CN106209381B - A kind of photo encipher-decipher method and its system - Google Patents
A kind of photo encipher-decipher method and its system Download PDFInfo
- Publication number
- CN106209381B CN106209381B CN201610546539.6A CN201610546539A CN106209381B CN 106209381 B CN106209381 B CN 106209381B CN 201610546539 A CN201610546539 A CN 201610546539A CN 106209381 B CN106209381 B CN 106209381B
- Authority
- CN
- China
- Prior art keywords
- photo
- encryption
- decryption
- chip
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Abstract
The invention discloses a kind of photo encipher-decipher methods, comprising the following steps: S1, obtains multiple cryptographic key factors generation keys and is stored in encryption chip;S2, encryption chip are encrypted to obtain encryption photo and/or are decrypted to obtain original photo according to the key pair encryption photo according to the key pair original photo;Also disclose a kind of photo encrypting and deciphering system.A kind of photo encipher-decipher method and its system in the present invention, key is generated by multiple cryptographic key factors, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to the key pair photo, since encryption process carries out in encryption chip, the safety and reliability of encryption and decryption photo then can be improved, improve the user experience that user carries out photo encryption and decryption.The present invention can be widely applied to information security field as a kind of photo encipher-decipher method and its system.
Description
Technical field
The present invention relates to information security field, especially a kind of photo encipher-decipher method and its system.
Background technique
After entering 21 century, mobile Internet business provides a user the application of personalized, diversification, content interaction,
It is wherein mobile social because socialization demand is prominent, using abnormal hot.Such as in external widely applied Twitter, Facebook,
Domestic QQ, wechat, microblogging etc. all has the function of multimedia interactive, and numerous APP application including mobile social activity has bat
There is the risk of leakage with this when taking pictures and storing photo according to the function with access camera permission.
Software cryptography mode is mainly used in terms of presently used photo encryption technology, when terminal shoots completion, is led to
Cross encrypting module captured photo is encrypted, cryptograph files generated after encryption, be stored in terminal memory or on
Reach server preservation.The mode of soft encryption is usually that a password or cipher code set is arranged, can be numerical ciphers, pattern or
Biological characteristic is used for user authentication or encryption;Although soft encryption scheme has certain advantage in research and development cost, main
Encryption and decryption performance and security performance on be unable to satisfy growing needs;When passing through software cryptography because of photo, Suo Youyun
It calculates the resource called and terminal hardware and operating system offer support is provided, it is very big to the resource occupation of terminal in encryption and decryption,
If terminal software and hardware configuration is lower, the encryption performance problem that encryption and decryption fails or occurs extremely is easily caused;Another party is thin-skinned
Part ineffective several encryption factor composition key encryptions when encrypting, because software cryptography process is all in terminal system and memory, quilt
The probability that wooden horse and Malware tracking crack increases, and safety has greater risk.
Summary of the invention
In order to solve the above-mentioned technical problem, the object of the present invention is to provide a kind of photo encipher-decipher method and its system, institutes
It states photo encipher-decipher method and its safety, reliability that photo encrypts in intelligent terminal can be improved in system, encryption and decryption is to terminal
Resources occupation rate it is low, improve the encryption and decryption performance of photo.
The technical scheme adopted by the invention is that: a kind of photo encipher-decipher method, comprising the following steps:
S1, multiple cryptographic key factors generation keys are obtained and are stored in encryption chip;
S2, encryption chip are encrypted to obtain encryption photo and/or according to described close according to the key pair original photo
Key is decrypted to obtain original photo to encryption photo.
Further, the step S1 the following steps are included:
S11, setting or verifying encryption and decryption authentication password are to obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, effective intelligent terminal fix information, effective encryption chip fix information are obtained respectively as cryptographic key factor
One of;
S13, according to encryption and decryption authentication password, effective intelligent terminal fix information, effective encryption chip fix information
Generate key;
S14, by the key storage in encryption chip.
Further, the step S2 the following steps are included:
S21, creation temporal cache file;
S22, original photo or encryption photo are put into temporal cache file as temporal cache photo;
S23, encryption chip are according to the original photo or encryption photo progress in the file of the key pair temporal cache
Hardware encryption or hard decryption;
After S24, hardware encryption or hard successful decryption, temporal cache file is deleted.
Further, the acquisition methods of the original photo include by different operation path call different cameral obtain,
Intelligent terminal is obtained by wireless receiving or wired importing, and the different cameral includes operating system camera, encryption camera.
Further, the encryption and decryption authentication password includes character, fingerprint, iris image.
Further, the intelligent terminal fix information includes intelligent terminal IMEI code, intelligent terminal No. SN number, the encryption
Chip fix information includes encryption chip SN.
Further, a kind of photo encipher-decipher method further comprises the steps of:
S3, verifying encryption and decryption authentication password is with managing encrypted photo, including browses, checks, deletes, imports, exports.
It is of the present invention another solution is that a kind of photo encrypting and deciphering system, comprising:
First module, for obtaining multiple cryptographic key factors generation keys and being stored in encryption chip;
Second module obtains encryption photo and/or according to described for being encrypted according to the key pair original photo
Key pair encryption photo is decrypted to obtain original photo.
It is of the present invention another solution is that a kind of photo encrypting and deciphering system, including intelligent terminal, encryption chip
And processor, the intelligent terminal are connect with processor, the processor is connect with encryption chip, and the processor is for holding
Row:
Multiple cryptographic key factors are obtained to generate key and be stored in encryption chip;
Triggering encryption chip is encrypted to obtain encryption photo and/or according to described close according to the key pair original photo
Key is decrypted to obtain original photo to encryption photo.
Further, the encryption chip includes encryption/decryption module, chip memory, and the encryption/decryption module is deposited with chip
Reservoir connection.
Further, the intelligent terminal include terminal handler, camera, wireless communication module, be wirelessly connected module,
Data-interface and terminal memory, the terminal handler respectively with camera, wireless communication module, be wirelessly connected module, number
It is connected according to interface, terminal memory.
The beneficial effects of the present invention are: a kind of photo encipher-decipher method in the present invention, is generated close by multiple cryptographic key factors
Key, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to the key pair photo, due to encryption and decryption mistake
Cheng Jun is carried out in encryption chip, then the safety and reliability of encryption and decryption photo can be improved, and is improved user's progress photo and is added solution
Close user experience.
Another beneficial effect of the present invention is: a kind of photo encrypting and deciphering system in the present invention, including the first module and second
Module, first module generate key according to multiple cryptographic key factors, and by key storage in encryption chip, second mould
Root tuber carries out encryption and decryption according to the key pair photo, since key storage is in encryption chip, improves the safety of encryption and decryption photo
Property.
Another beneficial effect of the present invention is: a kind of photo encrypting and deciphering system in the present invention, including intelligent terminal, encryption core
Piece and processor carry out photo encryption and decryption using encryption chip, physically completely cut off unauthorized access, guarantee safety when operation
Property;Photo encryption and decryption operation in encryption chip simultaneously, it is few to the resource occupation of intelligent terminal, improve the encryption and decryption of photo
Efficiency.
Detailed description of the invention
Specific embodiments of the present invention will be further explained with reference to the accompanying drawing:
Fig. 1 is a kind of method flow diagram of photo encipher-decipher method in the present invention;
Fig. 2 is the specific embodiment flow chart of steps for encrypting photo in the present invention in a kind of photo encipher-decipher method;
Fig. 3 is the specific embodiment flow chart of steps for decrypting photo in the present invention in a kind of photo encipher-decipher method;
Fig. 4 is a kind of photo encryption process schematic diagram of photo encipher-decipher method in the present invention;
Fig. 5 is a kind of structural block diagram of photo encrypting and deciphering system in the present invention.
Specific embodiment
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.
A kind of photo encipher-decipher method is a kind of method flow of photo encipher-decipher method in the present invention with reference to Fig. 1, Fig. 1
Figure, comprising the following steps:
S1, multiple cryptographic key factors generation keys are obtained and are stored in encryption chip;
S2, encryption chip are encrypted to obtain encryption photo and/or according to described close according to the key pair original photo
Key is decrypted to obtain original photo to encryption photo.
In the present embodiment, key is generated by multiple cryptographic key factors, the key storage is in encryption chip;Encryption chip
It is encrypted or is decrypted according to key pair original photo or encryption photo;Key is obtained by a variety of cryptographic key factors, improves and shines
The security performance of piece encryption and decryption, encryption process carry out in encryption chip, physically completely cut off unauthorized access, guarantee operation
When safety;Encryption and decryption operation in encryption chip simultaneously, it is less to terminal resource occupancy, improve the encryption and decryption of photo
Efficiency.
As the further improvement of technical solution, the step S1 the following steps are included:
S11, setting or verifying encryption and decryption authentication password are to obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, effective intelligent terminal fix information, effective encryption chip fix information are obtained respectively as cryptographic key factor
One of;
S13, according to encryption and decryption authentication password, effective intelligent terminal fix information, effective encryption chip fix information
Generate key;
S14, by the key storage in encryption chip.
In the present embodiment, the cryptographic key factor includes encryption and decryption authentication password, effective intelligent terminal fix information, has
The encryption chip fix information of effect obtains the key of encryption and decryption photo by a variety of different cryptographic key factors, improves encryption and decryption photo
Safety, reliability.In addition, all equal making for identifying uniqueness and authentication terminal equipment uniqueness identity characteristic with user
For the cryptographic key factor for forming key.
As the further improvement of technical solution, the encryption and decryption authentication password includes character, fingerprint, iris image, institute
Encryption and decryption authentication password is stated by saving after encryption into the database of intelligent terminal.
As the further improvement of technical solution, the intelligent terminal fix information includes intelligent terminal IMEI code, intelligence
Terminal SN, the encryption chip fix information includes encryption chip SN, and encryption chip SN inside for encryption chip is compiled
Code, every chips have unique No. SN and are made of 16 bit digitals, and the IMEI code of intelligent terminal adds 1 bit check by 14 bit digitals
Code composition.
It in the present embodiment, is the tool for encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2
Body embodiment step flow chart keeps the photo encryption system being obtained by the present invention operation and intelligence whole in actual use
On the operating system at end, into before photo encryption system, need to be arranged the encryption and decryption authentication password of photo encryption system, institute
It states encryption and decryption authentication password and carries out safety certification for entering the user of photo encryption system to request, when certification is by could be into
Enter photo encryption system, feature operation and management are carried out to encryption photo.Then, photo encryption system backstage is called by interface
Intelligent terminal IMEI code, encryption chip SN are obtained, and judges whether the intelligent terminal IMEI code, encryption chip SN code have
Effect, when intelligent terminal IMEI code, encryption chip SN it is invalid when, setting encryption and decryption authentication password fail, otherwise encryption and decryption is set
Authentication password success.Finally, according to set encryption and decryption authentication password, effective intelligent terminal fix information, it is effective plus
The logical operation that close chip fix information is combined obtains key by complicated operation.
It is the specific embodiment step stream for decrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3
Cheng Tu needs first to request to enter photo encryption system, needs to verify use when user wants that operation is decrypted to encryption photo
The encryption and decryption authentication password of family input, only when encryption and decryption authentication password is correct, user can just enter photo encryption system, no
Then password mistake, which will move out, logs in.After logging in successfully, obtains intelligent terminal IMEI code and encryption chip SN and judge that it is
It is no it is legal effectively, only when intelligent terminal IMEI code and encryption chip SN it is effective when, processor just can according to input plus
No. SN decrypted authentication password, intelligent terminal IMEI code and encryption chip generation key.
As the further improvement of technical solution, the step S2 the following steps are included:
S21, creation temporal cache file;
S22, original photo or encryption photo are put into temporal cache file as temporal cache photo;
S23, encryption chip are according to the original photo or encryption photo progress in the file of the key pair temporal cache
Hardware encryption or hard decryption;
After S24, hardware encryption or hard successful decryption, temporal cache file is deleted.
It in the present embodiment, is a kind of photo encryption process of photo encipher-decipher method in the present invention with reference to Fig. 4, Fig. 4
Schematic diagram, using original photo or encryption photo deposit temporal cache file as temporal cache photo, the temporal cache
Photo is not supported to be directly viewable, and processor is by calling the SDK interface of encryption chip to complete encryption chip to original using key
The encryption of beginning photo or decryption to encryption photo delete temporal cache file after encryption and decryption success, described interim
Cache file folder is located in the terminal memory of intelligent terminal, and the encryption photo, original photo are stored in the end of intelligent terminal
It holds in memory.In actual use, photo storage uses one piece of storage region in terminal memory, this storage region can
For storing original photo captured by operating system camera, encryption camera, encrypt generated slow when photo and encryption and decryption
Deposit data;The amount of capacity of the storage region determines (to become with the capacity dynamic of terminal memory according to terminal memory size
Change).Encryption chip supports a variety of domestic and international Encryption Algorithm (AES, DES, RSA, SM2, SM3, SM4 etc.), different by calling
Encryption Algorithm interface obtains different Encryption Algorithm, carries out photo encryption and decryption after the completion of initialization.
It is the specific embodiment step stream for encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2
Original photo is stored in the file of temporal cache by Cheng Tu, and encryption chip is according to key by the caching in the file of temporal cache
Photo carries out encrypted photo preservation to terminal memory.After the completion of photo encryption, the closing tag of encryption photo is read, is sentenced
Whether disconnected photo encryption succeeds, if encrypting successfully, temporal cache file will be deleted, if unsuccessful will successfully shine unencryption
Piece re-starts encryption, and encrypting successful photo can be reserved in photo encryption system and normally show preview.Encryption photo makes
It is saved with ciphertext, normally will not be read and be shown in the picture library of intelligent terminal operation system, needed through export function, it will
Encryption photo is exported into intelligent terminal operation system (export process is exactly a decrypting process), could normally preview be shown.
It is the specific embodiment step stream for decrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3
Cheng Tu, will be in encryption photo deposit temporal cache file, and encryption chip is according to key by the caching in the file of temporal cache
Photo after photo is decrypted is saved to terminal memory.After the completion of photo decryption, the closing tag of decryption photo is read, is sentenced
Whether disconnected photo decryption succeeds, if successful decryption, temporal cache file will be deleted, if unsuccessful, to non-successful decryption
Photo re-starts decryption, and the photo of successful decryption is saved to the picture library of intelligent terminal operation system, can normally be shown in picture library
Show preview.
Encryption and decryption photo is saved using cache file folder in encryption process, when encryption and decryption failure or in encryption and decryption power-off
It can effectively avoid photo damage or lose abnormal;In addition, the encryption process of photo only occurs in encryption chip.It is not take up intelligence
The resource of energy terminal, can also improve the security performance of photo encryption and decryption.
As the further improvement of technical solution, the acquisition methods of the original photo include passing through different operation path tune
It is obtained with different cameral acquisition, intelligent terminal by wireless receiving or wired importing, the different cameral includes operating system
Camera, encryption camera.
It in the present embodiment, is the tool for encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2
Body embodiment step flow chart, before generating key, opening camera, which is taken pictures, obtains original photo, passes through the operation of intelligent terminal
Photo captured by system camera is deposited into the picture library of intelligent terminal, and original photo needs just enter encryption photo by importing
System needs first to create a temporal cache file before photo encryption, and original photo can first be directed into temporal cache file
As caching photo, and encrypting camera is directly to be stored in captured photo in the file of temporal cache to shine as caching
Piece.Furthermore it is also possible to obtain original photo, the original photo deposit behaviour by intelligent terminal wireless receiving or wired importing
Make in the picture library of system, when needing to encrypt original photo, temporal cache file can be imported and encrypted.
As the further improvement of technical solution, a kind of photo encipher-decipher method is further comprised the steps of:
S3, verifying encryption and decryption authentication password is with managing encrypted photo, including browses, checks, deletes, imports, exports.
In the present embodiment, photo encryption system include encryption photo management function, into encryption the photo management page it
Before, it needs to carry out authentication, the encryption photo management page, encryption can be shown by only inputting correct encryption and decryption authentication password
Photo could can browse encryption photo, be checked, delete, leading after entering encryption photo management interface by interface display
Original photo can also be imported photo and encrypt phychology by equal operation out, and importing process is exactly an encryption original photo in fact
Process.
Photo generation, photo encryption and decryption, photo management are effectively integrated into photo encryption system by the present invention, are solved
The safety problem of photo storage, carrying out encryption and decryption processing by encryption chip ensure that safety, reliability and plus the solution of photo
Close validity simplifies user's operation, and the user experience is improved.
A kind of photo encrypting and deciphering system, comprising:
First module, for obtaining multiple cryptographic key factors generation keys and being stored in encryption chip;
Second module obtains encryption photo and/or according to described for being encrypted according to the key pair original photo
Key pair encryption photo is decrypted to obtain original photo.
In the present embodiment, a kind of photo encrypting and deciphering system includes the first module, the second module, the first module is logical obtain it is multiple
Cryptographic key factor generates key and is stored in encryption chip, and encryption chip prevents extraneous program and application access, guarantees close
The safety of key;Second module carries out photo encryption and decryption according to the key.
A kind of photo encrypting and deciphering system is a kind of structural block diagram of photo encrypting and deciphering system in the present invention with reference to Fig. 5, Fig. 5,
Including intelligent terminal, encryption chip and processor, the intelligent terminal is connect with processor, and the processor and encryption chip connect
It connects, the processor is for executing:
Multiple cryptographic key factors are obtained to generate key and be stored in encryption chip;
Triggering encryption chip is encrypted to obtain encryption photo and/or according to described close according to the key pair original photo
Key is decrypted to obtain original photo to encryption photo.
In the present embodiment, the processor of photo encryption system generates keys by obtaining multiple cryptographic key factors, and by its
It is stored in encryption chip, the encryption chip is encrypted or decrypted according to key pair original photo or encryption photo.
Key is obtained by a variety of cryptographic key factors, improves the security performance of photo encryption and decryption, encryption process carries out in encryption chip,
Physically completely cut off unauthorized access, guarantees safety when operation;Encryption and decryption operation in encryption chip simultaneously provides terminal
Source occupancy is less, improves the encryption and decryption efficiency of photo.
As the further improvement of technical solution, the encryption chip includes encryption/decryption module, chip memory, it is described plus
Deciphering module is connect with chip memory.
In the present embodiment, encryption/decryption module according to the key pair original photo encrypted to obtain encryption photo and/
Or it is decrypted to obtain original photo according to the key pair encryption photo;Chip memory is responsible for storing key.External journey
Sequence and application cannot arbitrarily access the chip memory of encryption chip, need to access using defined interface, encryption and decryption mould
Block obtains key by the peculiar interface access chip memory of chip, is used for encryption and decryption, it is ensured that key and encryption process
Safety.
As the further improvement of technical solution, the intelligent terminal includes terminal handler, camera, wireless telecommunications mould
Block is wirelessly connected module, data-interface and terminal memory, the terminal handler respectively with camera, wireless communication module,
It is wirelessly connected module, data-interface, terminal memory connection.
In the present embodiment, information processing centre and control centre of the terminal handler as intelligent terminal, the processing
Device can be integrated with terminal handler;The camera is for shooting to obtain original photo;Wireless communication module is used for
Wireless network communication, wireless communication module include 2G communication module, 3G communication module, 4G communication module, can be used for the behaviour such as online
Make;It is wirelessly connected module and is used for wireless data connection, being wirelessly connected module includes bluetooth module, WiFi module, the channel radio
News module, wireless connection module can be used for obtaining original photo.In addition, data-interface includes USB data interface, it can also be used to number
According to transmission, in the present embodiment, can be used for transmitting original photo.
The terminal memory is for storing photo, and in actual use, storage photo is used in terminal memory
One piece of storage region, this storage region can be used for storing operating system camera, encryption camera captured by original photo, encryption
It is generated data cached when photo and encryption and decryption.
The present invention in an intelligent terminal integrate encryption chip, the key obtained by multiple cryptographic key factors, and using its with
The mode of soft or hard combination carries out hardware encryption, hard decryption to the photo that different paths obtain, while can be right in photo encryption system
The photo encrypted is managed.It solves the safety problem for the photo that intelligent terminal is stored, avoids photo by intelligent terminal
Other application software illegally read, encryption camera and photo management function is integrated in photo encryption system, increases operation
Safety and experience have the function of positive in terms of protecting privacy of user.
It is to be illustrated to preferable implementation of the invention, but the invention is not limited to the implementation above
Example, those skilled in the art can also make various equivalent variations on the premise of without prejudice to spirit of the invention or replace
It changes, these equivalent deformations or replacement are all included in the scope defined by the claims of the present application.
Claims (10)
1. a kind of photo encipher-decipher method, which comprises the following steps:
S1, multiple cryptographic key factors generation keys are obtained and are stored in encryption chip;
S2, encryption chip are encrypted to obtain encryption photo and/or according to the key pair according to the key pair original photo
Encryption photo is decrypted to obtain original photo;
The step S2 the following steps are included:
S21, creation temporal cache file;
S22, original photo or encryption photo are put into temporal cache file as temporal cache photo;
S23, encryption chip according in the file of the key pair temporal cache original photo or encryption photo carry out firmly plus
Close or hard decryption;
After S24, hardware encryption or hard successful decryption, temporal cache file is deleted.
2. a kind of photo encipher-decipher method according to claim 1, which is characterized in that the step S1 includes following step
It is rapid:
S11, setting or verifying encryption and decryption authentication password are to obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal fix information, effective encryption chip fix information respectively as cryptographic key factor it
One;
S13, it is generated according to encryption and decryption authentication password, effective intelligent terminal fix information, effective encryption chip fix information
Key;
S14, by the key storage in encryption chip.
3. according to claim 1 to a kind of 2 described in any item photo encipher-decipher methods, which is characterized in that the original photo
Acquisition methods include call different cameral to obtain by different operation path, intelligent terminal by wireless receiving or wired is led
Enter to obtain, the different cameral includes operating system camera, encryption camera.
4. a kind of photo encipher-decipher method according to claim 2, which is characterized in that the encryption and decryption authentication password includes
Character, fingerprint, iris image.
5. a kind of photo encipher-decipher method according to claim 4, which is characterized in that the intelligent terminal fix information packet
Intelligent terminal IMEI code, intelligent terminal No. SN number are included, the encryption chip fix information includes encryption chip SN.
6. a kind of photo encipher-decipher method according to claim 2,4 or 5, which is characterized in that further comprise the steps of:
S3, verifying encryption and decryption authentication password is with managing encrypted photo, including browses, checks, deletes, imports, exports.
7. a kind of photo encrypting and deciphering system characterized by comprising
First module, for obtaining multiple cryptographic key factors generation keys and being stored in encryption chip;
Second module obtains encryption photo and/or according to the key for being encrypted according to the key pair original photo
Encryption photo is decrypted to obtain original photo;Specifically, temporal cache file is created;
Original photo or encryption photo are put into temporal cache file as temporal cache photo;
Encryption chip according in the file of the key pair temporal cache original photo or encryption photo carry out hardware encryption or
Hard decryption;
After hardware encryption or hard successful decryption, temporal cache file is deleted.
8. a kind of photo encrypting and deciphering system, which is characterized in that including intelligent terminal, encryption chip and processor, the intelligence is eventually
End is connect with processor, and the processor is connect with encryption chip, and the processor is for executing:
Multiple cryptographic key factors are obtained to generate key and be stored in encryption chip;
Triggering encryption chip is encrypted to obtain encryption photo and/or according to the key pair according to the key pair original photo
Encryption photo is decrypted to obtain original photo;Specifically, temporal cache file is created;
Original photo or encryption photo are put into temporal cache file as temporal cache photo;
Encryption chip according in the file of the key pair temporal cache original photo or encryption photo carry out hardware encryption or
Hard decryption;
After hardware encryption or hard successful decryption, temporal cache file is deleted.
9. a kind of photo encrypting and deciphering system according to claim 8, which is characterized in that the encryption chip includes encryption and decryption
Module, chip memory, the encryption/decryption module are connect with chip memory.
10. a kind of photo encrypting and deciphering system according to claim 8, which is characterized in that the intelligent terminal includes terminal
Processor, wireless communication module, is wirelessly connected module, data-interface and terminal memory, the terminal handler point at camera
It is not connect with camera, wireless communication module, wireless connection module, data-interface, terminal memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610546539.6A CN106209381B (en) | 2016-07-12 | 2016-07-12 | A kind of photo encipher-decipher method and its system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610546539.6A CN106209381B (en) | 2016-07-12 | 2016-07-12 | A kind of photo encipher-decipher method and its system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209381A CN106209381A (en) | 2016-12-07 |
CN106209381B true CN106209381B (en) | 2019-04-26 |
Family
ID=57476435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610546539.6A Active CN106209381B (en) | 2016-07-12 | 2016-07-12 | A kind of photo encipher-decipher method and its system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209381B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145563B (en) * | 2018-08-13 | 2022-04-22 | 创新先进技术有限公司 | Identity verification method and device |
CN111711515B (en) * | 2020-05-18 | 2022-04-26 | 冠群信息技术(南京)有限公司 | Three-party AES key synthesis method, encryption method and decryption method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102419805A (en) * | 2011-11-22 | 2012-04-18 | 中兴通讯股份有限公司 | Terminal equipment and method for encrypting user information |
CN103020504A (en) * | 2012-12-03 | 2013-04-03 | 鹤山世达光电科技有限公司 | Image management system and image management method based on fingerprint identification |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103559453A (en) * | 2013-05-23 | 2014-02-05 | 深圳市中易通网络技术有限公司 | Hardware encryption protection method and system for cellphone data |
CN104683978A (en) * | 2015-03-27 | 2015-06-03 | 襄阳泰凯电子有限公司 | Mobile phone stored information encryption device and method |
CN105160264A (en) * | 2015-09-29 | 2015-12-16 | 努比亚技术有限公司 | Photograph encryption device and method |
CN105260669A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Transmission method and system of pictures |
CN105354501A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo processing method and processing system |
-
2016
- 2016-07-12 CN CN201610546539.6A patent/CN106209381B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102419805A (en) * | 2011-11-22 | 2012-04-18 | 中兴通讯股份有限公司 | Terminal equipment and method for encrypting user information |
CN103020504A (en) * | 2012-12-03 | 2013-04-03 | 鹤山世达光电科技有限公司 | Image management system and image management method based on fingerprint identification |
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103559453A (en) * | 2013-05-23 | 2014-02-05 | 深圳市中易通网络技术有限公司 | Hardware encryption protection method and system for cellphone data |
CN104683978A (en) * | 2015-03-27 | 2015-06-03 | 襄阳泰凯电子有限公司 | Mobile phone stored information encryption device and method |
CN105160264A (en) * | 2015-09-29 | 2015-12-16 | 努比亚技术有限公司 | Photograph encryption device and method |
CN105260669A (en) * | 2015-10-28 | 2016-01-20 | 广东欧珀移动通信有限公司 | Transmission method and system of pictures |
CN105354501A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Photo processing method and processing system |
Also Published As
Publication number | Publication date |
---|---|
CN106209381A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8813243B2 (en) | Reducing a size of a security-related data object stored on a token | |
CN103685282B (en) | A kind of identity identifying method based on single-sign-on | |
US20190140844A1 (en) | Identity-linked authentication through a user certificate system | |
US9935954B2 (en) | System and method for securing machine-to-machine communications | |
US9544135B2 (en) | Methods of and systems for facilitating decryption of encrypted electronic information | |
US11936776B2 (en) | Secure key exchange electronic transactions | |
CN111191286A (en) | HyperLegger Fabric block chain private data storage and access system and method thereof | |
US20220067189A1 (en) | Data Sharing Via Distributed Ledgers | |
US9730060B2 (en) | Method and system for transfering profiles of authentication module | |
JP2016513945A (en) | Establishing reliability between applications on a computer | |
US11227041B2 (en) | Identification service based authorization | |
CN107920081A (en) | Login authentication method and device | |
US20210390533A1 (en) | User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System | |
CN103559453A (en) | Hardware encryption protection method and system for cellphone data | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
CN111566989B (en) | Key processing method and device | |
CN103577769A (en) | File content safety management method and management system | |
US10999073B2 (en) | Secure network communication method | |
CN106209381B (en) | A kind of photo encipher-decipher method and its system | |
KR100594886B1 (en) | System and Method for Security of Database | |
CN110266641B (en) | Information reading method, system, device and computer readable storage medium | |
US20090144553A1 (en) | System and method of controlling access to a device | |
CN106537962B (en) | Wireless network configuration, access and access method, device and equipment | |
KR101329789B1 (en) | Encryption Method of Database of Mobile Communication Device | |
JP6763096B1 (en) | system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210909 Address after: 518000 1310, Tianming science and technology building, No. 8, wushitou Road, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after: Zhongyitong Technology Co.,Ltd. Address before: 518000 tower 501, tower a, Jiada R & D building, No. 5, songpingshan Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Patentee before: SHENZHEN ZHONGYITONG SECURITY CORE TECHNOLOGY Co.,Ltd. |