CN108696355B - Method and system for preventing head portrait of user from being embezzled - Google Patents

Method and system for preventing head portrait of user from being embezzled Download PDF

Info

Publication number
CN108696355B
CN108696355B CN201710229023.3A CN201710229023A CN108696355B CN 108696355 B CN108696355 B CN 108696355B CN 201710229023 A CN201710229023 A CN 201710229023A CN 108696355 B CN108696355 B CN 108696355B
Authority
CN
China
Prior art keywords
user
head portrait
server
public key
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710229023.3A
Other languages
Chinese (zh)
Other versions
CN108696355A (en
Inventor
陶婷
吕华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Technology Group Co Ltd
Original Assignee
TCL Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Technology Group Co Ltd filed Critical TCL Technology Group Co Ltd
Priority to CN201710229023.3A priority Critical patent/CN108696355B/en
Publication of CN108696355A publication Critical patent/CN108696355A/en
Application granted granted Critical
Publication of CN108696355B publication Critical patent/CN108696355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a method and a system for preventing a user from embezzlement of a head portrait, wherein the method comprises the following steps: receiving an instruction of setting the head portrait of the first user, encrypting the head portrait of the first user after the head portrait is set, and uploading the head portrait to a server; when a second user request for checking the first user head portrait information is received, the server encrypts the first user head portrait information and sends the encrypted first user head portrait information to the second user; and after receiving the first user head portrait information, the second user sends the first user head portrait information to the trusted execution environment for decryption processing and display. According to the invention, the encrypted head portrait data of the user is uploaded to the server, when other users click to check, the data is required to be acquired from the server, and then decrypted to check, so that other users can only check, but cannot store and capture the head portrait when clicking the head portrait of the user, and the purposes of safely protecting the head portrait of the user and preventing the head portrait of the user from being embezzled are achieved.

Description

Method and system for preventing head portrait of user from being embezzled
Technical Field
The invention relates to the technical field of head portrait encryption processing, in particular to a method and a system for preventing head portrait of a user from being embezzled.
Background
In the existing communication software (such as various real-time communication software such as WeChat, QQ, Paibao and the like) on a mobile terminal, users need to set a head portrait, the users look for the other side to send information by setting the head portrait representing the identity of the users, the most intuitive way is to look up the head portrait, when the users communicate with friends, the users often identify and select the head portrait, for example, in a chat group, the users often have a lot of information, and the users distinguish who sends the information, and often also distinguish the information according to the head portrait.
However, the communication software in the prior art does not protect the head portrait information of the user, the head portrait of the user is easy to intercept, strangers can store the head portrait basically as long as the head portrait is seen, if a person and the user use the same head portrait or the modified very similar head portrait, confusion of other persons is easy to cause, and unnecessary loss is caused by mistake in the process of sending important information or transferring accounts.
For example, at present, the usage rate of WeChat is very high, users who basically own smart phones can register WeChat, and WeChat users can use a head portrait, generally a head portrait with own information, for their accounts, so that illegal actions such as chatting with friends and family of the users by other people, fraud and transfer of money by the users are frequently caused, great loss is caused to the users, and the users are inconvenienced by illegal persons.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and a system for preventing a user's avatar from being embezzled, aiming at uploading encrypted avatar data of the user to a server, and when other users click to view the avatar data, the data needs to be acquired from the server and then decrypted to view the avatar data, so that other users can only view the avatar data and cannot save and capture the avatar data when clicking the avatar data, thereby achieving the purposes of protecting the user's avatar safely and preventing the user's avatar from being embezzled.
The technical scheme adopted by the invention for solving the technical problem is as follows:
a method for preventing pirating of a head portrait of a user, comprising the steps of:
step A: receiving an instruction of setting the head portrait of the first user, encrypting the head portrait of the first user after the head portrait is set, and uploading the head portrait to a server;
and B: when a second user request for checking the first user head portrait information is received, the server encrypts the first user head portrait information and sends the encrypted first user head portrait information to the second user;
and C: and after receiving the first user head portrait information, the second user sends the first user head portrait information to the trusted execution environment for decryption processing and display.
The method for preventing the head portrait of the user from being embezzled comprises the following steps: acquiring a public key of a server, and encrypting the set head portrait of the first user through the public key of the server; the decryption process comprises the following steps: and acquiring a public key of the server, and decrypting the encrypted head portrait of the first user through a private key corresponding to the public key of the server.
The method for preventing the head portrait of the user from being stolen, wherein the step A specifically comprises the following steps:
step A1: after receiving an instruction of setting the head portrait in the communication software by the first user, setting the head portrait of the first user by selecting any one picture;
step A2: and when the setting of the head portrait of the first user is finished, acquiring a public key of the server, encrypting the set head portrait of the first user through the public key, and uploading the head portrait of the first user to the server.
The method for preventing the head portrait of the user from being stolen, wherein the step B specifically comprises the following steps:
step B1: receiving a request of a second user for checking the head portrait information of the first user;
step B2: the second user acquires a public key of a server of the second user, and decrypts the head portrait information of the first user through a private key corresponding to the public key;
step B3: and after the head portrait information of the first user is decrypted and then encrypted again by the public key of the second user, the head portrait information is sent to the second user through the server.
The method for preventing the head portrait of the user from being stolen, wherein the step C specifically comprises the following steps:
step C1: the second user receives the first user head portrait information;
step C2: when the head portrait of the first user is displayed as a thumbnail, setting the display position of the head portrait of the first user through the traditional terminal application running environment of the second user, sending the display coordinates of the head portrait and the encrypted data to the trusted execution environment of the second user, decrypting and extracting the thumbnail after the trusted execution environment acquires the encrypted head portrait data, and drawing and displaying according to the display coordinates of the traditional terminal application running environment;
step C3: when the first user head portrait is displayed as an original image, the information of the first user head portrait is directly decrypted and displayed through a trusted execution environment of a second user;
step C4: after the head portrait of the first user is displayed in the second user, when the second user receives an instruction for carrying out screenshot or storage on the displayed head portrait of the first user, the image of the first user is displayed to be black after the screenshot operation is finished, the head portrait data of the first user cannot be exported during the storage operation, and the display control is to allow viewing, prohibit storage and display of the screenshot.
A system for preventing pirating of a user's head portrait, wherein the system comprises:
