CN106209381B - A kind of photo encipher-decipher method and its system - Google Patents

A kind of photo encipher-decipher method and its system Download PDF

Info

Publication number
CN106209381B
CN106209381B CN201610546539.6A CN201610546539A CN106209381B CN 106209381 B CN106209381 B CN 106209381B CN 201610546539 A CN201610546539 A CN 201610546539A CN 106209381 B CN106209381 B CN 106209381B
Authority
CN
China
Prior art keywords
photo
encryption
decryption
chip
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610546539.6A
Other languages
Chinese (zh)
Other versions
CN106209381A (en
Inventor
刘美云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongyitong Technology Co.,Ltd.
Original Assignee
Shenzhen Zhongyitong Security Core Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongyitong Security Core Technology Co Ltd filed Critical Shenzhen Zhongyitong Security Core Technology Co Ltd
Priority to CN201610546539.6A priority Critical patent/CN106209381B/en
Publication of CN106209381A publication Critical patent/CN106209381A/en
Application granted granted Critical
Publication of CN106209381B publication Critical patent/CN106209381B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The invention discloses a kind of photo encipher-decipher methods, comprising the following steps: S1, obtains multiple cryptographic key factors generation keys and is stored in encryption chip;S2, encryption chip are encrypted to obtain encryption photo and/or are decrypted to obtain original photo according to the key pair encryption photo according to the key pair original photo;Also disclose a kind of photo encrypting and deciphering system.A kind of photo encipher-decipher method and its system in the present invention, key is generated by multiple cryptographic key factors, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to the key pair photo, since encryption process carries out in encryption chip, the safety and reliability of encryption and decryption photo then can be improved, improve the user experience that user carries out photo encryption and decryption.The present invention can be widely applied to information security field as a kind of photo encipher-decipher method and its system.

Description

A kind of photo encipher-decipher method and its system
Technical field
The present invention relates to information security field, especially a kind of photo encipher-decipher method and its system.
Background technique
After entering 21 century, mobile Internet business provides a user the application of personalized, diversification, content interaction, It is wherein mobile social because socialization demand is prominent, using abnormal hot.Such as in external widely applied Twitter, Facebook, Domestic QQ, wechat, microblogging etc. all has the function of multimedia interactive, and numerous APP application including mobile social activity has bat There is the risk of leakage with this when taking pictures and storing photo according to the function with access camera permission.
Software cryptography mode is mainly used in terms of presently used photo encryption technology, when terminal shoots completion, is led to Cross encrypting module captured photo is encrypted, cryptograph files generated after encryption, be stored in terminal memory or on Reach server preservation.The mode of soft encryption is usually that a password or cipher code set is arranged, can be numerical ciphers, pattern or Biological characteristic is used for user authentication or encryption;Although soft encryption scheme has certain advantage in research and development cost, main Encryption and decryption performance and security performance on be unable to satisfy growing needs;When passing through software cryptography because of photo, Suo Youyun It calculates the resource called and terminal hardware and operating system offer support is provided, it is very big to the resource occupation of terminal in encryption and decryption, If terminal software and hardware configuration is lower, the encryption performance problem that encryption and decryption fails or occurs extremely is easily caused;Another party is thin-skinned Part ineffective several encryption factor composition key encryptions when encrypting, because software cryptography process is all in terminal system and memory, quilt The probability that wooden horse and Malware tracking crack increases, and safety has greater risk.
Summary of the invention
In order to solve the above-mentioned technical problem, the object of the present invention is to provide a kind of photo encipher-decipher method and its system, institutes It states photo encipher-decipher method and its safety, reliability that photo encrypts in intelligent terminal can be improved in system, encryption and decryption is to terminal Resources occupation rate it is low, improve the encryption and decryption performance of photo.
The technical scheme adopted by the invention is that: a kind of photo encipher-decipher method, comprising the following steps:
S1, multiple cryptographic key factors generation keys are obtained and are stored in encryption chip;
S2, encryption chip are encrypted to obtain encryption photo and/or according to described close according to the key pair original photo Key is decrypted to obtain original photo to encryption photo.
Further, the step S1 the following steps are included:
S11, setting or verifying encryption and decryption authentication password are to obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, effective intelligent terminal fix information, effective encryption chip fix information are obtained respectively as cryptographic key factor One of;
S13, according to encryption and decryption authentication password, effective intelligent terminal fix information, effective encryption chip fix information Generate key;
S14, by the key storage in encryption chip.
Further, the step S2 the following steps are included:
S21, creation temporal cache file;
S22, original photo or encryption photo are put into temporal cache file as temporal cache photo;
S23, encryption chip are according to the original photo or encryption photo progress in the file of the key pair temporal cache Hardware encryption or hard decryption;
After S24, hardware encryption or hard successful decryption, temporal cache file is deleted.
Further, the acquisition methods of the original photo include by different operation path call different cameral obtain, Intelligent terminal is obtained by wireless receiving or wired importing, and the different cameral includes operating system camera, encryption camera.
Further, the encryption and decryption authentication password includes character, fingerprint, iris image.
Further, the intelligent terminal fix information includes intelligent terminal IMEI code, intelligent terminal No. SN number, the encryption Chip fix information includes encryption chip SN.
Further, a kind of photo encipher-decipher method further comprises the steps of:
S3, verifying encryption and decryption authentication password is with managing encrypted photo, including browses, checks, deletes, imports, exports.
It is of the present invention another solution is that a kind of photo encrypting and deciphering system, comprising:
First module, for obtaining multiple cryptographic key factors generation keys and being stored in encryption chip;
Second module obtains encryption photo and/or according to described for being encrypted according to the key pair original photo Key pair encryption photo is decrypted to obtain original photo.
It is of the present invention another solution is that a kind of photo encrypting and deciphering system, including intelligent terminal, encryption chip And processor, the intelligent terminal are connect with processor, the processor is connect with encryption chip, and the processor is for holding Row:
Multiple cryptographic key factors are obtained to generate key and be stored in encryption chip;
Triggering encryption chip is encrypted to obtain encryption photo and/or according to described close according to the key pair original photo Key is decrypted to obtain original photo to encryption photo.
Further, the encryption chip includes encryption/decryption module, chip memory, and the encryption/decryption module is deposited with chip Reservoir connection.
Further, the intelligent terminal include terminal handler, camera, wireless communication module, be wirelessly connected module, Data-interface and terminal memory, the terminal handler respectively with camera, wireless communication module, be wirelessly connected module, number It is connected according to interface, terminal memory.
The beneficial effects of the present invention are: a kind of photo encipher-decipher method in the present invention, is generated close by multiple cryptographic key factors Key, and by key storage in encryption chip, encryption chip carries out encryption and decryption according to the key pair photo, due to encryption and decryption mistake Cheng Jun is carried out in encryption chip, then the safety and reliability of encryption and decryption photo can be improved, and is improved user's progress photo and is added solution Close user experience.
Another beneficial effect of the present invention is: a kind of photo encrypting and deciphering system in the present invention, including the first module and second Module, first module generate key according to multiple cryptographic key factors, and by key storage in encryption chip, second mould Root tuber carries out encryption and decryption according to the key pair photo, since key storage is in encryption chip, improves the safety of encryption and decryption photo Property.
Another beneficial effect of the present invention is: a kind of photo encrypting and deciphering system in the present invention, including intelligent terminal, encryption core Piece and processor carry out photo encryption and decryption using encryption chip, physically completely cut off unauthorized access, guarantee safety when operation Property;Photo encryption and decryption operation in encryption chip simultaneously, it is few to the resource occupation of intelligent terminal, improve the encryption and decryption of photo Efficiency.
Detailed description of the invention
Specific embodiments of the present invention will be further explained with reference to the accompanying drawing:
Fig. 1 is a kind of method flow diagram of photo encipher-decipher method in the present invention;
Fig. 2 is the specific embodiment flow chart of steps for encrypting photo in the present invention in a kind of photo encipher-decipher method;
Fig. 3 is the specific embodiment flow chart of steps for decrypting photo in the present invention in a kind of photo encipher-decipher method;
Fig. 4 is a kind of photo encryption process schematic diagram of photo encipher-decipher method in the present invention;
Fig. 5 is a kind of structural block diagram of photo encrypting and deciphering system in the present invention.
Specific embodiment
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.
A kind of photo encipher-decipher method is a kind of method flow of photo encipher-decipher method in the present invention with reference to Fig. 1, Fig. 1 Figure, comprising the following steps:
S1, multiple cryptographic key factors generation keys are obtained and are stored in encryption chip;
S2, encryption chip are encrypted to obtain encryption photo and/or according to described close according to the key pair original photo Key is decrypted to obtain original photo to encryption photo.
In the present embodiment, key is generated by multiple cryptographic key factors, the key storage is in encryption chip;Encryption chip It is encrypted or is decrypted according to key pair original photo or encryption photo;Key is obtained by a variety of cryptographic key factors, improves and shines The security performance of piece encryption and decryption, encryption process carry out in encryption chip, physically completely cut off unauthorized access, guarantee operation When safety;Encryption and decryption operation in encryption chip simultaneously, it is less to terminal resource occupancy, improve the encryption and decryption of photo Efficiency.
As the further improvement of technical solution, the step S1 the following steps are included:
S11, setting or verifying encryption and decryption authentication password are to obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, effective intelligent terminal fix information, effective encryption chip fix information are obtained respectively as cryptographic key factor One of;
S13, according to encryption and decryption authentication password, effective intelligent terminal fix information, effective encryption chip fix information Generate key;
S14, by the key storage in encryption chip.
In the present embodiment, the cryptographic key factor includes encryption and decryption authentication password, effective intelligent terminal fix information, has The encryption chip fix information of effect obtains the key of encryption and decryption photo by a variety of different cryptographic key factors, improves encryption and decryption photo Safety, reliability.In addition, all equal making for identifying uniqueness and authentication terminal equipment uniqueness identity characteristic with user For the cryptographic key factor for forming key.
As the further improvement of technical solution, the encryption and decryption authentication password includes character, fingerprint, iris image, institute Encryption and decryption authentication password is stated by saving after encryption into the database of intelligent terminal.
As the further improvement of technical solution, the intelligent terminal fix information includes intelligent terminal IMEI code, intelligence Terminal SN, the encryption chip fix information includes encryption chip SN, and encryption chip SN inside for encryption chip is compiled Code, every chips have unique No. SN and are made of 16 bit digitals, and the IMEI code of intelligent terminal adds 1 bit check by 14 bit digitals Code composition.
It in the present embodiment, is the tool for encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2 Body embodiment step flow chart keeps the photo encryption system being obtained by the present invention operation and intelligence whole in actual use On the operating system at end, into before photo encryption system, need to be arranged the encryption and decryption authentication password of photo encryption system, institute It states encryption and decryption authentication password and carries out safety certification for entering the user of photo encryption system to request, when certification is by could be into Enter photo encryption system, feature operation and management are carried out to encryption photo.Then, photo encryption system backstage is called by interface Intelligent terminal IMEI code, encryption chip SN are obtained, and judges whether the intelligent terminal IMEI code, encryption chip SN code have Effect, when intelligent terminal IMEI code, encryption chip SN it is invalid when, setting encryption and decryption authentication password fail, otherwise encryption and decryption is set Authentication password success.Finally, according to set encryption and decryption authentication password, effective intelligent terminal fix information, it is effective plus The logical operation that close chip fix information is combined obtains key by complicated operation.
It is the specific embodiment step stream for decrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3 Cheng Tu needs first to request to enter photo encryption system, needs to verify use when user wants that operation is decrypted to encryption photo The encryption and decryption authentication password of family input, only when encryption and decryption authentication password is correct, user can just enter photo encryption system, no Then password mistake, which will move out, logs in.After logging in successfully, obtains intelligent terminal IMEI code and encryption chip SN and judge that it is It is no it is legal effectively, only when intelligent terminal IMEI code and encryption chip SN it is effective when, processor just can according to input plus No. SN decrypted authentication password, intelligent terminal IMEI code and encryption chip generation key.
As the further improvement of technical solution, the step S2 the following steps are included:
S21, creation temporal cache file;
S22, original photo or encryption photo are put into temporal cache file as temporal cache photo;
S23, encryption chip are according to the original photo or encryption photo progress in the file of the key pair temporal cache Hardware encryption or hard decryption;
After S24, hardware encryption or hard successful decryption, temporal cache file is deleted.
It in the present embodiment, is a kind of photo encryption process of photo encipher-decipher method in the present invention with reference to Fig. 4, Fig. 4 Schematic diagram, using original photo or encryption photo deposit temporal cache file as temporal cache photo, the temporal cache Photo is not supported to be directly viewable, and processor is by calling the SDK interface of encryption chip to complete encryption chip to original using key The encryption of beginning photo or decryption to encryption photo delete temporal cache file after encryption and decryption success, described interim Cache file folder is located in the terminal memory of intelligent terminal, and the encryption photo, original photo are stored in the end of intelligent terminal It holds in memory.In actual use, photo storage uses one piece of storage region in terminal memory, this storage region can For storing original photo captured by operating system camera, encryption camera, encrypt generated slow when photo and encryption and decryption Deposit data;The amount of capacity of the storage region determines (to become with the capacity dynamic of terminal memory according to terminal memory size Change).Encryption chip supports a variety of domestic and international Encryption Algorithm (AES, DES, RSA, SM2, SM3, SM4 etc.), different by calling Encryption Algorithm interface obtains different Encryption Algorithm, carries out photo encryption and decryption after the completion of initialization.
It is the specific embodiment step stream for encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2 Original photo is stored in the file of temporal cache by Cheng Tu, and encryption chip is according to key by the caching in the file of temporal cache Photo carries out encrypted photo preservation to terminal memory.After the completion of photo encryption, the closing tag of encryption photo is read, is sentenced Whether disconnected photo encryption succeeds, if encrypting successfully, temporal cache file will be deleted, if unsuccessful will successfully shine unencryption Piece re-starts encryption, and encrypting successful photo can be reserved in photo encryption system and normally show preview.Encryption photo makes It is saved with ciphertext, normally will not be read and be shown in the picture library of intelligent terminal operation system, needed through export function, it will Encryption photo is exported into intelligent terminal operation system (export process is exactly a decrypting process), could normally preview be shown.
It is the specific embodiment step stream for decrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 3, Fig. 3 Cheng Tu, will be in encryption photo deposit temporal cache file, and encryption chip is according to key by the caching in the file of temporal cache Photo after photo is decrypted is saved to terminal memory.After the completion of photo decryption, the closing tag of decryption photo is read, is sentenced Whether disconnected photo decryption succeeds, if successful decryption, temporal cache file will be deleted, if unsuccessful, to non-successful decryption Photo re-starts decryption, and the photo of successful decryption is saved to the picture library of intelligent terminal operation system, can normally be shown in picture library Show preview.
Encryption and decryption photo is saved using cache file folder in encryption process, when encryption and decryption failure or in encryption and decryption power-off It can effectively avoid photo damage or lose abnormal;In addition, the encryption process of photo only occurs in encryption chip.It is not take up intelligence The resource of energy terminal, can also improve the security performance of photo encryption and decryption.
As the further improvement of technical solution, the acquisition methods of the original photo include passing through different operation path tune It is obtained with different cameral acquisition, intelligent terminal by wireless receiving or wired importing, the different cameral includes operating system Camera, encryption camera.
It in the present embodiment, is the tool for encrypting photo in the present invention in a kind of photo encipher-decipher method with reference to Fig. 2, Fig. 2 Body embodiment step flow chart, before generating key, opening camera, which is taken pictures, obtains original photo, passes through the operation of intelligent terminal Photo captured by system camera is deposited into the picture library of intelligent terminal, and original photo needs just enter encryption photo by importing System needs first to create a temporal cache file before photo encryption, and original photo can first be directed into temporal cache file As caching photo, and encrypting camera is directly to be stored in captured photo in the file of temporal cache to shine as caching Piece.Furthermore it is also possible to obtain original photo, the original photo deposit behaviour by intelligent terminal wireless receiving or wired importing Make in the picture library of system, when needing to encrypt original photo, temporal cache file can be imported and encrypted.
As the further improvement of technical solution, a kind of photo encipher-decipher method is further comprised the steps of:
S3, verifying encryption and decryption authentication password is with managing encrypted photo, including browses, checks, deletes, imports, exports.
In the present embodiment, photo encryption system include encryption photo management function, into encryption the photo management page it Before, it needs to carry out authentication, the encryption photo management page, encryption can be shown by only inputting correct encryption and decryption authentication password Photo could can browse encryption photo, be checked, delete, leading after entering encryption photo management interface by interface display Original photo can also be imported photo and encrypt phychology by equal operation out, and importing process is exactly an encryption original photo in fact Process.
Photo generation, photo encryption and decryption, photo management are effectively integrated into photo encryption system by the present invention, are solved The safety problem of photo storage, carrying out encryption and decryption processing by encryption chip ensure that safety, reliability and plus the solution of photo Close validity simplifies user's operation, and the user experience is improved.
A kind of photo encrypting and deciphering system, comprising:
First module, for obtaining multiple cryptographic key factors generation keys and being stored in encryption chip;
Second module obtains encryption photo and/or according to described for being encrypted according to the key pair original photo Key pair encryption photo is decrypted to obtain original photo.
In the present embodiment, a kind of photo encrypting and deciphering system includes the first module, the second module, the first module is logical obtain it is multiple Cryptographic key factor generates key and is stored in encryption chip, and encryption chip prevents extraneous program and application access, guarantees close The safety of key;Second module carries out photo encryption and decryption according to the key.
A kind of photo encrypting and deciphering system is a kind of structural block diagram of photo encrypting and deciphering system in the present invention with reference to Fig. 5, Fig. 5, Including intelligent terminal, encryption chip and processor, the intelligent terminal is connect with processor, and the processor and encryption chip connect It connects, the processor is for executing:
Multiple cryptographic key factors are obtained to generate key and be stored in encryption chip;
Triggering encryption chip is encrypted to obtain encryption photo and/or according to described close according to the key pair original photo Key is decrypted to obtain original photo to encryption photo.
In the present embodiment, the processor of photo encryption system generates keys by obtaining multiple cryptographic key factors, and by its It is stored in encryption chip, the encryption chip is encrypted or decrypted according to key pair original photo or encryption photo. Key is obtained by a variety of cryptographic key factors, improves the security performance of photo encryption and decryption, encryption process carries out in encryption chip, Physically completely cut off unauthorized access, guarantees safety when operation;Encryption and decryption operation in encryption chip simultaneously provides terminal Source occupancy is less, improves the encryption and decryption efficiency of photo.
As the further improvement of technical solution, the encryption chip includes encryption/decryption module, chip memory, it is described plus Deciphering module is connect with chip memory.
In the present embodiment, encryption/decryption module according to the key pair original photo encrypted to obtain encryption photo and/ Or it is decrypted to obtain original photo according to the key pair encryption photo;Chip memory is responsible for storing key.External journey Sequence and application cannot arbitrarily access the chip memory of encryption chip, need to access using defined interface, encryption and decryption mould Block obtains key by the peculiar interface access chip memory of chip, is used for encryption and decryption, it is ensured that key and encryption process Safety.
As the further improvement of technical solution, the intelligent terminal includes terminal handler, camera, wireless telecommunications mould Block is wirelessly connected module, data-interface and terminal memory, the terminal handler respectively with camera, wireless communication module, It is wirelessly connected module, data-interface, terminal memory connection.
In the present embodiment, information processing centre and control centre of the terminal handler as intelligent terminal, the processing Device can be integrated with terminal handler;The camera is for shooting to obtain original photo;Wireless communication module is used for Wireless network communication, wireless communication module include 2G communication module, 3G communication module, 4G communication module, can be used for the behaviour such as online Make;It is wirelessly connected module and is used for wireless data connection, being wirelessly connected module includes bluetooth module, WiFi module, the channel radio News module, wireless connection module can be used for obtaining original photo.In addition, data-interface includes USB data interface, it can also be used to number According to transmission, in the present embodiment, can be used for transmitting original photo.
The terminal memory is for storing photo, and in actual use, storage photo is used in terminal memory One piece of storage region, this storage region can be used for storing operating system camera, encryption camera captured by original photo, encryption It is generated data cached when photo and encryption and decryption.
The present invention in an intelligent terminal integrate encryption chip, the key obtained by multiple cryptographic key factors, and using its with The mode of soft or hard combination carries out hardware encryption, hard decryption to the photo that different paths obtain, while can be right in photo encryption system The photo encrypted is managed.It solves the safety problem for the photo that intelligent terminal is stored, avoids photo by intelligent terminal Other application software illegally read, encryption camera and photo management function is integrated in photo encryption system, increases operation Safety and experience have the function of positive in terms of protecting privacy of user.
It is to be illustrated to preferable implementation of the invention, but the invention is not limited to the implementation above Example, those skilled in the art can also make various equivalent variations on the premise of without prejudice to spirit of the invention or replace It changes, these equivalent deformations or replacement are all included in the scope defined by the claims of the present application.

Claims (10)

1. a kind of photo encipher-decipher method, which comprises the following steps:
S1, multiple cryptographic key factors generation keys are obtained and are stored in encryption chip;
S2, encryption chip are encrypted to obtain encryption photo and/or according to the key pair according to the key pair original photo Encryption photo is decrypted to obtain original photo;
The step S2 the following steps are included:
S21, creation temporal cache file;
S22, original photo or encryption photo are put into temporal cache file as temporal cache photo;
S23, encryption chip according in the file of the key pair temporal cache original photo or encryption photo carry out firmly plus Close or hard decryption;
After S24, hardware encryption or hard successful decryption, temporal cache file is deleted.
2. a kind of photo encipher-decipher method according to claim 1, which is characterized in that the step S1 includes following step It is rapid:
S11, setting or verifying encryption and decryption authentication password are to obtain encryption and decryption authentication password as one of cryptographic key factor;
S12, obtain effective intelligent terminal fix information, effective encryption chip fix information respectively as cryptographic key factor it One;
S13, it is generated according to encryption and decryption authentication password, effective intelligent terminal fix information, effective encryption chip fix information Key;
S14, by the key storage in encryption chip.
3. according to claim 1 to a kind of 2 described in any item photo encipher-decipher methods, which is characterized in that the original photo Acquisition methods include call different cameral to obtain by different operation path, intelligent terminal by wireless receiving or wired is led Enter to obtain, the different cameral includes operating system camera, encryption camera.
4. a kind of photo encipher-decipher method according to claim 2, which is characterized in that the encryption and decryption authentication password includes Character, fingerprint, iris image.
5. a kind of photo encipher-decipher method according to claim 4, which is characterized in that the intelligent terminal fix information packet Intelligent terminal IMEI code, intelligent terminal No. SN number are included, the encryption chip fix information includes encryption chip SN.
6. a kind of photo encipher-decipher method according to claim 2,4 or 5, which is characterized in that further comprise the steps of:
S3, verifying encryption and decryption authentication password is with managing encrypted photo, including browses, checks, deletes, imports, exports.
7. a kind of photo encrypting and deciphering system characterized by comprising
First module, for obtaining multiple cryptographic key factors generation keys and being stored in encryption chip;
Second module obtains encryption photo and/or according to the key for being encrypted according to the key pair original photo Encryption photo is decrypted to obtain original photo;Specifically, temporal cache file is created;
Original photo or encryption photo are put into temporal cache file as temporal cache photo;
Encryption chip according in the file of the key pair temporal cache original photo or encryption photo carry out hardware encryption or Hard decryption;
After hardware encryption or hard successful decryption, temporal cache file is deleted.
8. a kind of photo encrypting and deciphering system, which is characterized in that including intelligent terminal, encryption chip and processor, the intelligence is eventually End is connect with processor, and the processor is connect with encryption chip, and the processor is for executing:
Multiple cryptographic key factors are obtained to generate key and be stored in encryption chip;
Triggering encryption chip is encrypted to obtain encryption photo and/or according to the key pair according to the key pair original photo Encryption photo is decrypted to obtain original photo;Specifically, temporal cache file is created;
Original photo or encryption photo are put into temporal cache file as temporal cache photo;
Encryption chip according in the file of the key pair temporal cache original photo or encryption photo carry out hardware encryption or Hard decryption;
After hardware encryption or hard successful decryption, temporal cache file is deleted.
9. a kind of photo encrypting and deciphering system according to claim 8, which is characterized in that the encryption chip includes encryption and decryption Module, chip memory, the encryption/decryption module are connect with chip memory.
10. a kind of photo encrypting and deciphering system according to claim 8, which is characterized in that the intelligent terminal includes terminal Processor, wireless communication module, is wirelessly connected module, data-interface and terminal memory, the terminal handler point at camera It is not connect with camera, wireless communication module, wireless connection module, data-interface, terminal memory.
CN201610546539.6A 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system Active CN106209381B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610546539.6A CN106209381B (en) 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610546539.6A CN106209381B (en) 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system

Publications (2)

Publication Number Publication Date
CN106209381A CN106209381A (en) 2016-12-07
CN106209381B true CN106209381B (en) 2019-04-26

Family

ID=57476435

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610546539.6A Active CN106209381B (en) 2016-07-12 2016-07-12 A kind of photo encipher-decipher method and its system

Country Status (1)

Country Link
CN (1) CN106209381B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145563B (en) * 2018-08-13 2022-04-22 创新先进技术有限公司 Identity verification method and device
CN111711515B (en) * 2020-05-18 2022-04-26 冠群信息技术(南京)有限公司 Three-party AES key synthesis method, encryption method and decryption method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419805A (en) * 2011-11-22 2012-04-18 中兴通讯股份有限公司 Terminal equipment and method for encrypting user information
CN103020504A (en) * 2012-12-03 2013-04-03 鹤山世达光电科技有限公司 Image management system and image management method based on fingerprint identification
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103559453A (en) * 2013-05-23 2014-02-05 深圳市中易通网络技术有限公司 Hardware encryption protection method and system for cellphone data
CN104683978A (en) * 2015-03-27 2015-06-03 襄阳泰凯电子有限公司 Mobile phone stored information encryption device and method
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105260669A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Transmission method and system of pictures
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419805A (en) * 2011-11-22 2012-04-18 中兴通讯股份有限公司 Terminal equipment and method for encrypting user information
CN103020504A (en) * 2012-12-03 2013-04-03 鹤山世达光电科技有限公司 Image management system and image management method based on fingerprint identification
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103559453A (en) * 2013-05-23 2014-02-05 深圳市中易通网络技术有限公司 Hardware encryption protection method and system for cellphone data
CN104683978A (en) * 2015-03-27 2015-06-03 襄阳泰凯电子有限公司 Mobile phone stored information encryption device and method
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105260669A (en) * 2015-10-28 2016-01-20 广东欧珀移动通信有限公司 Transmission method and system of pictures
CN105354501A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo processing method and processing system

Also Published As

Publication number Publication date
CN106209381A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
US8813243B2 (en) Reducing a size of a security-related data object stored on a token
CN103685282B (en) A kind of identity identifying method based on single-sign-on
US20190140844A1 (en) Identity-linked authentication through a user certificate system
US9935954B2 (en) System and method for securing machine-to-machine communications
US9544135B2 (en) Methods of and systems for facilitating decryption of encrypted electronic information
US11936776B2 (en) Secure key exchange electronic transactions
CN111191286A (en) HyperLegger Fabric block chain private data storage and access system and method thereof
US20220067189A1 (en) Data Sharing Via Distributed Ledgers
US9730060B2 (en) Method and system for transfering profiles of authentication module
JP2016513945A (en) Establishing reliability between applications on a computer
US11227041B2 (en) Identification service based authorization
CN107920081A (en) Login authentication method and device
US20210390533A1 (en) User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System
CN103559453A (en) Hardware encryption protection method and system for cellphone data
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN111566989B (en) Key processing method and device
CN103577769A (en) File content safety management method and management system
US10999073B2 (en) Secure network communication method
CN106209381B (en) A kind of photo encipher-decipher method and its system
KR100594886B1 (en) System and Method for Security of Database
CN110266641B (en) Information reading method, system, device and computer readable storage medium
US20090144553A1 (en) System and method of controlling access to a device
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
JP6763096B1 (en) system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210909

Address after: 518000 1310, Tianming science and technology building, No. 8, wushitou Road, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: Zhongyitong Technology Co.,Ltd.

Address before: 518000 tower 501, tower a, Jiada R & D building, No. 5, songpingshan Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN ZHONGYITONG SECURITY CORE TECHNOLOGY Co.,Ltd.