CN106027794B - A kind of encryption method and mobile terminal of photo - Google Patents

A kind of encryption method and mobile terminal of photo Download PDF

Info

Publication number
CN106027794B
CN106027794B CN201610509133.0A CN201610509133A CN106027794B CN 106027794 B CN106027794 B CN 106027794B CN 201610509133 A CN201610509133 A CN 201610509133A CN 106027794 B CN106027794 B CN 106027794B
Authority
CN
China
Prior art keywords
mobile terminal
photo
data
terminal user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610509133.0A
Other languages
Chinese (zh)
Other versions
CN106027794A (en
Inventor
柯力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610509133.0A priority Critical patent/CN106027794B/en
Publication of CN106027794A publication Critical patent/CN106027794A/en
Application granted granted Critical
Publication of CN106027794B publication Critical patent/CN106027794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

The embodiment of the invention provides a kind of encryption method of photo and mobile terminals.This method comprises: obtaining the image data of the photo of mobile terminal user's shooting;According to the cipher mode that the mobile terminal user selects, the first identification authentication data of the mobile terminal user is obtained;Described image data and first identification authentication data are combined, data splitting is obtained;According to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.The embodiment of the present invention ensure that the safety of saved photo by the way that the image data for the photo for needing to encrypt and the identification authentication data of current mobile terminal user to be combined;Simultaneously without migrating to photo to be encrypted, reduce the encrypting step of photo;And cryptographic operation is directly acted on to the photo for needing to encrypt, the encryption reliability of photo is stronger, protects the privacy of mobile terminal user well, and mobile terminal user's experience sense is strong.

Description

A kind of encryption method and mobile terminal of photo
Technical field
The present invention relates to the encryption methods and mobile terminal of field of communication technology more particularly to a kind of photo.
Background technique
With mobile terminal (such as mobile phone) camera function enrich constantly with it is powerful, people increasingly like using shifting Dynamic terminal is taken pictures.Wherein, many photos are mostly stored with inside everyone mobile phone, but in view of individual privacy, some photos are moved Dynamic terminal user, which only wants to oneself, to be checked, be unwilling others it can be seen that.
But current mobile phone is all that photo is directly saved as visible picture after having clapped photo.So, if Mobile terminal user want protection oneself privacy photo it is most by the way of usinging when by these photo uploads to it is some have add In the application program of close function, other mobile terminal users are transferred to alternatively, directly copying out these photos from mobile phone Think safe place.
Existing privacy photo protection scheme, the mainly storage location by means of changing privacy photo, that is, shine privacy Piece is transferred to some mobile terminal users and thinks in the application program with certain safety or disk.But in this protection side In case, privacy photo itself and unencryption, once then the application program or disk of unloading are attacked, it is same to store photo Privacy leakage problem;Moreover, need to shift privacy photo during this protection, it is operationally also not square Just, there is a problem of cumbersome, mobile terminal user's experience sense difference.
Summary of the invention
The embodiment of the present invention provides the encryption method and mobile terminal of a kind of photo, to solve in the prior art to photo Existing security breaches are big when progress secret protection, secret protection effect is poor, complex for operation step and mobile terminal user The problem of experience sense difference.
In a first aspect, the method is applied to mobile terminal the embodiment of the invention provides a kind of encryption method of photo, The described method includes:
Obtain the image data of the photo of mobile terminal user's shooting;
According to the cipher mode that the mobile terminal user selects, the first authentication of the mobile terminal user is obtained Data;
Described image data and first identification authentication data are combined, data splitting is obtained;
According to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.
Second aspect, the embodiment of the invention also provides a kind of mobile terminal, the mobile terminal includes:
Image data module is obtained, the image data of the photo for obtaining mobile terminal user's shooting;
Authentication data module is obtained, the cipher mode for selecting according to the mobile terminal user obtains the movement The first identification authentication data of terminal user;
Composite module, image data and the acquisition authentication data mould for obtaining the acquisition image data module First identification authentication data that block obtains is combined, and obtains data splitting;
Generation module, the data splitting for being obtained according to the composite module generate the two of the corresponding photo Dimension code simultaneously saves.
In this way, the embodiment of the present invention passes through the image data for the photo that will need to encrypt and the body of current mobile terminal user Part authentication data is combined, and ensure that the safety of saved photo;Simultaneously without being migrated to photo to be encrypted, reduce The encrypting step of photo;And cryptographic operation is directly acted on to the photo for needing to encrypt, the encryption reliability of photo is stronger, The privacy of mobile terminal user is protected well, and mobile terminal user's experience sense is strong.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart of the encryption method of the photo of first embodiment of the invention;
Fig. 2 is the flow chart of the encryption method of the photo of second embodiment of the invention;
Fig. 3 is the block diagram of the mobile terminal of third embodiment of the invention;
Fig. 4 is the block diagram of another mobile terminal of third embodiment of the invention;
Fig. 5 is the block diagram of the another mobile terminal of third embodiment of the invention;
Fig. 6 is the block diagram of the mobile terminal of fourth embodiment of the invention;
Fig. 7 is the structural schematic diagram of the mobile terminal of fifth embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
First embodiment
Referring to Fig.1, the flow chart of the encryption method of the photo of one embodiment of the invention is shown, is applied to mobile whole End, this method can specifically include following steps:
Step 101, the image data of the photo of mobile terminal user's shooting is obtained.
Wherein, after mobile terminal user, which shoots, completes photo, the embodiment of the present invention can acquire the image data of the photo.
Step 102, the cipher mode selected according to the mobile terminal user, obtains the first of the mobile terminal user Identification authentication data.
Wherein it is possible to obtain mobile terminal user difference according to the selected different cipher modes of mobile terminal user The identification authentication data of type, identification authentication data here, which can be, the identity of mobile terminal user is recognized as uniqueness The data of card.
Step 103, described image data and first identification authentication data are combined, obtain data splitting.
Wherein it is possible to which the image data that will acquire is recognized with the identity that can make uniqueness authentication for mobile terminal user Card data are combined, and obtain data splitting.
Step 104, according to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.
Wherein it is possible to form the two dimensional code of the photo and preservation based on the data splitting.
In this way, the embodiment of the present invention passes through the image data for the photo that will need to encrypt and the body of current mobile terminal user Part authentication data is combined, and ensure that the safety of saved photo;Simultaneously without being migrated to photo to be encrypted, reduce The encrypting step of photo;And cryptographic operation is directly acted on to the photo for needing to encrypt, the encryption reliability of photo is stronger, The privacy of mobile terminal user is protected well, and mobile terminal user's experience sense is strong.
Second embodiment
Referring to Fig. 2, the flow chart of the encryption method of the photo of another embodiment of the present invention is shown, is applied to mobile whole End, this method can specifically include following steps:
Step 201, detect whether the mobile terminal user has selected image encryption operation.
Wherein, in order to realize to photo encryption flexible choice, improve the controllability of encryption, can be in mobile terminal (example Such as mobile phone) preview interface of taking pictures the button either similar cue button of one " privacy preservations " is set, then mobile end End subscriber if necessary to encrypt to the photo that will be shot, then can be clicked and be taken pictures in preview interface during taking pictures " privacy preservation " button, realize image encryption operation selection.The selection that the image encryption operates can thus be carried out Detection, to determine whether that the photo to subsequent shooting carries out cryptographic operation.
Step 202, when detecting that the mobile terminal user has selected image encryption to operate, the mobile terminal is received The photographing instruction of user.
So after mobile terminal user clicks " privacy preservation " button, mobile terminal user can click take pictures it is pre- The shooting button look on interface completes the shooting of photo, can receive what mobile terminal user shot current needs here The photographing instruction of image.
Step 203, it is taken pictures according to the photographing instruction, generates photo.
Wherein it is possible to be shot based on photographing instruction to described image, so that it may it is current to obtain mobile terminal user The image data of the photo of shooting is simultaneously cached, and subsequent encryption is facilitated.
Then, from the data cached middle image data for obtaining the photo, for encrypting.
Step 204, encrypting fingerprint mode and photo acquisition cipher mode the mobile terminal user is supplied to select It selects.
Wherein, in order to improve the reliability to photo cryptographic operation, encryption brought by only a kind of cipher mode is avoided The case where failure, can will be supplied to movement using encrypting fingerprint and in the way of Image Acquisition encryption in the present embodiment Terminal user selects.Certainly, two kinds of cipher modes are only schematically listed in the present embodiment, as long as substantially should Cipher mode is capable of providing above-mentioned first identification authentication data, the present invention for cipher mode form and be not especially limited.
Step 205, the first of the mobile terminal user is obtained according to the cipher mode that the mobile terminal user selects Identification authentication data.
Wherein, when the mobile terminal user selects the encrypting fingerprint mode, the step 205 can be by following Mode is realized: detecting whether the mobile terminal is stored with finger print information;When not having to store finger print information, the shifting is reminded Dynamic terminal user carries out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information;When being stored with finger print information When, the finger print information of storage is obtained, and be denoted as the first finger print information.
Wherein, can detecte the system of the mobile terminal first, whether finger print information is crossed in typing, if do not appointed What finger print information is then reminded the mobile terminal user to carry out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger Line information;And if finger print information is crossed in typing, when an only finger print information, then available finger print information;And if The excessively a plurality of finger print information of typing, then mobile terminal user can select a finger print information to encrypt from a plurality of finger print information Purposes, and it is denoted as the first finger print information.
And it can be with if when the mobile terminal user selects the photo acquisition cipher mode, if the step 205 It is accomplished by the following way: the mobile terminal user being reminded to provide encryption photo;The mobile terminal user is received to provide Encryption picture data, and be denoted as the first encryption picture data.
Wherein, the encryption photo that mobile terminal user provides can be the mobile terminal being stored in advance in mobile phone photo album The human face photo of user is also possible to the human face photo of collection in worksite shooting, and if the security requirement to encryption is not high It can directly select the photo without mobile terminal user's face as the first encryption photo from mobile phone photo album.
Step 206, the image data of the caching and first identification authentication data are combined, obtain number of combinations According to.
Wherein, when described image data include multiple images data segment, and first identification authentication data includes multiple Identification authentication data section, the specific implementation of the step 206 can be according to scheduled inserted modes by the multiple authentication Data segment is inserted into respectively between the multiple images data segment of the caching, is obtained the data splitting and is cached;
Specifically, the first identification authentication data for example here is the first finger print information, P the first fingerprints are specifically included Message segment data1, image data include Q image data section data0, wherein it can be inserted into M data1 every N number of data0, Until P data1 data are entirely insertable, data splitting data2 is obtained.Wherein, P, Q, M and N are positive integer, and N is less than etc. It is less than or equal to P in Q, M.It should be noted that here only schematically schematically illustrate an inserted mode, other it is any can be real The scheduled inserted mode that existing two kinds of data segments are mutually inserted is all within protection scope of the present invention.
Step 207, according to the data splitting, the two dimensional code of the corresponding photo and preservation are generated.
Wherein, caching process is still done before data splitting data2 coding not save, can save memory space in this way, Two dimensional code has been obtained after the completion of coding and has finally been saved, to realize the local cipher to photo, reduces photo The security breaches of encryption, secret protection effect are good.
So after completing to the cryptographic operation of photo, after step 207, when any mobile terminal user wants to look into See the mobile phone the above-mentioned encrypted photo in photograph album when, encryption method according to an embodiment of the present invention may also include that reception Active user to the photo (for example, in photograph album) check operation (that is, when mobile terminal user need to check it is encrypted When photo, the photo can be clicked);So after receiving this and checking operation, so that it may directly acquire the two dimension of the photo Code;The two dimensional code is decoded, the data splitting is obtained;According to it is corresponding with the scheduled inserted mode make a reservation for it is inverse Inserted mode handles the data splitting, obtains described image data and first identification authentication data and is delayed It deposits;
Wherein, which is the inverse process of the scheduled inserted mode.
Then, in order to realize the authentication to the mobile terminal user for currently checking photo, mobile terminal user is protected Privacy, after above-mentioned inverse the step of being inserted into, encryption method according to an embodiment of the present invention may also include that acquisition active user's Second identification authentication data;According to first identification authentication data of the mobile terminal user of caching to the current use Second identification authentication data at family is matched;When successful match, according to the described image data of caching to the photo into Row display.
Wherein, when the mobile terminal user selects the encrypting fingerprint mode, the acquisition current mobile terminal is used The step of second identification authentication data at family, comprising: prompt the current mobile terminal user typing fingerprint;It receives described current The fingerprint of mobile terminal user's typing is denoted as the second finger print information;Described in the mobile terminal user according to caching The step of first identification authentication data matches the second identification authentication data of the active user, comprising: by described One finger print information and second finger print information compare;When comparing result is identical, then according to the described image of caching Data show the photo.
Wherein, when only storing a finger print information in the system of mobile terminal, then current mobile terminal can be prompted User's typing finger print information, is denoted as the second finger print information;And if can make to work as when storing a plurality of finger print information in system Preceding mobile terminal user selects these finger print informations, and selection result is denoted as the second finger print information;Then Second finger print information is compared with the first finger print information when encryption, if the same indicates current mobile terminal user For the mobile terminal user encrypted originally to this photo, so that it may according to the image data of caching to the photo of the encryption into Row display.
On the contrary, the acquisition is current mobile whole when the mobile terminal user selects the photo acquisition cipher mode The step of second identification authentication data of end subscriber, comprising: the current mobile terminal user is reminded to provide encryption photo;It receives The encryption picture data that the mobile terminal user provides, and it is denoted as the second encryption picture data;It is described according to caching First identification authentication data of mobile terminal user to the second identification authentication data of the current mobile terminal user into The step of row matching, comprising: compare the first encryption picture data and the second encryption picture data;Work as comparison When being as a result identical, then the photo is shown according to the described image data of caching.
Wherein, if photo encryption photo for using in encryption can remind this currently for human face photo Mobile terminal user carries out the shooting of face, and the picture data of shooting is denoted as the second encryption picture data;And if the photo The encryption photo used in encryption is does not have the photo of the face of the mobile terminal user of encryption photo in photograph album, then just Current mobile terminal user is reminded to select a photo as the second encryption picture data from photograph album;Then, so that it may by One encryption photo and the second encryption photo are compared, and if the same indicate that current mobile terminal user is originally to this photo The mobile terminal user encrypted, so that it may be shown according to photo of the image data of caching to the encryption.
It should be noted that since the first identification authentication data in the present embodiment has only related to finger print information and face The image data of photo or non-face photo, so being provided solely in the selection for providing cipher mode for mobile terminal user Encrypting fingerprint mode and photo cipher mode.But first identification authentication data is not merely limited to above- mentioned information, also It can be other data, such as identification card number, social security number etc. that can make uniqueness certification for the identity of mobile terminal user, Correspondingly, the cipher mode corresponding to identification card number and social security number, method can also be provided when providing the selection of cipher mode Similar, details are not described herein.
By means of the technical solution of the above embodiment of the present invention, the embodiment of the present invention can encrypt photo and tested During card, the data that pilot process is obtained are cached, and are not done preservation processing, have not only been saved memory space, also Improve encryption, the verifying speed of system performance and photo;Moreover, when being encrypted to photo, it can also be by authentication number Insertion process is carried out according to image data, improve data splitting cracks difficulty, improves the safety of photo;In addition, this Inventive embodiments combine the encryption of photo with two dimensional code, and more usages can be provided for encrypted photo, move Dynamic end-user experience sense is good.
3rd embodiment
Referring to Fig. 3, the block diagram of the mobile terminal of one embodiment of the invention is shown.Mobile terminal 300 shown in Fig. 3 wraps It includes:
Image data module 301 is obtained, the image data of the photo for obtaining mobile terminal user's shooting.
Authentication data module 302 is obtained, the cipher mode for selecting according to the mobile terminal user obtains the shifting The first identification authentication data of dynamic terminal user.
Composite module 303, image data and the acquisition for obtaining the acquisition image data module authenticate number It is combined according to first identification authentication data that module 302 obtains, obtains data splitting.
Generation module 304, the data splitting for being obtained according to the composite module 303 generate the corresponding photograph The two dimensional code of piece and preservation.
Referring to Fig. 4, on the basis of Fig. 3, optionally, the mobile terminal 300 may also include that
Detection module 305, for detecting whether the mobile terminal user has selected image encryption operation.
Photographing instruction module 306 is received, for detecting that the mobile terminal user selects when the detection module 305 When image encryption operates, the photographing instruction of the mobile terminal user is received.
Photo module 307 is generated, for carrying out according to the received photographing instruction of the reception photographing instruction module 306 It takes pictures, generates photo.
The composite module 303, comprising:
It is inserted into submodule 3031, for including multiple images data segment when described image data, and first identity is recognized When card data include multiple identification authentication data sections, the multiple identification authentication data section is distinguished according to scheduled inserted mode It is inserted between described multiple images data segment, obtains the data splitting and caches.
Module 308 is checked in reception, checks operation to the photo for receiving the mobile terminal user.
Two dimensional code module 309 is obtained, for obtaining the two dimensional code of the photo.
Decoder module 310, the two dimensional code for obtaining to the acquisition two dimensional code module 309 are decoded, obtain The data splitting.
Inverse insertion module 311, for making a reservation for inverse inserted mode to described according to corresponding with the scheduled inserted mode The data splitting that decoder module 310 obtains is handled, and described image data and first identification authentication data are obtained And it is cached.
Authentication data module 312 is acquired, for acquiring the second identification authentication data of active user's input.
Matching module 313, for first identification authentication data according to the mobile terminal user of caching, to institute Second identification authentication data for stating active user's input matches.
Display module 314, for being shown to the photo according to described image data when successful match.
Selecting module 315 is provided, it is described mobile whole for encrypting fingerprint mode and photo acquisition cipher mode to be supplied to End subscriber is selected.
Referring to Fig. 5, on the basis of fig. 4, optionally, when the mobile terminal user selects the encrypting fingerprint mode When, the acquisition authentication data module 302 includes:
Detection sub-module 3021 is used for when the mobile terminal user selects the encrypting fingerprint mode, described in detection Whether mobile terminal is stored with finger print information.
First reminds submodule 3022, for detecting that the mobile terminal does not store when the detection sub-module 3021 When finger print information, the mobile terminal user is reminded to carry out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first fingerprint Information.
Fingerprint module 316 is obtained, for detecting that the mobile terminal is stored with fingerprint when the detection sub-module 3021 When information, the finger print information of storage is obtained, and is denoted as the first finger print information.
Correspondingly, the acquisition authentication data module 312 includes:
Prompting submodule 3121, for prompting active user's typing fingerprint.
It receives fingerprint submodule 3122 and is denoted as the second finger print information for receiving the fingerprint of active user's typing.
Correspondingly, the matching module 313 includes:
First comparison submodule 3131, for comparing first finger print information and second finger print information.
Correspondingly, the display module 314, is also used to when comparing result is identical, then according to described image data pair The photo is shown.
The acquisition authentication data module 302 further include:
Second reminds submodule 3023, is used for when the mobile terminal user selects the photo acquisition cipher mode, The mobile terminal user is reminded to provide encryption photo.
Picture data submodule 3024 is received, the encryption picture data provided for receiving the mobile terminal user, and It is denoted as the first encryption picture data.
Correspondingly, the acquisition authentication data module 312 further include:
Encryption photo submodule 3123 is reminded, for reminding the active user to provide encryption photo.
Encryption photo submodule 3124 is obtained, for obtaining the encryption picture data of current shooting, and is denoted as the second encryption Picture data.
Correspondingly, the matching module 313 includes:
Second comparison submodule 3132, for the first encryption picture data and the acquisition to be encrypted photo submodule The the second encryption picture data obtained compares.
Correspondingly, the display module 314, is also used to when comparing result is identical, then according to described image data pair The photo is shown.
Mobile terminal 300 can be realized the photograph for encrypting needs that mobile terminal in the embodiment of the method for Fig. 1 to Fig. 2 is realized The image data of piece and the identification authentication data of current mobile terminal user are combined, and guarantee the safety of saved photo; Simultaneously without migrating to photo to be encrypted, the encrypting step of photo is reduced;And cryptographic operation is directly acted on into needs The encryption reliability of the photo of encryption, photo is stronger, protects the privacy of mobile terminal user, mobile terminal user's experience well Sense is strong, and to avoid repeating, which is not described herein again.
Fourth embodiment
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the invention.Mobile terminal 600 shown in fig. 6 includes: at least One processor 601, memory 602, at least one network interface 604 and user interface 603.It is each in mobile terminal 600 Component is coupled by bus system 605.It is understood that bus system 605 is logical for realizing the connection between these components Letter.Bus system 605 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus.But it is For the sake of clear explanation, in Fig. 6 various buses are all designated as bus system 605.
Wherein, user interface 603 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), electrically erasable programmable read-only memory (ElectricallyEPROM, EEPROM) dodge It deposits.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is slow to be used as external high speed It deposits.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory (DirectRambusRAM, DRRAM).The memory 602 of the system and method for description of the embodiment of the present invention is intended to include but unlimited In the memory of these and any other suitable type.
In some embodiments, memory 602 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 6021 and application program 6022.
Wherein, operating system 6021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 6022 includes various application programs, such as media Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side The program of method may be embodied in application program 6022.
In embodiments of the present invention, by the program or instruction of calling memory 602 to store, specifically, can be application The program or instruction stored in program 6022, processor 601 are used to obtain the image data of the photo of mobile terminal user's shooting; According to the cipher mode that the mobile terminal user selects, the first identification authentication data of the mobile terminal user is obtained;It will Described image data and first identification authentication data are combined, and obtain data splitting;According to the data splitting, generate Correspond to the two dimensional code of the photo and preservation.
The method that the embodiments of the present invention disclose can be applied in processor 601, or be realized by processor 601. Processor 601 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing Device 601 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit (ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic Device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage Medium is located at memory 602, and processor 601 reads the information in memory 602, and the step of the above method is completed in conjunction with its hardware Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware, Microcode or combinations thereof is realized.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (App LicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, other electronics lists for executing herein described function In member or combinations thereof.
For software implementations, can by execute the embodiment of the present invention described in function module (such as process, function etc.) come Realize technology described in the embodiment of the present invention.Software code is storable in memory and is executed by processor.Memory can With portion realizes in the processor or outside the processor.
Optionally, processor 601 is also used to: detecting whether the mobile terminal user has selected image encryption operation;When When detecting that the mobile terminal user has selected image encryption to operate, the photographing instruction of the mobile terminal user is received;Root It takes pictures according to the photographing instruction, generates photo.
Optionally, processor 601 is also used to: when described image data include multiple images data segment, and first body When part authentication data includes multiple identification authentication data sections, according to scheduled inserted mode by the multiple identification authentication data section It is inserted between described multiple images data segment, obtains the data splitting and caches respectively.
Optionally, processor 601 is also used to: being received active user and is checked operation to the photo;Obtain the photo Two dimensional code;The two dimensional code is decoded, the data splitting is obtained;According to corresponding with the scheduled inserted mode Predetermined inverse inserted mode handles the data splitting, obtains described image data and first identification authentication data simultaneously It is cached.
Optionally, processor 601 is also used to: acquiring the second identification authentication data of active user's input;According to slow First identification authentication data of the mobile terminal user deposited recognizes second identity of active user input Card data are matched;When successful match, the photo is shown according to described image data.
Optionally, processor 601 is also used to: encrypting fingerprint mode and photo acquisition cipher mode are supplied to the movement Terminal user selects.Detect whether the mobile terminal is stored with finger print information;When not having to store finger print information, remind The mobile terminal user carries out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information.
Optionally, processor 601 is also used to: when being stored with finger print information, being obtained the finger print information of storage, and is denoted as One finger print information.
Optionally, processor 601 is also used to: prompting active user's typing fingerprint;Receive active user's typing Fingerprint, be denoted as the second finger print information.
Optionally, processor 601 is also used to: first finger print information and second finger print information are compared; When comparing result is identical, then the photo is shown according to described image data.
Optionally, processor 601 is also used to: when the mobile terminal user selects the photo acquisition cipher mode, The mobile terminal user is reminded to provide encryption photo;The encryption picture data that the mobile terminal user provides is received, and is remembered For the first encryption picture data.
Optionally, processor 601 is also used to: the active user being reminded to provide encryption photo;Obtain adding for current shooting Close picture data, and it is denoted as the second encryption picture data.
Optionally, processor 601 is also used to: by it is described first encryption picture data and it is described second encryption picture data into Row comparison;When comparing result is identical, then the photo is shown according to described image data.
Mobile terminal 600 can be realized the safety for the photo that the guarantee that mobile terminal is realized in previous embodiment is saved Property, reduce that the encrypting step of photo, the encryption reliability of photo are stronger, mobile terminal user secret protection is strong and mobile end End user experience sense is strong, and to avoid repeating, which is not described herein again.
5th embodiment
Fig. 7 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7 700 can be mobile phone, tablet computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer Deng.
Mobile terminal 700 in Fig. 7 includes radio frequency (RadioFrequency, RF) circuit 710, memory 720, input list Member 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (WirelessFidelity) module 780 and power supply 790。
Wherein, input unit 730 can be used for receiving mobile terminal user input number or character information, and generate with The mobile terminal user of mobile terminal 700 is arranged and the related signal input of function control.Specifically, the embodiment of the present invention In, which may include touch panel 731.Touch panel 731, also referred to as touch screen collect mobile terminal and use (for example mobile terminal user uses any suitable object or attachment such as finger, stylus for the touch operation of family on it or nearby Operation on touch panel 731), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 731 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detects mobile terminal user's Touch orientation, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch detection Touch information is received on device, and is converted into contact coordinate, then gives the processor 760, and can receive the hair of processor 760 Next order is simultaneously executed.Furthermore, it is possible to using the multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave reality Existing touch panel 731.In addition to touch panel 731, input unit 730 can also include other input equipments 732, other inputs are set Standby 732 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One of mark, operating stick etc. are a variety of.
Wherein, display unit 740 can be used for showing the information by mobile terminal user's input or be supplied to mobile terminal and uses The information at family and the various menu interfaces of mobile terminal 700.Display unit 740 may include that display panel 741 optionally can To configure display surface using the forms such as LCD or Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED) Plate 741.
It should be noted that touch panel 731 can cover display panel 741, touch display screen is formed, when the touch display screen is examined After measuring touch operation on it or nearby, processor 760 is sent to determine the type of touch event, is followed by subsequent processing device 760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interfaces and connection whole mobile phone Various pieces, by running or executing the software program and/or module that are stored in first memory 721, and calling storage Data in second memory 722 execute the various functions and processing data of mobile terminal 700, thus to mobile terminal 700 Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 721 in software program and/or module and/ Or the data in the second memory 722, processor 760 obtain the image data of the photo of mobile terminal user's shooting;According to The cipher mode of mobile terminal user's selection, obtains the first identification authentication data of the mobile terminal user;It will be described Image data and first identification authentication data are combined, and obtain data splitting;According to the data splitting, generates and correspond to The two dimensional code of the photo and preservation.
Optionally, processor 760 is also used to: detecting whether the mobile terminal user has selected image encryption operation;When When detecting that the mobile terminal user has selected image encryption to operate, the photographing instruction of the mobile terminal user is received;Root It takes pictures according to the photographing instruction, generates photo.
Optionally, processor 760 is also used to: when described image data include multiple images data segment, and first body When part authentication data includes multiple identification authentication data sections, according to scheduled inserted mode by the multiple identification authentication data section It is inserted between described multiple images data segment, obtains the data splitting and caches respectively.
Optionally, processor 760 is also used to: being received active user and is checked operation to the photo;Obtain the photo Two dimensional code;The two dimensional code is decoded, the data splitting is obtained;According to corresponding with the scheduled inserted mode Predetermined inverse inserted mode handles the data splitting, obtains described image data and first identification authentication data simultaneously It is cached.
Optionally, processor 760 is also used to: acquiring the second identification authentication data of active user's input;According to slow First identification authentication data of the mobile terminal user deposited recognizes second identity of active user input Card data are matched;When successful match, the photo is shown according to described image data.
Optionally, processor 760 is also used to: encrypting fingerprint mode and photo acquisition cipher mode are supplied to the movement Terminal user selects.Detect whether the mobile terminal is stored with finger print information;When not having to store finger print information, remind The mobile terminal user carries out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information.
Optionally, processor 760 is also used to: when being stored with finger print information, being obtained the finger print information of storage, and is denoted as One finger print information.
Optionally, processor 760 is also used to: prompting active user's typing fingerprint;Receive active user's typing Fingerprint, be denoted as the second finger print information.
Optionally, processor 760 is also used to: first finger print information and second finger print information are compared; When comparing result is identical, then the photo is shown according to described image data.
Optionally, processor 760 is also used to: when the mobile terminal user selects the photo acquisition cipher mode, The mobile terminal user is reminded to provide encryption photo;The encryption picture data that the mobile terminal user provides is received, and is remembered For the first encryption picture data.
Optionally, processor 760 is also used to: the active user being reminded to provide encryption photo;Obtain adding for current shooting Close picture data, and it is denoted as the second encryption picture data.
Optionally, processor 760 is also used to: by it is described first encryption picture data and it is described second encryption picture data into Row comparison;When comparing result is identical, then the photo is shown according to described image data.
As it can be seen that the embodiment of the present invention can guarantee the safety of saved photo, reduce encrypting step, the photo of photo Encryption reliability it is stronger, secret protection of mobile terminal user is strong and mobile terminal user's experience sense is strong, to avoid repeating, Which is not described herein again.
Those of ordinary skill in the art may be aware that the embodiment in conjunction with disclosed in the embodiment of the present invention describe it is each Exemplary unit and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (22)

1. a kind of encryption method of photo is applied to mobile terminal, which is characterized in that the described method includes:
Obtain the image data of the photo of mobile terminal user's shooting;
According to the cipher mode that the mobile terminal user selects, the first authentication number of the mobile terminal user is obtained According to;
Described image data and first identification authentication data are combined, data splitting is obtained;
According to the data splitting, the two dimensional code of the corresponding photo and preservation are generated;
When described image data include multiple images data segment, and first identification authentication data includes multiple authentication numbers When according to section, described the step of described image data and the identification authentication data are combined, obtain data splitting, comprising:
According to scheduled inserted mode by the multiple identification authentication data section be inserted into respectively described multiple images data segment it Between, it obtains the data splitting and caches;
It is described according to the data splitting, after the step of generating the two dimensional code of the corresponding photo and preservation, the method is also Include:
It receives active user and operation is checked to the photo;
Obtain the two dimensional code of the photo;
The two dimensional code is decoded, the data splitting is obtained;
The data splitting is handled according to predetermined inverse inserted mode corresponding with the scheduled inserted mode, obtains institute It states image data and first identification authentication data and is cached;
Wherein, the predetermined inverse inserted mode is the inverse process of the scheduled inserted mode.
2. the method according to claim 1, wherein the image of the photo for obtaining mobile terminal user's shooting Before the step of data, the method also includes:
Detect whether the mobile terminal user has selected image encryption operation;
When detecting that the mobile terminal user has selected image encryption to operate, the finger of taking pictures of the mobile terminal user is received It enables;
It is taken pictures according to the photographing instruction, generates photo.
3. the method according to claim 1, wherein described according to corresponding pre- with the scheduled inserted mode Fixed inverse inserted mode handles the data splitting, obtains described image data and first identification authentication data is gone forward side by side After the step of row caching, the method also includes:
Acquire the second identification authentication data of active user's input;
According to first identification authentication data of the mobile terminal user of caching, to described in active user input Second identification authentication data is matched;
When successful match, the photo is shown according to described image data.
4. according to the method described in claim 3, it is characterized in that, the encryption side selected according to the mobile terminal user Formula, before the step of obtaining the first identification authentication data of the mobile terminal user, the method also includes:
Encrypting fingerprint mode and photo acquisition cipher mode are supplied to the mobile terminal user to select.
5. according to the method described in claim 4, it is characterized in that, when the mobile terminal user selects the encrypting fingerprint side When formula, the cipher mode according to mobile terminal user selection obtains the first authentication of the mobile terminal user The step of data, comprising:
Detect whether the mobile terminal is stored with finger print information;
When not having to store finger print information, the mobile terminal user is reminded to carry out fingerprint typing, and the fingerprint of typing is saved, And it is denoted as the first finger print information.
6. according to the method described in claim 5, it is characterized in that, whether the detection mobile terminal is stored with fingerprint letter After the step of breath, the method also includes:
When being stored with finger print information, the finger print information of storage is obtained, and is denoted as the first finger print information.
7. according to the method described in claim 6, it is characterized in that, the second identity of acquisition active user's input is recognized The step of demonstrate,proving data, comprising:
Prompt active user's typing fingerprint;
The fingerprint for receiving active user's typing, is denoted as the second finger print information.
8. the method according to the description of claim 7 is characterized in that described in the mobile terminal user according to caching First identification authentication data, the step of matching to second identification authentication data of active user input, comprising:
First finger print information and second finger print information are compared;
When comparing result is identical, then the photo is shown according to described image data.
9. according to the method described in claim 4, it is characterized in that, when the mobile terminal user selects the photo acquisition to add When close mode, the cipher mode selected according to the mobile terminal user obtains the first body of the mobile terminal user The step of part authentication data, comprising:
The mobile terminal user is reminded to provide encryption photo;
The encryption picture data that the mobile terminal user provides is received, and is denoted as the first encryption picture data.
10. according to the method described in claim 9, it is characterized in that, the second identification authentication data of the acquisition active user The step of, comprising:
The active user is reminded to provide encryption photo;
The encryption picture data of current shooting is obtained, and is denoted as the second encryption picture data.
11. according to the method described in claim 10, it is characterized in that, the institute of the mobile terminal user according to caching The step of stating the first identification authentication data, second identification authentication data of active user input is matched, packet It includes:
The first encryption picture data and the second encryption picture data are compared;
When comparing result is identical, then the photo is shown according to described image data.
12. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Image data module is obtained, the image data of the photo for obtaining mobile terminal user's shooting;
Authentication data module is obtained, the cipher mode for selecting according to the mobile terminal user obtains the mobile terminal The first identification authentication data of user;
Composite module, image data and the acquisition authentication data module for obtaining the acquisition image data module obtain First identification authentication data taken is combined, and obtains data splitting;
Generation module, the data splitting for being obtained according to the composite module generate the two dimensional code of the corresponding photo And it saves;
The composite module, comprising:
It is inserted into submodule, for including multiple images data segment when described image data, and the first identification authentication data packet When including multiple identification authentication data sections, the multiple identification authentication data section is inserted into institute respectively according to scheduled inserted mode It states between multiple images data segment, obtain the data splitting and caches;
The mobile terminal further include:
Module is checked in reception, checks operation to the photo for receiving active user;
Two dimensional code module is obtained, for obtaining the two dimensional code of the photo;
Decoder module, the two dimensional code for obtaining to the acquisition two dimensional code module are decoded, and obtain the number of combinations According to;
Inverse insertion module, for making a reservation for inverse inserted mode to the decoder module according to corresponding with the scheduled inserted mode The obtained data splitting is handled, and is obtained described image data and first identification authentication data and is cached;
Wherein, the predetermined inverse inserted mode is the inverse process of the scheduled inserted mode.
13. mobile terminal according to claim 12, which is characterized in that the mobile terminal further include:
Detection module, for detecting whether the mobile terminal user has selected image encryption operation;
Photographing instruction module is received, for detecting that the mobile terminal user has selected image encryption behaviour when the detection module When making, the photographing instruction of the mobile terminal user is received;
Photo module is generated, for being taken pictures according to the received photographing instruction of reception photographing instruction module, is generated Photo.
14. mobile terminal according to claim 12, which is characterized in that the mobile terminal further include:
Authentication data module is acquired, for acquiring the second identification authentication data of active user's input;
Matching module, for first identification authentication data according to the mobile terminal user of caching, to described current Second identification authentication data of user's input matches;
Display module, for being shown to the photo according to described image data when successful match.
15. mobile terminal according to claim 14, which is characterized in that the mobile terminal further include:
There is provided selecting module, for by encrypting fingerprint mode and photo acquisition cipher mode be supplied to the mobile terminal user into Row selection.
16. mobile terminal according to claim 15, which is characterized in that the acquisition authentication data module includes:
Detection sub-module, for detecting the mobile terminal when the mobile terminal user selects the encrypting fingerprint mode Whether finger print information is stored with;
First reminds submodule, for when the detection sub-module detects that the mobile terminal does not store finger print information, It reminds the mobile terminal user to carry out fingerprint typing, and the fingerprint of typing is saved, and be denoted as the first finger print information.
17. mobile terminal according to claim 16, which is characterized in that the mobile terminal further include:
Fingerprint module is obtained, for obtaining when the detection sub-module detects that the mobile terminal is stored with finger print information The finger print information of storage, and it is denoted as the first finger print information.
18. mobile terminal according to claim 17, which is characterized in that the acquisition authentication data module includes:
Prompting submodule, for prompting active user's typing fingerprint;
It receives fingerprint submodule and is denoted as the second finger print information for receiving the fingerprint of active user's typing.
19. mobile terminal according to claim 18, which is characterized in that the matching module includes:
First comparison submodule, for comparing first finger print information and second finger print information;
The display module is also used to then show the photo according to described image data when comparing result is identical Show.
20. mobile terminal according to claim 15, which is characterized in that the acquisition authentication data module includes:
Second reminds submodule, is used for when the mobile terminal user selects the photo acquisition cipher mode, described in prompting Mobile terminal user provides encryption photo;
Picture data submodule is received, the encryption picture data provided for receiving the mobile terminal user, and it is denoted as first Encrypt picture data.
21. mobile terminal according to claim 20, which is characterized in that the acquisition authentication data module includes:
Encryption photo submodule is reminded, for reminding the active user to provide encryption photo;
Encryption photo submodule is obtained, for obtaining the encryption picture data of current shooting, and is denoted as the second encryption picture data.
22. mobile terminal according to claim 21, which is characterized in that the matching module includes:
Second comparison submodule, the institute for obtaining the first encryption picture data and the acquisition encryption photo submodule The second encryption picture data is stated to compare;
The display module is also used to then show the photo according to described image data when comparing result is identical Show.
CN201610509133.0A 2016-06-29 2016-06-29 A kind of encryption method and mobile terminal of photo Active CN106027794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610509133.0A CN106027794B (en) 2016-06-29 2016-06-29 A kind of encryption method and mobile terminal of photo

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610509133.0A CN106027794B (en) 2016-06-29 2016-06-29 A kind of encryption method and mobile terminal of photo

Publications (2)

Publication Number Publication Date
CN106027794A CN106027794A (en) 2016-10-12
CN106027794B true CN106027794B (en) 2019-11-15

Family

ID=57106073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610509133.0A Active CN106027794B (en) 2016-06-29 2016-06-29 A kind of encryption method and mobile terminal of photo

Country Status (1)

Country Link
CN (1) CN106027794B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599723B (en) * 2016-12-19 2020-03-17 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device
CN107220534A (en) * 2017-05-18 2017-09-29 北京小米移动软件有限公司 Photo processing method and device applied to terminal device
CN107784232B (en) * 2017-10-18 2020-05-05 维沃移动通信有限公司 Picture processing method and mobile terminal
CN107958477A (en) * 2017-11-15 2018-04-24 维沃移动通信有限公司 A kind of image processing method, mobile terminal
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN111767529A (en) * 2020-05-18 2020-10-13 广州视源电子科技股份有限公司 File encryption method, file decryption method, storage medium and electronic device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967511A (en) * 2014-07-11 2015-10-07 腾讯科技(深圳)有限公司 Processing method for enciphered data, and apparatus thereof
CN105046167A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Generating method and apparatus for encrypted photo and electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253933A (en) * 2013-06-26 2014-12-31 华为技术有限公司 Shooting method and device
US9904774B2 (en) * 2014-06-26 2018-02-27 Xiaomi Inc. Method and device for locking file
CN105678114B (en) * 2014-11-17 2019-03-01 深圳桑菲消费通信有限公司 A kind of method for previewing and device of photo
CN105279443A (en) * 2015-11-30 2016-01-27 东莞酷派软件技术有限公司 Picture encrypting and decrypting methods and devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967511A (en) * 2014-07-11 2015-10-07 腾讯科技(深圳)有限公司 Processing method for enciphered data, and apparatus thereof
CN105046167A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Generating method and apparatus for encrypted photo and electronic equipment

Also Published As

Publication number Publication date
CN106027794A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN106027794B (en) A kind of encryption method and mobile terminal of photo
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106022196B (en) A kind of method and intelligent terminal of information sharing
CN106372470B (en) A kind of method and mobile terminal for reminding input password
CN105959564B (en) A kind of photographic method and mobile terminal
CN106127003B (en) A kind of fingerprint recognition unlocking method and mobile terminal
CN107180203B (en) Image encryption and decryption method, mobile terminal and computer readable storage medium
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN107644170B (en) A kind of image processing method and mobile terminal
CN106326713B (en) A kind of unlocking method and mobile terminal of mobile terminal screen
CN106708658B (en) A kind of data back up method, mobile terminal and storage server
CN107527040A (en) A kind of method and apparatus of recognition of face
CN106650367A (en) Private content display method and mobile terminal
CN106250757B (en) A kind of control method and mobile terminal of application program
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN107959789B (en) Image processing method and mobile terminal
CN107194907B (en) A kind of screenshot synthetic method and mobile terminal
CN106791542B (en) A kind of panoramic picture image pickup method and mobile terminal
CN107632870A (en) The startup method and terminal of a kind of application
JP2019522277A (en) Terminal device password unlocking method, apparatus, and terminal device
CN107480500A (en) The method and mobile terminal of a kind of face verification
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN107370758A (en) A kind of login method and mobile terminal
TWI474705B (en) Handheld device and unlocking method thereof
CN106384060B (en) A kind of mobile terminal data encryption method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant