally, processor 760 is also used to: the active user being reminded to provide encryption photo;Obtain adding for current shooting
Close picture data, and it is denoted as the second encryption picture data.
Optionally, processor 760 is also used to: by it is described first encryption picture data and it is described second encryption picture data into
Row comparison;When comparing result is identical, then the photo is shown according to described image data.
As it can be seen that the embodiment of the present invention can guarantee the safety of saved photo, reduce encrypting step, the photo of photo
Encryption reliability it is stronger, secret protection of mobile terminal user is strong and mobile terminal user's experience sense is strong, to avoid repeating,
Which is not described herein again.
Those of ordinary skill in the art may be aware that the embodiment in conjunction with disclosed in the embodiment of the present invention describe it is each
Exemplary unit and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (22)
1. a kind of encryption method of photo is applied to mobile terminal, which is characterized in that the described method includes:
Obtain the image data of the photo of mobile terminal user's shooting;
According to the cipher mode that the mobile terminal user selects, the first authentication number of the mobile terminal user is obtained
According to;
Described image data and first identification authentication data are combined, data splitting is obtained;
According to the data splitting, the two dimensional code of the corresponding photo and preservation are generated;
When described image data include multiple images data segment, and first identification authentication data includes multiple authentication numbers
When according to section, described the step of described image data and the identification authentication data are combined, obtain data splitting, comprising:
According to scheduled inserted mode by the multiple identification authentication data section be inserted into respectively described multiple images data segment it
Between, it obtains the data splitting and caches;
It is described according to the data splitting, after the step of generating the two dimensional code of the corresponding photo and preservation, the method is also
Include:
It receives active user and operation is checked to the photo;
Obtain the two dimensional code of the photo;
The two dimensional code is decoded, the data splitting is obtained;
The data splitting is handled according to predetermined inverse inserted mode corresponding with the scheduled inserted mode, obtains institute
It states image data and first identification authentication data and is cached;
Wherein, the predetermined inverse inserted mode is the inverse process of the scheduled inserted mode.
2. the method according to claim 1, wherein the image of the photo for obtaining mobile terminal user's shooting
Before the step of data, the method also includes:
Detect whether the mobile terminal user has selected image encryption operation;
When detecting that the mobile terminal user has selected image encryption to operate, the finger of taking pictures of the mobile terminal user is received
It enables;
It is taken pictures according to the photographing instruction, generates photo.
3. the method according to claim 1, wherein described according to corresponding pre- with the scheduled inserted mode
Fixed inverse inserted mode handles the data splitting, obtains described image data and first identification authentication data is gone forward side by side
After the step of row caching, the method also includes:
Acquire the second identification authentication data of active user's input;
According to first identification authentication data of the mobile terminal user of caching, to described in active user input
Second identification authentication data is matched;
When successful match, the photo is shown according to described image data.
4. according to the method described in claim 3, it is characterized in that, the encryption side selected according to the mobile terminal user
Formula, before the step of obtaining the first identification authentication data of the mobile terminal user, the method also includes:
Encrypting fingerprint mode and photo acquisition cipher mode are supplied to the mobile terminal user to select.
5. according to the method described in claim 4, it is characterized in that, when the mobile terminal user selects the encrypting fingerprint side
When formula, the cipher mode according to mobile terminal user selection obtains the first authentication of the mobile terminal user
The step of data, comprising:
Detect whether the mobile terminal is stored with finger print information;
When not having to store finger print information, the mobile terminal user is reminded to carry out fingerprint typing, and the fingerprint of typing is saved,
And it is denoted as the first finger print information.
6. according to the method described in claim 5, it is characterized in that, whether the detection mobile terminal is stored with fingerprint letter
After the step of breath, the method also includes:
When being stored with finger print information, the finger print information of storage is obtained, and is denoted as the first finger print information.
7. according to the method described in claim 6, it is characterized in that, the second identity of acquisition active user's input is recognized
The step of demonstrate,proving data, comprising:
Prompt active user's typing fingerprint;
The fingerprint for receiving active user's typing, is denoted as the second finger print information.
8. the method according to the description of claim 7 is characterized in that described in the mobile terminal user according to caching
First identification authentication data, the step of matching to second identification authentication data of active user input, comprising:
First finger print information and second finger print information are compared;
When comparing result is identical, then the photo is shown according to described image data.
9. according to the method described in claim 4, it is characterized in that, when the mobile terminal user selects the photo acquisition to add
When close mode, the cipher mode selected according to the mobile terminal user obtains the first body of the mobile terminal user
The step of part authentication data, comprising:
The mobile terminal user is reminded to provide encryption photo;
The encryption picture data that the mobile terminal user provides is received, and is denoted as the first encryption picture data.