the head portrait setting and encrypting module is used for receiving an instruction of setting a head portrait of a first user, encrypting the head portrait after the head portrait of the first user is set, and uploading the head portrait to the server;
the head portrait applying and sending module is used for encrypting the head portrait information of the first user and sending the encrypted head portrait information to the second user when receiving a request of the second user for checking the head portrait information of the first user;
and the head portrait decryption and display module is used for sending the first user head portrait information to the trusted execution environment for decryption processing and display after the second user receives the first user head portrait information.
The system for preventing the head portrait of the user from being embezzled comprises the following steps: acquiring a public key of a server, and encrypting the set head portrait of the first user through the public key of the server; the decryption process comprises the following steps: and acquiring a public key of the server, and decrypting the encrypted head portrait of the first user through a private key corresponding to the public key of the server.
The system for preventing the head portrait of the user from being stolen, wherein the head portrait setting and encrypting module specifically comprises:
the head portrait setting unit is used for setting a head portrait of a first user by selecting any one picture after receiving an instruction of setting the head portrait in the communication software by the first user;
and the head portrait encryption unit is used for acquiring a public key of the server after the head portrait of the first user is set, encrypting the set head portrait of the first user through the public key and uploading the head portrait to the server.
The system for preventing the head portrait of the user from being stolen, wherein the head portrait applying and sending module specifically comprises:
the head portrait request unit is used for receiving a request of a second user for checking the head portrait information of the first user;
the head portrait decryption unit is used for the second user to obtain the public key of the server of the second user and decrypt the head portrait information of the first user through the private key corresponding to the public key;
and the head portrait encryption and transmission unit is used for re-encrypting the head portrait information of the first user by using the public key of the second user after the head portrait information of the first user is decrypted, and then transmitting the head portrait information to the second user by using the server.
The system for preventing the head portrait of the user from being stolen, wherein the head portrait decryption and display module specifically comprises:
the head portrait receiving unit is used for receiving the head portrait information of the first user by the second user;
the first head portrait display unit is used for setting the display position of the head portrait of the first user through the traditional terminal application running environment of the second user when the head portrait of the first user is displayed as a thumbnail, sending the display coordinates of the head portrait and the encrypted data to the trusted execution environment of the second user, decrypting and extracting the thumbnail after the encrypted head portrait data is obtained by the trusted execution environment, and drawing and displaying according to the display coordinates of the traditional terminal application running environment;
the second head portrait display unit is used for directly decrypting and displaying the first user head portrait information through the trusted execution environment of the second user when the first user head portrait is displayed as the original image;
and the head portrait display protection unit is used for displaying the head portrait of the first user in black after the head portrait of the first user is displayed in the second user, when the second user receives an instruction for carrying out screenshot or storing on the displayed head portrait of the first user, the image of the first user is displayed in black after the screenshot operation is finished, the data of the head portrait of the first user cannot be exported during the storage operation, and the display control is to allow viewing, prohibit storage and display of the screenshot.
The invention discloses a method and a system for preventing a user from embezzlement of a head portrait, wherein the method comprises the following steps: receiving an instruction of setting the head portrait of the first user, encrypting the head portrait of the first user after the head portrait is set, and uploading the head portrait to a server; when a second user request for checking the first user head portrait information is received, the server encrypts the first user head portrait information and sends the encrypted first user head portrait information to the second user; and after receiving the first user head portrait information, the second user sends the first user head portrait information to the trusted execution environment for decryption processing and display. According to the invention, the encrypted head portrait data of the user is uploaded to the server, when other users click to check, the data is required to be acquired from the server, and then decrypted to check, so that other users can only check, but cannot store and capture the head portrait when clicking the head portrait of the user, and the purposes of safely protecting the head portrait of the user and preventing the head portrait of the user from being embezzled are achieved.
Drawings
FIG. 1 is a flow chart of the method for preventing the pirate of the head portrait of the user according to the preferred embodiment of the present invention.
FIG. 2 is a functional block diagram of a preferred embodiment of the system for preventing piracy of a user of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, a method for preventing a user's head portrait from being stolen according to a preferred embodiment of the present invention includes the following steps:
and step S100, receiving an instruction of setting the head portrait of the first user, performing encryption processing after the head portrait of the first user is set, and uploading the head portrait to a server.
Preferably, the step S100 specifically includes the following steps:
step S101, after receiving an instruction of a first user for setting a head portrait in communication software, setting the head portrait as the first user by selecting any one picture;
and step S102, acquiring a public key of the server after the setting of the head portrait of the first user is finished, encrypting the set head portrait of the first user through the public key, and uploading the head portrait to the server.
Specifically, the encryption processing process includes: acquiring a public key of a server, and encrypting the set head portrait of the first user through the public key of the server; the decryption process comprises the following steps: and acquiring a public key of the server, and decrypting the encrypted head portrait of the first user through a private key corresponding to the public key of the server. Public Key and Private Key are a Key pair (i.e., a Public Key and a Private Key) obtained by an algorithm, the Public Key is a Public part of the Key pair, the Private Key is an Private part, and the Public Key is usually used for encrypting a session Key, verifying a digital signature, or encrypting data that can be decrypted by the corresponding Private Key. The pair of keys obtained by this algorithm is guaranteed to be unique worldwide, and when using this pair of keys, if one key is used to encrypt a piece of data, the other key must be used to decrypt it. For example, encrypting data with a public key necessitates decryption with the private key, and if encrypting with the private key, also must decrypt with the public key, otherwise decryption will not succeed. Therefore, after receiving an instruction of a first user for setting the head portrait in the communication software, setting the head portrait of the first user by selecting any one of the pictures (the picture can be a big head photograph or a whole body photograph of the first user, or other favorite pictures of the first user); and when the setting of the head portrait of the first user is finished, acquiring a public key of the server, encrypting the head portrait of the set user through the public key (preventing other users from stealing the head portrait) and uploading the head portrait to the server.
And step S200, when receiving a request of a second user for checking the first user head portrait information, the server encrypts the first user head portrait information and then sends the encrypted first user head portrait information to the second user.
Preferably, the step S200 specifically includes the following steps:
step S201, receiving a request of a second user for checking the head portrait information of a first user;
step S202, a second user obtains a public key of a server of the second user, and the head portrait information of the first user is decrypted through a private key corresponding to the public key;
step S203, after the head portrait information of the first user is decrypted, the head portrait information is encrypted again by the public key of the second user, and then the head portrait information is sent to the second user through the server.
Specifically, when the second user obtains the head portrait picture of another person (the first user in the present invention) by using the communication software, the communication software saves the picture in the storage area of the TEE of the mobile terminal. The TEE (Trusted Execution Environment) is a Trusted Environment independent from a conventional terminal application Execution Environment (REE, Rich Execution Environment) (such as Android), and provides various security services to applications based on a microkernel operating system, depending on security capabilities provided by terminal hardware.
Taking Android as an example, a trusted environment independent of Android is established in a mobile terminal (mobile phone), and exists in parallel with the Android, and when the mobile terminal works in the environment, the Android cannot access and acquire unauthorized resources of the TEE without right, which is ensured by bottom hardware. The TEE can implement six security functions: trusted computing, data encryption, system protection, secure input, secure display (TUI), secure storage.
Therefore, after the second user applies for checking the head portrait information of the user, the second user obtains the public key of the server of the second user, decrypts the head portrait information of the first user through the private key corresponding to the public key, and after the head portrait information of the first user is decrypted, the head portrait information of the first user is encrypted again through the public key of the second user and then sent to the second user, so that the head portrait of the first user is stored in the TEE storage area of the second user.
Step S300, after the second user receives the first user head portrait information, the first user head portrait information is sent to the trusted execution environment for decryption processing and display.
Preferably, the step S300 specifically includes the following steps:
step S301, a second user receives first user head portrait information;
step S302, when the head portrait of the first user is displayed as a thumbnail, setting the display position of the head portrait of the first user through the traditional terminal application running environment of the second user, sending the head portrait display coordinate and the encrypted data to the trusted execution environment of the second user, decrypting and extracting the thumbnail after the trusted execution environment acquires the encrypted head portrait data, and drawing and displaying according to the display coordinate of the traditional terminal application running environment;
step S303, when the first user head portrait is displayed as an original image, the first user head portrait information is directly decrypted and displayed through a trusted execution environment of a second user;
step S304, after the head portrait of the first user is displayed in the second user, when the second user receives an instruction for capturing or storing the displayed head portrait of the first user, the image of the first user is displayed to be black after the screen capturing operation is finished, the head portrait data of the first user cannot be exported during the storing operation, and the display control is to allow viewing, forbid storage and display of the captured image.
Specifically, the decryption process includes: and the second user acquires the public key of the server and decrypts the encrypted head portrait of the first user through the private key corresponding to the public key. When displaying, the image is decrypted first, and then the image is displayed safely through the TUI of the TEE. TUI (safety display): by controlling access to the display driver peripheral, the TEE can safely display data on the equipment, and the TEE can display cache and information in an isolated manner, so that the REE part, such as Android, cannot acquire and tamper data. Therefore, when the user clicks the picture of the other side, the user can only check the picture, the picture cannot be stored, and the screen capture cannot be cut, so that the user head portrait is safely protected, and the stealing is prevented.
The invention stores and displays the first user head portrait through encryption and the TEE safety display function, thereby preventing other people from saving or intercepting the user head portrait for private use, and causing unnecessary trouble and loss to other people.
The present invention also provides a system for preventing the head portrait of a user from being stolen, as shown in fig. 2, the system comprises:
the avatar setting and encrypting module 210 is configured to receive an instruction of setting an avatar by the first user, perform encryption processing after the avatar setting of the first user is completed, and upload the encrypted avatar to the server; as described above.
The avatar application and sending module 220 is configured to encrypt the first user avatar information and send the encrypted first user avatar information to the second user when receiving a request of the second user to view the first user avatar information; as described above.
The avatar decryption and display module 230 is configured to, after the second user receives the first user avatar information, send the first user avatar information to the trusted execution environment for decryption and display; as described above.
Further, the system for preventing the pirate of the user head portrait comprises the following steps: acquiring a public key of a server, and encrypting the set head portrait of the first user through the public key of the server; the decryption process comprises the following steps: acquiring a public key of the server, and decrypting the encrypted head portrait of the first user through a private key corresponding to the public key of the server; as described above.
Further, the system for preventing the head portrait of the user from being stolen, wherein the head portrait setting and encrypting module specifically comprises:
the head portrait setting unit is used for setting a head portrait of a first user by selecting any one picture after receiving an instruction of setting the head portrait in the communication software by the first user; as described above.
The head portrait encryption unit is used for acquiring a public key of the server after the head portrait of the first user is set, encrypting the set head portrait of the first user through the public key and uploading the head portrait to the server; as described above.
Further, the system for preventing the head portrait of the user from being stolen, wherein the head portrait applying and sending module specifically comprises:
the head portrait request unit is used for receiving a request of a second user for checking the head portrait information of the first user; as described above.
The head portrait decryption unit is used for the second user to obtain the public key of the server of the second user and decrypt the head portrait information of the first user through the private key corresponding to the public key; as described above.
The head portrait encryption and transmission unit is used for encrypting the head portrait information of the first user again through the public key of the second user after the head portrait information of the first user is decrypted, and then transmitting the head portrait information to the second user through the server; as described above.
Further, the system for preventing the head portrait of the user from being stolen, wherein the head portrait decryption and display module specifically comprises:
the head portrait receiving unit is used for receiving the head portrait information of the first user by the second user; as described above.
The first head portrait display unit is used for setting the display position of the head portrait of the first user through the traditional terminal application running environment of the second user when the head portrait of the first user is displayed as a thumbnail, sending the display coordinates of the head portrait and the encrypted data to the trusted execution environment of the second user, decrypting and extracting the thumbnail after the encrypted head portrait data is obtained by the trusted execution environment, and drawing and displaying according to the display coordinates of the traditional terminal application running environment; as described above.
The second head portrait display unit is used for directly decrypting and displaying the first user head portrait information through the trusted execution environment of the second user when the first user head portrait is displayed as the original image; as described above.
The head portrait display protection unit is used for displaying the head portrait of the first user in black after the head portrait of the first user is displayed in the second user, when the second user receives an instruction for carrying out screenshot or storing on the displayed head portrait of the first user, the image of the first user is displayed in black after the screenshot operation is finished, the data of the head portrait of the first user cannot be exported during the storage operation, and the display control is to allow viewing, prohibit storing and display of the screenshot; as described above.
In summary, the present invention provides a method and a system for preventing embezzlement of a user's head portrait, wherein the method comprises: receiving an instruction of setting the head portrait of the first user, encrypting the head portrait of the first user after the head portrait is set, and uploading the head portrait to a server; when a second user request for checking the first user head portrait information is received, the server encrypts the first user head portrait information and sends the encrypted first user head portrait information to the second user; and after receiving the first user head portrait information, the second user sends the first user head portrait information to the trusted execution environment for decryption processing and display. According to the invention, the encrypted head portrait data of the user is uploaded to the server, when other users click to check, the data is required to be acquired from the server, and then decrypted to check, so that other users can only check, but cannot store and capture the head portrait when clicking the head portrait of the user, and the purposes of safely protecting the head portrait of the user and preventing the head portrait of the user from being embezzled are achieved.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (8)

1. A method for preventing pirating of a user's head portrait, comprising the steps of:
step A: receiving an instruction of setting the avatar of the first user, encrypting the avatar through a public key of the server after the setting of the avatar of the first user is finished, and uploading the encrypted avatar to the server;
and B: when a request of a second user for checking the first user head portrait information is received, the server decrypts the first user head portrait information through a private key corresponding to a public key of the server, and sends the first user head portrait information to the second user after the public key of the second user is encrypted again;
and C: after receiving the first user head portrait information, the second user sends the first user head portrait information to the trusted execution environment for decryption processing and display;
the step C specifically comprises the following steps:
step C1: the second user receives the first user head portrait information;
step C2: when the head portrait of the first user is displayed as a thumbnail, setting the display position of the head portrait of the first user through the traditional terminal application running environment of the second user, sending the display coordinates of the head portrait and the encrypted data to the trusted execution environment of the second user, decrypting and extracting the thumbnail after the trusted execution environment acquires the encrypted head portrait data, and drawing and displaying according to the display coordinates of the traditional terminal application running environment;
step C3: when the first user head portrait is displayed as an original image, the information of the first user head portrait is directly decrypted and displayed through a trusted execution environment of a second user;
step C4: after the head portrait of the first user is displayed in the second user, when the second user receives an instruction for carrying out screenshot or storage on the displayed head portrait of the first user, the image of the first user is displayed to be black after the screenshot operation is finished, the head portrait data of the first user cannot be exported during the storage operation, and the display control is to allow viewing, prohibit storage and display of the screenshot.
2. The method for preventing the pirate of the head portrait of the user according to claim 1, wherein the encryption process comprises: acquiring a public key of a server, and encrypting the set head portrait of the first user through the public key of the server; the decryption process comprises the following steps: and acquiring a public key of the server, and decrypting the encrypted head portrait of the first user through a private key corresponding to the public key of the server.
3. The method for preventing the pirate of the head portrait of the user according to claim 1, wherein the step a specifically comprises:
step A1: after receiving an instruction of setting the head portrait in the communication software by the first user, setting the head portrait of the first user by selecting any one picture;
step A2: and when the setting of the head portrait of the first user is finished, acquiring a public key of the server, encrypting the set head portrait of the first user through the public key, and uploading the head portrait of the first user to the server.
4. The method for preventing the pirate of the head portrait of the user according to claim 1, wherein the step B specifically comprises:
step B1: receiving a request of a second user for checking the head portrait information of the first user;
step B2: the server acquires a public key of the server, and decrypts the head portrait information of the first user through a private key corresponding to the public key;
step B3: and after the head portrait information of the first user is decrypted and then encrypted again by the public key of the second user, the head portrait information is sent to the second user through the server.
5. A system for preventing piracy of a user, the system comprising:
the head portrait setting and encrypting module is used for receiving an instruction of setting a head portrait of a first user, encrypting the head portrait by a public key of the server after the head portrait of the first user is set, and uploading the head portrait to the server;
the head portrait applying and sending module is used for decrypting the head portrait information of the first user through a private key corresponding to a public key of the server when receiving a request of the second user for checking the head portrait information of the first user, and sending the head portrait information of the first user to the second user after the head portrait information of the second user is encrypted again through the public key of the second user;
the head portrait decryption and display module is used for sending the first user head portrait information to the trusted execution environment for decryption processing and display after the second user receives the first user head portrait information;
the head portrait decryption and display module specifically comprises:
the head portrait receiving unit is used for receiving the head portrait information of the first user by the second user;
the first head portrait display unit is used for setting the display position of the head portrait of the first user through the traditional terminal application running environment of the second user when the head portrait of the first user is displayed as a thumbnail, sending the display coordinates of the head portrait and the encrypted data to the trusted execution environment of the second user, decrypting and extracting the thumbnail after the encrypted head portrait data is obtained by the trusted execution environment, and drawing and displaying according to the display coordinates of the traditional terminal application running environment;
the second head portrait display unit is used for directly decrypting and displaying the first user head portrait information through the trusted execution environment of the second user when the first user head portrait is displayed as the original image;
and the head portrait display protection unit is used for displaying the head portrait of the first user in black after the head portrait of the first user is displayed in the second user, when the second user receives an instruction for carrying out screenshot or storing on the displayed head portrait of the first user, the image of the first user is displayed in black after the screenshot operation is finished, the data of the head portrait of the first user cannot be exported during the storage operation, and the display control is to allow viewing, prohibit storage and display of the screenshot.
6. The system for preventing the pirate of the head portrait of the user according to claim 5, wherein the encryption process comprises: acquiring a public key of a server, and encrypting the set head portrait of the first user through the public key of the server; the decryption process comprises the following steps: and acquiring a public key of the server, and decrypting the encrypted head portrait of the first user through a private key corresponding to the public key of the server.
7. The system for preventing the pirate of the head portrait of the user according to claim 5, wherein the head portrait setting and encrypting module specifically comprises:
the head portrait setting unit is used for setting a head portrait of a first user by selecting any one picture after receiving an instruction of setting the head portrait in the communication software by the first user;
and the head portrait encryption unit is used for acquiring a public key of the server after the head portrait of the first user is set, encrypting the set head portrait of the first user through the public key and uploading the head portrait to the server.
8. The system for preventing the pirate of the head portrait of the user according to claim 5, wherein the head portrait applying and sending module specifically comprises:
the head portrait request unit is used for receiving a request of a second user for checking the head portrait information of the first user;
the head portrait decryption unit is used for the server to obtain a public key of the server and decrypt the head portrait information of the first user through a private key corresponding to the public key;
and the head portrait encryption and transmission unit is used for re-encrypting the head portrait information of the first user by using the public key of the second user after the head portrait information of the first user is decrypted, and then transmitting the head portrait information to the second user by using the server.
CN201710229023.3A 2017-04-10 2017-04-10 Method and system for preventing head portrait of user from being embezzled Active CN108696355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710229023.3A CN108696355B (en) 2017-04-10 2017-04-10 Method and system for preventing head portrait of user from being embezzled

