CN108111711A - The method and device that safety of image is shared - Google Patents
The method and device that safety of image is shared Download PDFInfo
- Publication number
- CN108111711A CN108111711A CN201711453108.6A CN201711453108A CN108111711A CN 108111711 A CN108111711 A CN 108111711A CN 201711453108 A CN201711453108 A CN 201711453108A CN 108111711 A CN108111711 A CN 108111711A
- Authority
- CN
- China
- Prior art keywords
- image
- shared
- target user
- user
- option
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Abstract
The present invention provides the method and device that a kind of safety of image is shared, this method includes:Receive the images share request that user sends;Based on images share request to generate whether the option to be selected of encrypted image;The targets option selected according to user will images share be shared to target user so that target user treats and shares image and checked.This method can choose whether encrypted image according to the demand of user; when treat share image and be encrypted when; the security during images share can be improved; be conducive to the protection of individual privacy; the technical issues of it is poor to alleviate existing images share method security, is unfavorable for individual privacy protection.
Description
Technical field
The present invention relates to the encrypted technical field of information, the method and device shared more particularly, to a kind of safety of image.
Background technology
Digital picture is one of current most popular multimedia form, is had in politics, economy, national defence, education etc.
Extensive use.There are higher security requirements for some special dimensions, such as military, business and medical treatment, digital picture.
The function of smart mobile phone is more and more complete, and many users like being taken pictures with smart mobile phone, and by the figure of shooting
As being shared with companion, for the image of some more privacies, during images share, there are the risk that image is stolen,
After image is stolen, picture material can expose the information of user, and unnecessary security risk can be brought to user.At present, also
Without one kind in images share, the technology of safety of image is improved.
To sum up, existing images share method security is poor, is unfavorable for the protection of individual privacy.
The content of the invention
In view of this, it is existing to alleviate it is an object of the invention to provide the method and device that a kind of safety of image is shared
Images share method security it is poor, the technical issues of being unfavorable for the protection of individual privacy.
In a first aspect, an embodiment of the present invention provides a kind of method that safety of image is shared, it is described applied to encryption plug-in unit
Encrypt plug-in unit setting on the terminal device, the described method includes:
The images share request that user sends is received, wherein, described image, which is shared to carry in request, to be needed to be shared image
The information of information and images share mode;
Shared based on described image request to generate whether the option to be selected of encrypted image;
The targets option selected according to the user is by the images share to be shared to target user, so that the target
User checks the image to be shared, wherein, the targets option is any one of described option to be selected.
With reference to first aspect, an embodiment of the present invention provides the first possible embodiment of first aspect, wherein, when
The targets option for not encrypted image when, according to the targets option that the user selects by the images share to be shared to mesh
Mark user includes:
The image to be shared is shared mode according to described image to share to the target user, so that the target is used
The image to be shared is checked at family.
With reference to first aspect, an embodiment of the present invention provides second of possible embodiment of first aspect, wherein, when
When the targets option is encrypted image, the targets option selected according to the user is by the images share to be shared to target
User includes:
The image to be shared is encrypted using Encryption Algorithm, obtains encryption file and the encryption file pair
The key answered;
The encryption file is shared mode according to described image to share to the target user, wherein, the target is used
Family is decrypted the encryption file after the encryption file is received, by the key, described waits to share to check
Image.
With reference to first aspect, an embodiment of the present invention provides the third possible embodiment of first aspect, wherein, institute
Encryption Algorithm is stated as AES encryption algorithm.
With reference to first aspect, an embodiment of the present invention provides the 4th kind of possible embodiment of first aspect, wherein, institute
Stating AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process is ciphering process
Inverse operation.
Second aspect, the embodiment of the present invention additionally provide the device that a kind of safety of image is shared, and described device is arranged on end
In end equipment, described device includes:
Receiving module, for receiving the images share request of user's transmission, wherein, described image is shared to be carried in request
The information of image to be shared and the information of images share mode;
Generation module, for shared based on described image request to generate whether the option to be selected of encrypted image;
Sharing module, for being used the images share to be shared to target according to the targets option that the user selects
Family, so that the target user checks the image to be shared, wherein, the targets option is the option to be selected
Any one of.
With reference to second aspect, an embodiment of the present invention provides the first possible embodiment of second aspect, wherein, institute
Stating sharing module includes:
First shares unit, for when the targets option be not encrypted image when, by the image to be shared according to institute
It states images share mode to share to the target user, so that the target user checks the image to be shared.
With reference to second aspect, an embodiment of the present invention provides second of possible embodiment of second aspect, wherein, institute
Sharing module is stated to further include:
Cryptographic processing unit, for when the targets option is encrypted image, waiting to share to described using Encryption Algorithm
Image is encrypted, and obtains encryption file and the corresponding key of the encryption file;
Second shares unit is shared for the encryption file to be shared mode according to described image to target use
Family, wherein, the target user solves the encryption file after the encryption file is received, by the key
It is close, to check the image to be shared.
With reference to second aspect, an embodiment of the present invention provides the third possible embodiment of second aspect, wherein, institute
Encryption Algorithm is stated as AES encryption algorithm.
With reference to second aspect, an embodiment of the present invention provides the 4th kind of possible embodiment of second aspect, wherein, institute
Stating AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process is ciphering process
Inverse operation.
The embodiment of the present invention brings following advantageous effect:An embodiment of the present invention provides the sides that a kind of safety of image is shared
Method and device, this method include:The images share request that user sends is received, wherein, it carries and needs point in images share request
Enjoy the information of image and the information of images share mode;Based on images share request to generate whether encrypted image treat selection choosing
;According to user select targets option will images share be shared to target user so that target user, which treats, shares image
It is checked, wherein, targets option is any one of option to be selected.
The existing method for sharing image is usually to other side directly by image by transmission of network, and there are images for which
The risk being stolen, the security of image are poor.Compared with existing images share method, an embodiment of the present invention provides a kind of figures
Method as sharing safely, this method first receive the images share request of user's transmission, then, are requested to generate according to images share
Whether the option to be selected of encrypted image, finally, according to user select targets option by images share to be shared to target use
Family.This method can choose whether encrypted image according to the demand of user, when treat share image and be encrypted when, can improve
Security during images share, is conducive to the protection of individual privacy, alleviates existing images share method security
Difference is unfavorable for the technical issues of individual privacy is protected.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It obtains it is clear that being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims
And specifically noted structure is realized and obtained in attached drawing.
For the above objects, features and advantages of the present invention is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution of the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in describing below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is the method flow diagram that a kind of safety of image provided in an embodiment of the present invention is shared;
Fig. 2 is targets option provided in an embodiment of the present invention when targets option is encrypted image, being selected according to user
By the flow chart of images share to be shared to target user;
Fig. 3 is the schematic diagram provided in an embodiment of the present invention that image is encrypted and decrypted;
Fig. 4 is the structure diagram for the device that a kind of safety of image provided in an embodiment of the present invention is shared.
Icon:
11- receiving modules;12- generation modules;13- sharing modules.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiment be part of the embodiment of the present invention rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Lower all other embodiments obtained, belong to the scope of protection of the invention.
For ease of understanding the present embodiment, a kind of safety of image disclosed in the embodiment of the present invention is shared first
Method describes in detail.
Embodiment one:
A kind of method that safety of image is shared, applied to encryption plug-in unit, encryption plug-in unit is set on the terminal device, reference chart
1, this method includes:
S102, the images share request that user sends is received, wherein, it is carried in images share request and needs to be shared image
The information of information and images share mode;
In embodiments of the present invention, which is the plug-in unit based on android system, and the plug-in unit is in picture library application
Image is encrypted.
Specifically, it is triggered when user is carrying out images share.It is carried in images share request and needs to be shared image
The information of information and images share mode, wherein, images share mode includes:The mode of Information Sharing, the mode that wechat is shared,
Mode that QQ shares etc., the embodiment of the present invention is not particularly limited it.
S104, based on images share request to generate whether the option to be selected of encrypted image;
User click on share after, based on images share request to generate whether the option to be selected of encrypted image.User can
It is user-friendly to select encrypted image or not encrypted image according to the demand of oneself, when selecting encrypted image, add
Close plug-in unit, which can be treated, to be shared image and is encrypted, and is avoided image to be shared and is stolen in transmission process and causes individual subscriber
Privacy is divulged a secret.
S106, according to user select targets option will images share be shared to target user so that target user couple
Image to be shared checked, wherein, targets option is any one of option to be selected.
Specifically, option to be selected includes:The option of encrypted image and not encrypted image, the target selected according to user are selected
Will images share be shared to target user.Detailed process will hereinafter be described, and details are not described herein.
The existing method for sharing image is usually to other side directly by image by transmission of network, and there are images for which
The risk being stolen, the security of image are poor.Compared with existing images share method, an embodiment of the present invention provides a kind of figures
Method as sharing safely, this method first receive the images share request of user's transmission, then, are requested to generate according to images share
Whether the option to be selected of encrypted image, finally, according to user select targets option by images share to be shared to target use
Family.This method can choose whether encrypted image according to the demand of user, when treat share image and be encrypted when, can improve
Security during images share, is conducive to the protection of individual privacy, alleviates existing images share method security
Difference is unfavorable for the technical issues of individual privacy is protected.
The above has carried out brief introduction to the method that safety of image is shared, in the method shared below to safety of image
The particular content being related to describes in detail.
Optionally, when targets option is not encrypted image, the targets option selected according to user will image be shared point
Enjoying to target user includes:
Image to be shared is shared according to images share mode to target user so that target user treat share image into
Row is checked.
Specifically, when targets option is not encrypted image, directly image to be shared is shared according to images share mode
To target user, this kind of mode does not encrypt the mode for sharing image for traditional, and target user is being received after image is shared,
It can directly treat and share image and checked.
Optionally, with reference to figure 2, when targets option is encrypted image, will wait to share according to the targets option that user selects
Images share includes to target user:
S201, treated using Encryption Algorithm and share image and be encrypted, obtained encryption file and encryption file is corresponding
Key;
Specifically, when the targets option that user selects for encrypted image when, encryption plug-in unit is treated using Encryption Algorithm and shared
Image is encrypted, and obtains encryption file key corresponding with file is encrypted.
S202, encryption file is shared according to images share mode to target user, wherein, target user receiving plus
It after ciphertext part, is decrypted by key pair encryption file, to check image to be shared.
After encryption file is obtained, encryption file is shared according to images share mode to target user, at this point, target is used
Family can not be directly viewable encryption file, it is necessary to be decrypted using key pair encryption file, decrypt after encryption file is received
After finishing, obtain in plain text, and then, target user can check image to be shared.
Specifically, the mode that target user obtains secret key can be user informs mesh by modes such as phone, instant messages
User is marked, user informs that the mode of target user's key should be different from images share mode, to ensure the peace of data transmission
Quan Xing.
The process is described with popular language below:
First, user, which wants the picture to be shared with other users, checks and is not desired to picture in transmission process and be stolen, with
Family is clicked on and can pop up prompting when sharing user is allowed to be confirmed whether file being encrypted, if user be not required to encryption can directly by
Picture is shared away according to normal flow, if user needs to encrypt, file can be encrypted by algorithm, while from
Dynamic generation key, so-called key is exactly to be prompted to user in the form of letter, number or additional character, at this point, picture file
Become encryption file.
Secondly, by encryption sharing files to other users, other users can not be checked normally after receiving this document, be used
Family also needs key being individually sent to recipient.
Finally, recipient, which clicks on encryption file, can prompt input key, can normally be checked after the key received is inputted
Picture file.
Such as:User A sends the picture to user B, and A selection pictures are shared by short message, can prompt to use when click is shared
Whether family, which needs, is encrypted, and user's selection is to generate key, and then picture becomes ciphertext, then is connect by short message sending to B, B
After being subject to picture, checking can prompt to need to decrypt during file, and the key that A is given inputs, then can be converted in plain text, then B
It can normally check picture.
Optionally, Encryption Algorithm is AES encryption algorithm.
Optionally, AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process
For the inverse operation of ciphering process.
In embodiments of the present invention, the Encryption Algorithm used is AES encryption algorithm.Ciphering process is InvAddRoundKey behaviour
Make, be exactly by bit exclusive or by round key with (state) in plain text.Round key is obtained by cipher key spreading, just know key with initially it is bright
Wen Jun is that user oneself is set.In simple terms, key add operation is exactly byte-by-byte addition, i.e. exclusive or.
Cipher key spreading is that initial key values are iterated computing according to a kind of algorithm, is obtained required close during often wheel encryption
Key.
AES encryption algorithm is based on arrangement and in-place computation.AES encryption process is related to 4 kinds of operations:Byte replaces
(SubBytes), row displacement (ShiftRows), row obscure (MixColumns) and InvAddRoundKey (AddRoundKey), AES solutions
Close process is the inverse operation of ciphering process, such as Fig. 3.
The inverse operation of each step difference respective operations of decrypting process.
The order of all operations of encryption and decryption is exactly opposite.Formally due to this two promise, decryption can be correctly extensive
Recover lost eyesight text.The key often taken turns in encryption and decryption is obtained respectively by cipher key spreading of meeting accident.The plaintext of 16 bytes, ciphertext and wheel are close in algorithm
Key is all represented with the matrix of one 4 × 4.
AES is an iteration, the password of symmetric key grouping, it can use 128,192 and 256 keys, and
With 128 (16 byte) block encryptions and ciphertext data.With public key cryptography using key to difference, symmetric key cipher makes
With identical secret key cipher and ciphertext data.Digit by the encryption data of block cipher return is identical with input data.Repeatedly
Generation encryption repeats to replace and replace input data in the cycle using a loop structure.
The method that safety of image provided in an embodiment of the present invention is shared has the following advantages:
1st, the considerations of when user shares picture for secure context, can selectively be added the picture of desired secrecy
It is close, other users are then shared with, after picture is sent to other users, other side is also required to key and carrys out the browsable figure of decryption side
Piece, makes the other users of no key can not check picture, so as to achieve the purpose that maintain secrecy to picture, effectively improves and shares figure
Security during piece;
2nd, individual privacy can more easily be protected, it is ensured that file data is not stolen in transmission process, even if stolen
Other side is taken not have key that can not also check original;In addition, recipient needs secret key decryption that can just inquire about after receiving file, may be used also
It is arbitrarily checked to avoid other people;
3rd, in transmission process, if attacker intercepted and captured send information, it is seen that simply ciphertext, do not take decryption hand
Section can not obtain clear content;Recipient similarly has no idea to obtain after the ciphertext that sender sends is had received
In plain text, key must be sent to recipient by sender by special approach, safer.
Embodiment two:
The device that a kind of safety of image is shared, the device are set on the terminal device, and with reference to figure 4, which includes:
Receiving module 11, for receiving the images share request of user's transmission, wherein, it carries and needs in images share request
Share the information of image and the information of images share mode;
Generation module 12, for based on images share request to generate whether the option to be selected of encrypted image;
Sharing module 13, for the targets option that is selected according to user will images share be shared to target user so that
Target user, which treats, to share image and is checked, wherein, targets option is any one of option to be selected.
An embodiment of the present invention provides the device that a kind of safety of image is shared, which first receives the image point of user's transmission
Enjoy request, then, according to images share request to generate whether the option to be selected of encrypted image, finally, according to user select
Targets option will images share be shared to target user.The device can choose whether encrypted image according to the demand of user,
When treat share image and be encrypted when, the security during images share can be improved, be conducive to the guarantor of individual privacy
Shield, it is poor to alleviate existing images share equipment safety, the technical issues of being unfavorable for individual privacy protection.
Optionally, sharing module includes:
First shares unit, for when targets option be not encrypted image when, by image to be shared according to images share side
Formula is shared to target user, so that target user treats and shares image and checked.
Optionally, sharing module further includes:
Cryptographic processing unit, for when targets option is encrypted image, being treated using Encryption Algorithm and sharing image progress
Encryption obtains encryption file key corresponding with file is encrypted;
Second shares unit is shared according to images share mode to target user for that will encrypt file, wherein, target is used
Family is decrypted, to check image to be shared after encryption file is received by key pair encryption file.
Optionally, Encryption Algorithm is AES encryption algorithm.
Optionally, AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process
For the inverse operation of ciphering process.
Particular content in the embodiment two may be referred to the description in above-described embodiment one, and details are not described herein.
The computer program product for the method and device that the safety of image that the embodiment of the present invention is provided is shared, including storage
The computer readable storage medium of program code, the instruction that said program code includes can be used for performing previous methods embodiments
Described in method, specific implementation can be found in embodiment of the method, details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, details are not described herein.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected or be integrally connected;It can
To be mechanical connection or be electrically connected;It can be directly connected, can also be indirectly connected by intermediary, Ke Yishi
Connection inside two elements.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this
Concrete meaning in invention.
If the function is realized in the form of SFU software functional unit and is independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be
People's computer, server or network equipment etc.) perform all or part of the steps of the method according to each embodiment of the present invention.
And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
In the description of the present invention, it is necessary to explanation, term " " center ", " on ", " under ", "left", "right", " vertical ",
The orientation or position relationship of the instructions such as " level ", " interior ", " outer " be based on orientation shown in the drawings or position relationship, merely to
Convenient for the description present invention and simplify description rather than instruction or imply signified device or element must have specific orientation,
With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ",
" the 3rd " is only used for description purpose, and it is not intended that instruction or hint relative importance.
Finally it should be noted that:Embodiment described above is only the specific embodiment of the present invention, to illustrate the present invention
Technical solution, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, it will be understood by those of ordinary skill in the art that:Any one skilled in the art
In the technical scope disclosed by the present invention, can still modify to the technical solution recorded in previous embodiment or can be light
It is readily conceivable that variation or equivalent substitution is carried out to which part technical characteristic;And these modifications, variation or replacement, do not make
The essence of appropriate technical solution departs from the spirit and scope of technical solution of the embodiment of the present invention, should all cover the protection in the present invention
Within the scope of.Therefore, protection scope of the present invention described should be subject to the protection scope in claims.
Claims (10)
1. a kind of method that safety of image is shared, which is characterized in that applied to encryption plug-in unit, the encryption plug-in unit is arranged on terminal
In equipment, the described method includes:
The images share request that user sends is received, wherein, described image, which is shared to carry in request, needs the information for being shared image
With the information of images share mode;
Shared based on described image request to generate whether the option to be selected of encrypted image;
The targets option selected according to the user is by the images share to be shared to target user, so that the target user
The image to be shared is checked, wherein, the targets option is any one of described option to be selected.
2. according to the method described in claim 1, it is characterized in that, when the targets option be not encrypted image when, according to institute
Stating the targets option of user's selection includes the images share to be shared to target user:
The image to be shared is shared mode according to described image to share to the target user, so that the target user couple
The image to be shared is checked.
3. according to the method described in claim 1, it is characterized in that, when the targets option be encrypted image when, according to described
The targets option of user's selection includes the images share to be shared to target user:
The image to be shared is encrypted using Encryption Algorithm, encryption file is obtained and the encryption file is corresponding
Key;
The encryption file is shared mode according to described image to share to the target user, wherein, the target user exists
After receiving the encryption file, the encryption file is decrypted by the key, to check the image to be shared.
4. according to the method described in claim 3, it is characterized in that, the Encryption Algorithm is AES encryption algorithm.
5. according to the method described in claim 4, it is characterized in that, the AES encryption algorithm includes:Byte replaces, and line position is moved,
Row obscure and InvAddRoundKey, wherein, decrypting process is the inverse operation of ciphering process.
6. the device that a kind of safety of image is shared, which is characterized in that described device is set on the terminal device, described device bag
It includes:
Receiving module, for receiving the images share request of user's transmission, wherein, described image, which is shared to carry in request, to be needed point
Enjoy the information of image and the information of images share mode;
Generation module, for shared based on described image request to generate whether the option to be selected of encrypted image;
Sharing module, for according to the targets option that the user selects by the images share to be shared to target user, with
The target user is made to check the image to be shared, wherein, the targets option is in the option to be selected
It is any.
7. device according to claim 6, which is characterized in that the sharing module includes:
First shares unit, for when the targets option be not encrypted image when, by the image to be shared according to the figure
Share as sharing mode to the target user, so that the target user checks the image to be shared.
8. device according to claim 6, which is characterized in that the sharing module further includes:
Cryptographic processing unit, for when the targets option be encrypted image when, using Encryption Algorithm to the image to be shared
It is encrypted, obtains encryption file and the corresponding key of the encryption file;
Second shares unit is shared for the encryption file to be shared mode according to described image to the target user,
In, the target user is decrypted the encryption file after the encryption file is received, by the key, to look into
See the image to be shared.
9. device according to claim 8, which is characterized in that the Encryption Algorithm is AES encryption algorithm.
10. device according to claim 9, which is characterized in that the AES encryption algorithm includes:Byte replaces, line position
It moving, row obscure and InvAddRoundKey, wherein, decrypting process is the inverse operation of ciphering process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711453108.6A CN108111711A (en) | 2017-12-27 | 2017-12-27 | The method and device that safety of image is shared |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711453108.6A CN108111711A (en) | 2017-12-27 | 2017-12-27 | The method and device that safety of image is shared |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108111711A true CN108111711A (en) | 2018-06-01 |
Family
ID=62213791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711453108.6A Pending CN108111711A (en) | 2017-12-27 | 2017-12-27 | The method and device that safety of image is shared |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111711A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942001A (en) * | 2014-05-12 | 2014-07-23 | 上海卓悠网络科技有限公司 | Free screen capture method of mobile terminal and mobile terminal |
CN104657668A (en) * | 2015-02-06 | 2015-05-27 | 深圳市金立通信设备有限公司 | Terminal |
CN104731512A (en) * | 2015-03-31 | 2015-06-24 | 努比亚技术有限公司 | Method, device and terminal for sharing pictures |
CN106027530A (en) * | 2016-05-25 | 2016-10-12 | 天津光电安辰信息技术有限公司 | Instant message encryption system based on smartphone and implementation method thereof |
CN106055996A (en) * | 2016-05-18 | 2016-10-26 | 维沃移动通信有限公司 | Method and mobile terminal for multimedia information sharing |
CN106156254A (en) * | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Information sharing method and device |
CN106453056A (en) * | 2016-10-28 | 2017-02-22 | 努比亚技术有限公司 | Mobile terminal and method for safely sharing picture |
-
2017
- 2017-12-27 CN CN201711453108.6A patent/CN108111711A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103942001A (en) * | 2014-05-12 | 2014-07-23 | 上海卓悠网络科技有限公司 | Free screen capture method of mobile terminal and mobile terminal |
CN104657668A (en) * | 2015-02-06 | 2015-05-27 | 深圳市金立通信设备有限公司 | Terminal |
CN104731512A (en) * | 2015-03-31 | 2015-06-24 | 努比亚技术有限公司 | Method, device and terminal for sharing pictures |
CN106156254A (en) * | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Information sharing method and device |
CN106055996A (en) * | 2016-05-18 | 2016-10-26 | 维沃移动通信有限公司 | Method and mobile terminal for multimedia information sharing |
CN106027530A (en) * | 2016-05-25 | 2016-10-12 | 天津光电安辰信息技术有限公司 | Instant message encryption system based on smartphone and implementation method thereof |
CN106453056A (en) * | 2016-10-28 | 2017-02-22 | 努比亚技术有限公司 | Mobile terminal and method for safely sharing picture |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105553951B (en) | Data transmission method and device | |
CN102196425B (en) | Quantum-key-distribution-network-based mobile encryption system and communication method thereof | |
CN111431713B (en) | Private key storage method and device and related equipment | |
US20210357914A1 (en) | Constructing a Distributed Ledger Transaction on a Cold Hardware Wallet | |
WO2016173724A1 (en) | Encryption system, encryption key wallet and method | |
CN104834868A (en) | Electronic data protection method, device and terminal equipment | |
CN105307165A (en) | Communication method based on mobile application, server and client | |
CN106452770A (en) | Data encryption method and apparatus, data decryption method and apparatus, and system | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CA3178180A1 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN109525388B (en) | Combined encryption method and system with separated keys | |
CN106375990A (en) | Encryption and decryption system and encryption and decryption method for private data of mobile phone | |
KR101348249B1 (en) | OTP authentification method and system using of QR-code | |
CN105447404B (en) | The method and system of image secret protection in a kind of cloud storage | |
CN115242514B (en) | Privacy set intersection method and system based on state secret, electronic equipment and storage medium | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
JP2016046799A (en) | Agent for providing security cloud service, security key device for security cloud service | |
CN104994498B (en) | The method and system that a kind of terminal applies are interacted with mobile phone card application | |
CN107493281A (en) | encryption communication method and device | |
CN108933758A (en) | Cloud storage encipher-decipher method, device and system can be shared | |
US20200045026A1 (en) | Centralized Data Management and SaaS with End-to-End Encryption | |
CN107689867B (en) | Key protection method and system under open environment | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
CN104243291A (en) | Instant messaging method and system thereof capable of guaranteeing safety of user communication content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180601 |
|
RJ01 | Rejection of invention patent application after publication |