10. according to the method described in claim 9, it is characterized in that, the second identification authentication data of the acquisition active user
The step of, comprising:
The active user is reminded to provide encryption photo;
The encryption picture data of current shooting is obtained, and is denoted as the second encryption picture data.
11. according to the method described in claim 10, it is characterized in that, the institute of the mobile terminal user according to caching
The step of stating the first identification authentication data, second identification authentication data of active user input is matched, packet
It includes:
The first encryption picture data and the second encryption picture data are compared;
When comparing result is identical, then the photo is shown according to described image data.
12. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Image data module is obtained, the image data of the photo for obtaining mobile terminal user's shooting;
Authentication data module is obtained, the cipher mode for selecting according to the mobile terminal user obtains the mobile terminal
The first identification authentication data of user;
Composite module, image data and the acquisition authentication data module for obtaining the acquisition image data module obtain
First identification authentication data taken is combined, and obtains data splitting;
Generation module, the data splitting for being obtained according to the composite module generate the two dimensional code of the corresponding photo
And it saves;
The composite module, comprising:
It is inserted into submodule, for including multiple images data segment when described image data, and the first identification authentication data packet
When including multiple identification authentication data sections, the multiple identification authentication data section is inserted into institute respectively according to scheduled inserted mode
It states between multiple images data segment, obtain the data splitting and caches;
The mobile terminal further include:
Module is checked in reception, checks operation to the photo for receiving active user;
Two dimensional code module is obtained, for obtaining the two dimensional code of the photo;
Decoder module, the two dimensional code for obtaining to the acquisition two dimensional code module are decoded, and obtain the number of combinations
According to;
Inverse insertion module, for making a reservation for inverse inserted mode to the decoder module according to corresponding with the scheduled inserted mode
The obtained data splitting is handled, and is obtained described image data and first identification authentication data and is cached;
Wherein, the predetermined inverse inserted mode is the inverse process of the scheduled inserted mode.
13. mobile terminal according to claim 12, which is characterized in that the mobile terminal further include:
Detection module, for detecting whether the mobile terminal user has selected image encryption operation;
Photographing instruction module is received, for detecting that the mobile terminal user has selected image encryption behaviour when the detection module
When making, the photographing instruction of the mobile terminal user is received;
Photo module is generated, for being taken pictures according to the received photographing instruction of reception photographing instruction module, is generated
Photo.
14. mobile terminal according to claim 12, which is characterized in that the mobile terminal further include:
Authentication data module is acquired, for acquiring the second identification authentication data of active user's input;
Matching module, for first identification authentication data according to the mobile terminal user of caching, to described current
Second identification authentication data of user's input matches;
Display module, for being shown to the photo according to described image data when successful match.
15. mobile terminal according to claim 14, which is characterized in that the mobile terminal further include:
There is provided selecting module, for by encrypting fingerprint mode and photo acquisition cipher mode be supplied to the mobile terminal user into
Row selection.
16. mobile terminal according to claim 15, which is characterized in that the acquisition authentication data module includes:
Detection sub-module, for detecting the mobile terminal when the mobile terminal user selects the encrypting fingerprint mode
Whether finger print information is stored with;
First reminds submodule, for when the detection sub-module detects that the mobile terminal does not store finger print information,
It reminds the mobile terminal user to carry out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information.
17. mobile terminal according to claim 16, which is characterized in that the mobile terminal further include:
Fingerprint module is obtained, for obtaining when the detection sub-module detects that the mobile terminal is stored with finger print information
The finger print information of storage, and it is denoted as the first finger print information.
18. mobile terminal according to claim 17, which is characterized in that the acquisition authentication data module includes:
Prompting submodule, for prompting active user's typing fingerprint;
It receives fingerprint submodule and is denoted as the second finger print information for receiving the fingerprint of active user's typing.
19. mobile terminal according to claim 18, which is characterized in that the matching module includes:
First comparison submodule, for comparing first finger print information and second finger print information;
The display module is also used to then show the photo according to described image data when comparing result is identical
Show.
20. mobile terminal according to claim 15, which is characterized in that the acquisition authentication data module includes:
Second reminds submodule, is used for when the mobile terminal user selects the photo acquisition cipher mode, described in prompting
Mobile terminal user provides encryption photo;
Picture data submodule is received, the encryption picture data provided for receiving the mobile terminal user, and it is denoted as first
Encrypt picture data.
21. mobile terminal according to claim 20, which is characterized in that the acquisition authentication data module includes:
Encryption photo submodule is reminded, for reminding the active user to provide encryption photo;
Encryption photo submodule is obtained, for obtaining the encryption picture data of current shooting, and is denoted as the second encryption picture data.
22. mobile terminal according to claim 21, which is characterized in that the matching module includes:
Second comparison submodule, the institute for obtaining the first encryption picture data and the acquisition encryption photo submodule
The second encryption picture data is stated to compare;
The display module is also used to then show the photo according to described image data when comparing result is identical
Show.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610509133.0A CN106027794B (en) | 2016-06-29 | 2016-06-29 | A kind of encryption method and mobile terminal of photo |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610509133.0A CN106027794B (en) | 2016-06-29 | 2016-06-29 | A kind of encryption method and mobile terminal of photo |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106027794A CN106027794A (en) | 2016-10-12 |
CN106027794B true CN106027794B (en) | 2019-11-15 |
Family
ID=57106073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610509133.0A Active CN106027794B (en) | 2016-06-29 | 2016-06-29 | A kind of encryption method and mobile terminal of photo |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027794B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599723B (en) * | 2016-12-19 | 2020-03-17 | 武汉斗鱼网络科技有限公司 | File encryption method and device and file decryption method and device |
CN107220534A (en) * | 2017-05-18 | 2017-09-29 | 北京小米移动软件有限公司 | Photo processing method and device applied to terminal device |
CN107784232B (en) * | 2017-10-18 | 2020-05-05 | 维沃移动通信有限公司 | Picture processing method and mobile terminal |
CN107958477A (en) * | 2017-11-15 | 2018-04-24 | 维沃移动通信有限公司 | A kind of image processing method, mobile terminal |
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
CN111767529A (en) * | 2020-05-18 | 2020-10-13 | 广州视源电子科技股份有限公司 | File encryption method, file decryption method, storage medium and electronic device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967511A (en) * | 2014-07-11 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Processing method for enciphered data, and apparatus thereof |
CN105046167A (en) * | 2015-08-31 | 2015-11-11 | 宇龙计算机通信科技(深圳)有限公司 | Generating method and apparatus for encrypted photo and electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104253933A (en) * | 2013-06-26 | 2014-12-31 | 华为技术有限公司 | Shooting method and device |
US9904774B2 (en) * | 2014-06-26 | 2018-02-27 | Xiaomi Inc. | Method and device for locking file |
CN105678114B (en) * | 2014-11-17 | 2019-03-01 | 深圳桑菲消费通信有限公司 | A kind of method for previewing and device of photo |
CN105279443A (en) * | 2015-11-30 | 2016-01-27 | 东莞酷派软件技术有限公司 | Picture encrypting and decrypting methods and devices |
-
2016
- 2016-06-29 CN CN201610509133.0A patent/CN106027794B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967511A (en) * | 2014-07-11 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Processing method for enciphered data, and apparatus thereof |
CN105046167A (en) * | 2015-08-31 | 2015-11-11 | 宇龙计算机通信科技(深圳)有限公司 | Generating method and apparatus for encrypted photo and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106027794A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106027794B (en) | A kind of encryption method and mobile terminal of photo | |
CN106127076B (en) | A kind of inspection method and mobile terminal of photograph album photo | |
CN106022196B (en) | A kind of method and intelligent terminal of information sharing | |
CN106372470B (en) | A kind of method and mobile terminal for reminding input password | |
CN105959564B (en) | A kind of photographic method and mobile terminal | |
CN106127003B (en) | A kind of fingerprint recognition unlocking method and mobile terminal | |
CN107180203B (en) | Image encryption and decryption method, mobile terminal and computer readable storage medium | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN107644170B (en) | A kind of image processing method and mobile terminal | |
CN106326713B (en) | A kind of unlocking method and mobile terminal of mobile terminal screen | |
CN106708658B (en) | A kind of data back up method, mobile terminal and storage server | |
CN107527040A (en) | A kind of method and apparatus of recognition of face | |
CN106650367A (en) | Private content display method and mobile terminal | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN107390991B (en) | A kind of processing method and mobile terminal of screenshot | |
CN107959789B (en) | Image processing method and mobile terminal | |
CN107194907B (en) | A kind of screenshot synthetic method and mobile terminal | |
CN106791542B (en) | A kind of panoramic picture image pickup method and mobile terminal | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
JP2019522277A (en) | Terminal device password unlocking method, apparatus, and terminal device | |
CN107480500A (en) | The method and mobile terminal of a kind of face verification | |
CN106228085B (en) | The method for secret protection and mobile terminal of application program | |
CN107370758A (en) | A kind of login method and mobile terminal | |
TWI474705B (en) | Handheld device and unlocking method thereof | |
CN106384060B (en) | A kind of mobile terminal data encryption method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |