CN108111711A - The method and device that safety of image is shared - Google Patents

The method and device that safety of image is shared Download PDF

Info

Publication number
CN108111711A
CN108111711A CN201711453108.6A CN201711453108A CN108111711A CN 108111711 A CN108111711 A CN 108111711A CN 201711453108 A CN201711453108 A CN 201711453108A CN 108111711 A CN108111711 A CN 108111711A
Authority
CN
China
Prior art keywords
image
shared
target user
user
option
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711453108.6A
Other languages
Chinese (zh)
Inventor
郑文芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CN201711453108.6A priority Critical patent/CN108111711A/en
Publication of CN108111711A publication Critical patent/CN108111711A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Abstract

The present invention provides the method and device that a kind of safety of image is shared, this method includes:Receive the images share request that user sends;Based on images share request to generate whether the option to be selected of encrypted image;The targets option selected according to user will images share be shared to target user so that target user treats and shares image and checked.This method can choose whether encrypted image according to the demand of user; when treat share image and be encrypted when; the security during images share can be improved; be conducive to the protection of individual privacy; the technical issues of it is poor to alleviate existing images share method security, is unfavorable for individual privacy protection.

Description

The method and device that safety of image is shared
Technical field
The present invention relates to the encrypted technical field of information, the method and device shared more particularly, to a kind of safety of image.
Background technology
Digital picture is one of current most popular multimedia form, is had in politics, economy, national defence, education etc. Extensive use.There are higher security requirements for some special dimensions, such as military, business and medical treatment, digital picture.
The function of smart mobile phone is more and more complete, and many users like being taken pictures with smart mobile phone, and by the figure of shooting As being shared with companion, for the image of some more privacies, during images share, there are the risk that image is stolen, After image is stolen, picture material can expose the information of user, and unnecessary security risk can be brought to user.At present, also Without one kind in images share, the technology of safety of image is improved.
To sum up, existing images share method security is poor, is unfavorable for the protection of individual privacy.
The content of the invention
In view of this, it is existing to alleviate it is an object of the invention to provide the method and device that a kind of safety of image is shared Images share method security it is poor, the technical issues of being unfavorable for the protection of individual privacy.
In a first aspect, an embodiment of the present invention provides a kind of method that safety of image is shared, it is described applied to encryption plug-in unit Encrypt plug-in unit setting on the terminal device, the described method includes:
The images share request that user sends is received, wherein, described image, which is shared to carry in request, to be needed to be shared image The information of information and images share mode;
Shared based on described image request to generate whether the option to be selected of encrypted image;
The targets option selected according to the user is by the images share to be shared to target user, so that the target User checks the image to be shared, wherein, the targets option is any one of described option to be selected.
With reference to first aspect, an embodiment of the present invention provides the first possible embodiment of first aspect, wherein, when The targets option for not encrypted image when, according to the targets option that the user selects by the images share to be shared to mesh Mark user includes:
The image to be shared is shared mode according to described image to share to the target user, so that the target is used The image to be shared is checked at family.
With reference to first aspect, an embodiment of the present invention provides second of possible embodiment of first aspect, wherein, when When the targets option is encrypted image, the targets option selected according to the user is by the images share to be shared to target User includes:
The image to be shared is encrypted using Encryption Algorithm, obtains encryption file and the encryption file pair The key answered;
The encryption file is shared mode according to described image to share to the target user, wherein, the target is used Family is decrypted the encryption file after the encryption file is received, by the key, described waits to share to check Image.
With reference to first aspect, an embodiment of the present invention provides the third possible embodiment of first aspect, wherein, institute Encryption Algorithm is stated as AES encryption algorithm.
With reference to first aspect, an embodiment of the present invention provides the 4th kind of possible embodiment of first aspect, wherein, institute Stating AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process is ciphering process Inverse operation.
Second aspect, the embodiment of the present invention additionally provide the device that a kind of safety of image is shared, and described device is arranged on end In end equipment, described device includes:
Receiving module, for receiving the images share request of user's transmission, wherein, described image is shared to be carried in request The information of image to be shared and the information of images share mode;
Generation module, for shared based on described image request to generate whether the option to be selected of encrypted image;
Sharing module, for being used the images share to be shared to target according to the targets option that the user selects Family, so that the target user checks the image to be shared, wherein, the targets option is the option to be selected Any one of.
With reference to second aspect, an embodiment of the present invention provides the first possible embodiment of second aspect, wherein, institute Stating sharing module includes:
First shares unit, for when the targets option be not encrypted image when, by the image to be shared according to institute It states images share mode to share to the target user, so that the target user checks the image to be shared.
With reference to second aspect, an embodiment of the present invention provides second of possible embodiment of second aspect, wherein, institute Sharing module is stated to further include:
Cryptographic processing unit, for when the targets option is encrypted image, waiting to share to described using Encryption Algorithm Image is encrypted, and obtains encryption file and the corresponding key of the encryption file;
Second shares unit is shared for the encryption file to be shared mode according to described image to target use Family, wherein, the target user solves the encryption file after the encryption file is received, by the key It is close, to check the image to be shared.
With reference to second aspect, an embodiment of the present invention provides the third possible embodiment of second aspect, wherein, institute Encryption Algorithm is stated as AES encryption algorithm.
With reference to second aspect, an embodiment of the present invention provides the 4th kind of possible embodiment of second aspect, wherein, institute Stating AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process is ciphering process Inverse operation.
The embodiment of the present invention brings following advantageous effect:An embodiment of the present invention provides the sides that a kind of safety of image is shared Method and device, this method include:The images share request that user sends is received, wherein, it carries and needs point in images share request Enjoy the information of image and the information of images share mode;Based on images share request to generate whether encrypted image treat selection choosing ;According to user select targets option will images share be shared to target user so that target user, which treats, shares image It is checked, wherein, targets option is any one of option to be selected.
The existing method for sharing image is usually to other side directly by image by transmission of network, and there are images for which The risk being stolen, the security of image are poor.Compared with existing images share method, an embodiment of the present invention provides a kind of figures Method as sharing safely, this method first receive the images share request of user's transmission, then, are requested to generate according to images share Whether the option to be selected of encrypted image, finally, according to user select targets option by images share to be shared to target use Family.This method can choose whether encrypted image according to the demand of user, when treat share image and be encrypted when, can improve Security during images share, is conducive to the protection of individual privacy, alleviates existing images share method security Difference is unfavorable for the technical issues of individual privacy is protected.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that being understood by implementing the present invention.The purpose of the present invention and other advantages are in specification, claims And specifically noted structure is realized and obtained in attached drawing.
For the above objects, features and advantages of the present invention is enable to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution of the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in describing below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is the method flow diagram that a kind of safety of image provided in an embodiment of the present invention is shared;
Fig. 2 is targets option provided in an embodiment of the present invention when targets option is encrypted image, being selected according to user By the flow chart of images share to be shared to target user;
Fig. 3 is the schematic diagram provided in an embodiment of the present invention that image is encrypted and decrypted;
Fig. 4 is the structure diagram for the device that a kind of safety of image provided in an embodiment of the present invention is shared.
Icon:
11- receiving modules;12- generation modules;13- sharing modules.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiment be part of the embodiment of the present invention rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Lower all other embodiments obtained, belong to the scope of protection of the invention.
For ease of understanding the present embodiment, a kind of safety of image disclosed in the embodiment of the present invention is shared first Method describes in detail.
Embodiment one:
A kind of method that safety of image is shared, applied to encryption plug-in unit, encryption plug-in unit is set on the terminal device, reference chart 1, this method includes:
S102, the images share request that user sends is received, wherein, it is carried in images share request and needs to be shared image The information of information and images share mode;
In embodiments of the present invention, which is the plug-in unit based on android system, and the plug-in unit is in picture library application Image is encrypted.
Specifically, it is triggered when user is carrying out images share.It is carried in images share request and needs to be shared image The information of information and images share mode, wherein, images share mode includes:The mode of Information Sharing, the mode that wechat is shared, Mode that QQ shares etc., the embodiment of the present invention is not particularly limited it.
S104, based on images share request to generate whether the option to be selected of encrypted image;
User click on share after, based on images share request to generate whether the option to be selected of encrypted image.User can It is user-friendly to select encrypted image or not encrypted image according to the demand of oneself, when selecting encrypted image, add Close plug-in unit, which can be treated, to be shared image and is encrypted, and is avoided image to be shared and is stolen in transmission process and causes individual subscriber Privacy is divulged a secret.
S106, according to user select targets option will images share be shared to target user so that target user couple Image to be shared checked, wherein, targets option is any one of option to be selected.
Specifically, option to be selected includes:The option of encrypted image and not encrypted image, the target selected according to user are selected Will images share be shared to target user.Detailed process will hereinafter be described, and details are not described herein.
The existing method for sharing image is usually to other side directly by image by transmission of network, and there are images for which The risk being stolen, the security of image are poor.Compared with existing images share method, an embodiment of the present invention provides a kind of figures Method as sharing safely, this method first receive the images share request of user's transmission, then, are requested to generate according to images share Whether the option to be selected of encrypted image, finally, according to user select targets option by images share to be shared to target use Family.This method can choose whether encrypted image according to the demand of user, when treat share image and be encrypted when, can improve Security during images share, is conducive to the protection of individual privacy, alleviates existing images share method security Difference is unfavorable for the technical issues of individual privacy is protected.
The above has carried out brief introduction to the method that safety of image is shared, in the method shared below to safety of image The particular content being related to describes in detail.
Optionally, when targets option is not encrypted image, the targets option selected according to user will image be shared point Enjoying to target user includes:
Image to be shared is shared according to images share mode to target user so that target user treat share image into Row is checked.
Specifically, when targets option is not encrypted image, directly image to be shared is shared according to images share mode To target user, this kind of mode does not encrypt the mode for sharing image for traditional, and target user is being received after image is shared, It can directly treat and share image and checked.
Optionally, with reference to figure 2, when targets option is encrypted image, will wait to share according to the targets option that user selects Images share includes to target user:
S201, treated using Encryption Algorithm and share image and be encrypted, obtained encryption file and encryption file is corresponding Key;
Specifically, when the targets option that user selects for encrypted image when, encryption plug-in unit is treated using Encryption Algorithm and shared Image is encrypted, and obtains encryption file key corresponding with file is encrypted.
S202, encryption file is shared according to images share mode to target user, wherein, target user receiving plus It after ciphertext part, is decrypted by key pair encryption file, to check image to be shared.
After encryption file is obtained, encryption file is shared according to images share mode to target user, at this point, target is used Family can not be directly viewable encryption file, it is necessary to be decrypted using key pair encryption file, decrypt after encryption file is received After finishing, obtain in plain text, and then, target user can check image to be shared.
Specifically, the mode that target user obtains secret key can be user informs mesh by modes such as phone, instant messages User is marked, user informs that the mode of target user's key should be different from images share mode, to ensure the peace of data transmission Quan Xing.
The process is described with popular language below:
First, user, which wants the picture to be shared with other users, checks and is not desired to picture in transmission process and be stolen, with Family is clicked on and can pop up prompting when sharing user is allowed to be confirmed whether file being encrypted, if user be not required to encryption can directly by Picture is shared away according to normal flow, if user needs to encrypt, file can be encrypted by algorithm, while from Dynamic generation key, so-called key is exactly to be prompted to user in the form of letter, number or additional character, at this point, picture file Become encryption file.
Secondly, by encryption sharing files to other users, other users can not be checked normally after receiving this document, be used Family also needs key being individually sent to recipient.
Finally, recipient, which clicks on encryption file, can prompt input key, can normally be checked after the key received is inputted Picture file.
Such as:User A sends the picture to user B, and A selection pictures are shared by short message, can prompt to use when click is shared Whether family, which needs, is encrypted, and user's selection is to generate key, and then picture becomes ciphertext, then is connect by short message sending to B, B After being subject to picture, checking can prompt to need to decrypt during file, and the key that A is given inputs, then can be converted in plain text, then B It can normally check picture.
Optionally, Encryption Algorithm is AES encryption algorithm.
Optionally, AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process For the inverse operation of ciphering process.
In embodiments of the present invention, the Encryption Algorithm used is AES encryption algorithm.Ciphering process is InvAddRoundKey behaviour Make, be exactly by bit exclusive or by round key with (state) in plain text.Round key is obtained by cipher key spreading, just know key with initially it is bright Wen Jun is that user oneself is set.In simple terms, key add operation is exactly byte-by-byte addition, i.e. exclusive or.
Cipher key spreading is that initial key values are iterated computing according to a kind of algorithm, is obtained required close during often wheel encryption Key.
AES encryption algorithm is based on arrangement and in-place computation.AES encryption process is related to 4 kinds of operations:Byte replaces (SubBytes), row displacement (ShiftRows), row obscure (MixColumns) and InvAddRoundKey (AddRoundKey), AES solutions Close process is the inverse operation of ciphering process, such as Fig. 3.
The inverse operation of each step difference respective operations of decrypting process.
The order of all operations of encryption and decryption is exactly opposite.Formally due to this two promise, decryption can be correctly extensive Recover lost eyesight text.The key often taken turns in encryption and decryption is obtained respectively by cipher key spreading of meeting accident.The plaintext of 16 bytes, ciphertext and wheel are close in algorithm Key is all represented with the matrix of one 4 × 4.
AES is an iteration, the password of symmetric key grouping, it can use 128,192 and 256 keys, and With 128 (16 byte) block encryptions and ciphertext data.With public key cryptography using key to difference, symmetric key cipher makes With identical secret key cipher and ciphertext data.Digit by the encryption data of block cipher return is identical with input data.Repeatedly Generation encryption repeats to replace and replace input data in the cycle using a loop structure.
The method that safety of image provided in an embodiment of the present invention is shared has the following advantages:
1st, the considerations of when user shares picture for secure context, can selectively be added the picture of desired secrecy It is close, other users are then shared with, after picture is sent to other users, other side is also required to key and carrys out the browsable figure of decryption side Piece, makes the other users of no key can not check picture, so as to achieve the purpose that maintain secrecy to picture, effectively improves and shares figure Security during piece;
2nd, individual privacy can more easily be protected, it is ensured that file data is not stolen in transmission process, even if stolen Other side is taken not have key that can not also check original;In addition, recipient needs secret key decryption that can just inquire about after receiving file, may be used also It is arbitrarily checked to avoid other people;
3rd, in transmission process, if attacker intercepted and captured send information, it is seen that simply ciphertext, do not take decryption hand Section can not obtain clear content;Recipient similarly has no idea to obtain after the ciphertext that sender sends is had received In plain text, key must be sent to recipient by sender by special approach, safer.
Embodiment two:
The device that a kind of safety of image is shared, the device are set on the terminal device, and with reference to figure 4, which includes:
Receiving module 11, for receiving the images share request of user's transmission, wherein, it carries and needs in images share request Share the information of image and the information of images share mode;
Generation module 12, for based on images share request to generate whether the option to be selected of encrypted image;
Sharing module 13, for the targets option that is selected according to user will images share be shared to target user so that Target user, which treats, to share image and is checked, wherein, targets option is any one of option to be selected.
An embodiment of the present invention provides the device that a kind of safety of image is shared, which first receives the image point of user's transmission Enjoy request, then, according to images share request to generate whether the option to be selected of encrypted image, finally, according to user select Targets option will images share be shared to target user.The device can choose whether encrypted image according to the demand of user, When treat share image and be encrypted when, the security during images share can be improved, be conducive to the guarantor of individual privacy Shield, it is poor to alleviate existing images share equipment safety, the technical issues of being unfavorable for individual privacy protection.
Optionally, sharing module includes:
First shares unit, for when targets option be not encrypted image when, by image to be shared according to images share side Formula is shared to target user, so that target user treats and shares image and checked.
Optionally, sharing module further includes:
Cryptographic processing unit, for when targets option is encrypted image, being treated using Encryption Algorithm and sharing image progress Encryption obtains encryption file key corresponding with file is encrypted;
Second shares unit is shared according to images share mode to target user for that will encrypt file, wherein, target is used Family is decrypted, to check image to be shared after encryption file is received by key pair encryption file.
Optionally, Encryption Algorithm is AES encryption algorithm.
Optionally, AES encryption algorithm includes:Byte replaces, and line position is moved, and row obscure and InvAddRoundKey, wherein, decrypting process For the inverse operation of ciphering process.
Particular content in the embodiment two may be referred to the description in above-described embodiment one, and details are not described herein.
The computer program product for the method and device that the safety of image that the embodiment of the present invention is provided is shared, including storage The computer readable storage medium of program code, the instruction that said program code includes can be used for performing previous methods embodiments Described in method, specific implementation can be found in embodiment of the method, details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, details are not described herein.
In addition, in the description of the embodiment of the present invention, unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected or be integrally connected;It can To be mechanical connection or be electrically connected;It can be directly connected, can also be indirectly connected by intermediary, Ke Yishi Connection inside two elements.For the ordinary skill in the art, with concrete condition above-mentioned term can be understood at this Concrete meaning in invention.
If the function is realized in the form of SFU software functional unit and is independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be People's computer, server or network equipment etc.) perform all or part of the steps of the method according to each embodiment of the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
In the description of the present invention, it is necessary to explanation, term " " center ", " on ", " under ", "left", "right", " vertical ", The orientation or position relationship of the instructions such as " level ", " interior ", " outer " be based on orientation shown in the drawings or position relationship, merely to Convenient for the description present invention and simplify description rather than instruction or imply signified device or element must have specific orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ", " the 3rd " is only used for description purpose, and it is not intended that instruction or hint relative importance.
Finally it should be noted that:Embodiment described above is only the specific embodiment of the present invention, to illustrate the present invention Technical solution, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those of ordinary skill in the art that:Any one skilled in the art In the technical scope disclosed by the present invention, can still modify to the technical solution recorded in previous embodiment or can be light It is readily conceivable that variation or equivalent substitution is carried out to which part technical characteristic;And these modifications, variation or replacement, do not make The essence of appropriate technical solution departs from the spirit and scope of technical solution of the embodiment of the present invention, should all cover the protection in the present invention Within the scope of.Therefore, protection scope of the present invention described should be subject to the protection scope in claims.

Claims (10)

1. a kind of method that safety of image is shared, which is characterized in that applied to encryption plug-in unit, the encryption plug-in unit is arranged on terminal In equipment, the described method includes:
The images share request that user sends is received, wherein, described image, which is shared to carry in request, needs the information for being shared image With the information of images share mode;
Shared based on described image request to generate whether the option to be selected of encrypted image;
The targets option selected according to the user is by the images share to be shared to target user, so that the target user The image to be shared is checked, wherein, the targets option is any one of described option to be selected.
2. according to the method described in claim 1, it is characterized in that, when the targets option be not encrypted image when, according to institute Stating the targets option of user's selection includes the images share to be shared to target user:
The image to be shared is shared mode according to described image to share to the target user, so that the target user couple The image to be shared is checked.
3. according to the method described in claim 1, it is characterized in that, when the targets option be encrypted image when, according to described The targets option of user's selection includes the images share to be shared to target user:
The image to be shared is encrypted using Encryption Algorithm, encryption file is obtained and the encryption file is corresponding Key;
The encryption file is shared mode according to described image to share to the target user, wherein, the target user exists After receiving the encryption file, the encryption file is decrypted by the key, to check the image to be shared.
4. according to the method described in claim 3, it is characterized in that, the Encryption Algorithm is AES encryption algorithm.
5. according to the method described in claim 4, it is characterized in that, the AES encryption algorithm includes:Byte replaces, and line position is moved, Row obscure and InvAddRoundKey, wherein, decrypting process is the inverse operation of ciphering process.
6. the device that a kind of safety of image is shared, which is characterized in that described device is set on the terminal device, described device bag It includes:
Receiving module, for receiving the images share request of user's transmission, wherein, described image, which is shared to carry in request, to be needed point Enjoy the information of image and the information of images share mode;
Generation module, for shared based on described image request to generate whether the option to be selected of encrypted image;
Sharing module, for according to the targets option that the user selects by the images share to be shared to target user, with The target user is made to check the image to be shared, wherein, the targets option is in the option to be selected It is any.
7. device according to claim 6, which is characterized in that the sharing module includes:
First shares unit, for when the targets option be not encrypted image when, by the image to be shared according to the figure Share as sharing mode to the target user, so that the target user checks the image to be shared.
8. device according to claim 6, which is characterized in that the sharing module further includes:
Cryptographic processing unit, for when the targets option be encrypted image when, using Encryption Algorithm to the image to be shared It is encrypted, obtains encryption file and the corresponding key of the encryption file;
Second shares unit is shared for the encryption file to be shared mode according to described image to the target user, In, the target user is decrypted the encryption file after the encryption file is received, by the key, to look into See the image to be shared.
9. device according to claim 8, which is characterized in that the Encryption Algorithm is AES encryption algorithm.
10. device according to claim 9, which is characterized in that the AES encryption algorithm includes:Byte replaces, line position It moving, row obscure and InvAddRoundKey, wherein, decrypting process is the inverse operation of ciphering process.
CN201711453108.6A 2017-12-27 2017-12-27 The method and device that safety of image is shared Pending CN108111711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711453108.6A CN108111711A (en) 2017-12-27 2017-12-27 The method and device that safety of image is shared

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711453108.6A CN108111711A (en) 2017-12-27 2017-12-27 The method and device that safety of image is shared

Publications (1)

Publication Number Publication Date
CN108111711A true CN108111711A (en) 2018-06-01

Family

ID=62213791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711453108.6A Pending CN108111711A (en) 2017-12-27 2017-12-27 The method and device that safety of image is shared

Country Status (1)

Country Link
CN (1) CN108111711A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942001A (en) * 2014-05-12 2014-07-23 上海卓悠网络科技有限公司 Free screen capture method of mobile terminal and mobile terminal
CN104657668A (en) * 2015-02-06 2015-05-27 深圳市金立通信设备有限公司 Terminal
CN104731512A (en) * 2015-03-31 2015-06-24 努比亚技术有限公司 Method, device and terminal for sharing pictures
CN106027530A (en) * 2016-05-25 2016-10-12 天津光电安辰信息技术有限公司 Instant message encryption system based on smartphone and implementation method thereof
CN106055996A (en) * 2016-05-18 2016-10-26 维沃移动通信有限公司 Method and mobile terminal for multimedia information sharing
CN106156254A (en) * 2015-04-28 2016-11-23 阿里巴巴集团控股有限公司 Information sharing method and device
CN106453056A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Mobile terminal and method for safely sharing picture

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103942001A (en) * 2014-05-12 2014-07-23 上海卓悠网络科技有限公司 Free screen capture method of mobile terminal and mobile terminal
CN104657668A (en) * 2015-02-06 2015-05-27 深圳市金立通信设备有限公司 Terminal
CN104731512A (en) * 2015-03-31 2015-06-24 努比亚技术有限公司 Method, device and terminal for sharing pictures
CN106156254A (en) * 2015-04-28 2016-11-23 阿里巴巴集团控股有限公司 Information sharing method and device
CN106055996A (en) * 2016-05-18 2016-10-26 维沃移动通信有限公司 Method and mobile terminal for multimedia information sharing
CN106027530A (en) * 2016-05-25 2016-10-12 天津光电安辰信息技术有限公司 Instant message encryption system based on smartphone and implementation method thereof
CN106453056A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Mobile terminal and method for safely sharing picture

Similar Documents

Publication Publication Date Title
CN105553951B (en) Data transmission method and device
CN102196425B (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN111431713B (en) Private key storage method and device and related equipment
US20210357914A1 (en) Constructing a Distributed Ledger Transaction on a Cold Hardware Wallet
WO2016173724A1 (en) Encryption system, encryption key wallet and method
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN105307165A (en) Communication method based on mobile application, server and client
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CA3178180A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN109525388B (en) Combined encryption method and system with separated keys
CN106375990A (en) Encryption and decryption system and encryption and decryption method for private data of mobile phone
KR101348249B1 (en) OTP authentification method and system using of QR-code
CN105447404B (en) The method and system of image secret protection in a kind of cloud storage
CN115242514B (en) Privacy set intersection method and system based on state secret, electronic equipment and storage medium
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
JP2016046799A (en) Agent for providing security cloud service, security key device for security cloud service
CN104994498B (en) The method and system that a kind of terminal applies are interacted with mobile phone card application
CN107493281A (en) encryption communication method and device
CN108933758A (en) Cloud storage encipher-decipher method, device and system can be shared
US20200045026A1 (en) Centralized Data Management and SaaS with End-to-End Encryption
CN107689867B (en) Key protection method and system under open environment
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180601

RJ01 Rejection of invention patent application after publication