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710229023.3A CN108696355B (en) 2017-04-10 2017-04-10 Method and system for preventing head portrait of user from being embezzled

Publications (2)

Publication Number Publication Date
CN108696355A CN108696355A (en) 2018-10-23
CN108696355B true CN108696355B (en) 2021-06-22

Family

ID=63843148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710229023.3A Active CN108696355B (en) 2017-04-10 2017-04-10 Method and system for preventing head portrait of user from being embezzled

Country Status (1)

Country Link
CN (1) CN108696355B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371963B (en) * 2020-05-27 2020-09-01 腾讯科技(深圳)有限公司 Image processing method and apparatus, storage medium, and electronic device
CN111627089B (en) * 2020-07-30 2020-11-13 深圳诚一信科技有限公司 User head portrait picture processing method, device and system and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006568A (en) * 2010-11-25 2011-04-06 北京格致璞科技有限公司 Method, equipment and system for providing portrait service
CN104158975A (en) * 2014-08-26 2014-11-19 惠州Tcl移动通信有限公司 A method for processing a contact avatar based on a mobile terminal and the mobile terminal
CN104281355A (en) * 2013-07-01 2015-01-14 联想(北京)有限公司 Information processing method and electronic equipment
US9002018B2 (en) * 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
CN104660568A (en) * 2013-11-22 2015-05-27 中国科学院深圳先进技术研究院 Address list information protecting method and device
CN104854848A (en) * 2013-05-02 2015-08-19 东莞宇龙通信科技有限公司 Terminal and processing method for head portrait of contact person
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9002018B2 (en) * 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
CN102006568A (en) * 2010-11-25 2011-04-06 北京格致璞科技有限公司 Method, equipment and system for providing portrait service
CN104854848A (en) * 2013-05-02 2015-08-19 东莞宇龙通信科技有限公司 Terminal and processing method for head portrait of contact person
CN104281355A (en) * 2013-07-01 2015-01-14 联想(北京)有限公司 Information processing method and electronic equipment
CN104660568A (en) * 2013-11-22 2015-05-27 中国科学院深圳先进技术研究院 Address list information protecting method and device
CN104158975A (en) * 2014-08-26 2014-11-19 惠州Tcl移动通信有限公司 A method for processing a contact avatar based on a mobile terminal and the mobile terminal
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method

Also Published As

Publication number Publication date
CN108696355A (en) 2018-10-23

Similar Documents

Publication Publication Date Title
US10375116B2 (en) System and method to provide server control for access to mobile client data
US20160253519A1 (en) Apparatus and method for trusted execution environment file protection
CN105260669B (en) The transmission method and Transmission system of photo
US20170161506A1 (en) Information Handling System Encrypted Image Display Through Secondary Device
WO2016192165A1 (en) Data encryption method and apparatus
CN110378097A (en) Ensure sensing data safety
CN105281907B (en) Encrypted data processing method and device
US11625480B2 (en) Mobile device with secure private memory
CN104573548A (en) Information encryption and decryption methods and devices and terminal
US20180115418A1 (en) Secure Messaging Session
US20240232417A1 (en) Object Movement Method, Apparatus and Electronic Device
US9225514B2 (en) Method for image encryption and decryption incorporating physiological features and image capture device thereof
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
CN116204895A (en) Method and terminal for accessing specific data
CN108573164A (en) File encryption and decryption method and device
CN111062025B (en) Application data processing method and related device
CN110417638B (en) Communication data processing method and device, storage medium and electronic device
US11876797B2 (en) Multi-factor geofencing system for secure encryption and decryption system
CN110996088B (en) Video processing method and related device
GB2566043A (en) A method of displaying content on a screen of an electronic processing device
CN113946838A (en) Data sharing method and related device
CN115333728A (en) Data decryption method, data decryption device and storage medium
CN113407959A (en) Operation execution method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 516006 TCL science and technology building, No. 17, Huifeng Third Road, Zhongkai high tech Zone, Huizhou City, Guangdong Province

Applicant after: TCL Technology Group Co.,Ltd.

Address before: 516006 Guangdong province Huizhou Zhongkai hi tech Development Zone No. nineteen District

Applicant before: TCL RESEARCH AMERICA Inc.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant