CN111414639A - File encryption and decryption method, device and equipment - Google Patents

File encryption and decryption method, device and equipment Download PDF

Info

Publication number
CN111414639A
CN111414639A CN201910012806.5A CN201910012806A CN111414639A CN 111414639 A CN111414639 A CN 111414639A CN 201910012806 A CN201910012806 A CN 201910012806A CN 111414639 A CN111414639 A CN 111414639A
Authority
CN
China
Prior art keywords
facial
file
image data
determined
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910012806.5A
Other languages
Chinese (zh)
Other versions
CN111414639B (en
Inventor
崔磊
高原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201910012806.5A priority Critical patent/CN111414639B/en
Publication of CN111414639A publication Critical patent/CN111414639A/en
Application granted granted Critical
Publication of CN111414639B publication Critical patent/CN111414639B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/107Static hand or arm
    • G06V40/113Recognition of static hand signs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/174Facial expression recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioethics (AREA)
  • Image Analysis (AREA)

Abstract

The embodiment of the invention provides a file encryption and decryption method, device and equipment. The method comprises the following steps: acquiring image data; determining the face image characteristics according to the image data; determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data; and encrypting the file to be encrypted according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information. The method provided by the embodiment of the invention is simple and convenient to operate and high in safety.

Description

File encryption and decryption method, device and equipment
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a file encryption and decryption method, device and equipment.
Background
The file encryption method can effectively protect the data security and the personal privacy of the user, and along with the continuous improvement of the security consciousness of the user, the requirements for encrypting and decrypting the file are also continuously improved.
The existing file encryption is generally carried out through character strings, a user needs to input the character strings in the encryption and decryption processes, the operation is complex, the user experience is poor, the encryption is carried out through a character string mode, the decryption is easy, and the safety is low.
Disclosure of Invention
The embodiment of the invention provides a file encryption and decryption method, device and equipment, which are used for solving the problems of low efficiency and low safety of the existing file encryption and decryption method.
In a first aspect, an embodiment of the present invention provides a file encryption method, including:
acquiring image data;
determining the face image characteristics according to the image data;
determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and encrypting the file to be encrypted according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information.
In one possible implementation, acquiring image data includes:
acquiring preset image data; alternatively, the first and second electrodes may be,
and acquiring image data in real time through an image acquisition device.
In one possible implementation, determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data includes:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the file type of the file to be encrypted.
In one possible implementation, determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data includes:
at least one of facial motion, facial motion sequence, expression information, and gesture information is determined from the image data and the time information.
In one possible implementation manner, encrypting the file to be encrypted according to the determined facial image features and the determined at least one of facial movements, facial movement sequences, expression information and gesture information includes:
determining an encryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information;
and encrypting the file to be encrypted by adopting a preset encryption algorithm according to the encryption key.
In a second aspect, an embodiment of the present invention provides a file decryption method, including:
acquiring image data in real time through an image acquisition device;
determining the face image characteristics according to the image data;
determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and decrypting the encrypted file according to the determined facial image characteristics and at least one of the determined facial action, the facial action sequence, the expression information and the gesture information.
In one possible implementation, determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data includes:
at least one of facial motion, facial motion sequence, expression information, and gesture information is determined according to the image data and a file type of the encrypted file.
In one possible implementation, determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data includes:
at least one of facial motion, a sequence of facial motion, expression information, and gesture information is determined based on the image data and the encryption time information of the encrypted file.
In one possible implementation, decrypting the encrypted file according to the determined facial image features and the determined at least one of facial movements, facial movement sequences, expression information, and gesture information includes:
determining a decryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information;
and decrypting the encrypted file by adopting a preset decryption algorithm according to the decryption key.
In one possible implementation, if the decryption fails, the method further includes:
sending a decryption request message to the encryptor;
receiving image data sent by an encryptor;
and decrypting the encrypted file according to the image data.
In a third aspect, an embodiment of the present invention provides a file encryption apparatus, including:
the acquisition module is used for acquiring image data;
the first determining module is used for determining the facial image characteristics according to the image data;
a second determination module for determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and the encryption module is used for encrypting the file to be encrypted according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information.
In a fourth aspect, an embodiment of the present invention provides a file decryption apparatus, including:
the acquisition module is used for acquiring image data in real time through the image acquisition device;
the first determining module is used for determining the facial image characteristics according to the image data;
a second determination module that determines at least one of a facial motion, a facial motion sequence, expression information, and gesture information from the image data;
and the decryption module is used for decrypting the encrypted file according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information.
In a fifth aspect, an embodiment of the present invention provides an electronic device, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the file encryption method of any one of the first aspects or the file decryption method of any one of the second aspects.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the file encryption method according to any one of the first aspect or the file decryption method according to any one of the second aspect.
According to the file encryption and decryption method, device and equipment provided by the embodiment of the invention, the file to be encrypted is encrypted by acquiring the image data, determining the facial image characteristics according to the image data, determining at least one of facial actions, facial action sequences, expression information and gesture information according to the image data, and encrypting the file according to the determined facial image characteristics and the determined at least one of the facial actions, the facial action sequences, the expression information and the gesture information. According to the file encryption method provided by the embodiment, in the file encryption process, a user does not need to input character strings, the operation is simple and convenient, the user experience is improved, and the file encryption method is encrypted through facial image features and at least one of facial actions, facial action sequences, expression information and gesture information, is not easy to crack and is high in safety.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flowchart of an embodiment of a file encryption method according to the present invention;
FIG. 2 is a flowchart of an embodiment of a file decryption method according to the present invention;
FIG. 3 is a schematic structural diagram of a file encryption apparatus according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a file decryption apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an embodiment of an electronic device provided in the present invention.
With the above figures, certain embodiments of the invention have been illustrated and described in more detail below. The drawings and the description are not intended to limit the scope of the inventive concept in any way, but rather to illustrate it by those skilled in the art with reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terms "comprising" and "having," and any variations thereof, in the description and claims of this invention are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The terms "first" and "second" in the present application are used for identification purposes only and are not to be construed as indicating or implying a sequential relationship, relative importance, or implicitly indicating the number of technical features indicated. "plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
Fig. 1 is a flowchart of an embodiment of a file encryption method according to the present invention. The file encryption method provided by the embodiment can be applied to terminal equipment, including but not limited to: smart phones, computers, tablet devices, personal digital assistants, and the like. As shown in fig. 1, the file encryption method provided in this embodiment may include:
s101, image data are obtained.
The image data acquired in this embodiment may be picture data or video data.
Alternatively, acquiring the image data may be acquiring preset image data. For example, when a user uses a terminal device of the user to encrypt a file, and the user sets image data for encryption in advance, the user does not need to acquire the image data again when encrypting the file, and the user can directly acquire the image data set in advance in the terminal device. By acquiring preset image data for file encryption, the file encryption efficiency can be improved, and the user does not need to perform any operation in the process, so that the user experience is improved.
Alternatively, the image data may be acquired in real time by an image acquisition device. For example, when a user uses a borrowed or rented terminal device to encrypt a file, image data of the user can be acquired in real time for encryption through an image acquisition device, such as a camera of the terminal device, so that the safety of the user data can be ensured, the privacy of the user can be protected, and convenience is provided for the user to encrypt the file anytime and anywhere.
The present embodiment does not limit the size, format, and the like of the acquired image data.
And S102, determining the facial image characteristics according to the image data.
In this embodiment, after the image data is acquired, the facial image features are determined according to the image data. For example, a face image may be first cut out from the acquired image data, and then face image features may be determined from the cut-out face image. The facial image features in this embodiment include, but are not limited to, visual features, pixel statistical features, facial image transform coefficient features, facial image algebraic features, and facial image geometric features.
For example, the human face is composed of parts such as eyebrows, eyes, a nose, a mouth, a chin and the like, and geometric description of the parts and the structural relationship among the parts can form geometric features of the human face image.
S103, determining at least one of facial movement, facial movement sequence, expression information and gesture information according to the image data.
Facial movements in this embodiment include, but are not limited to, lowering head, raising head, frowning, closing eyes, turning head left, turning head right, etc. The face action sequence in the present embodiment may be a sequence consisting of a plurality of face actions, for example, head-down-head-frown-eye-closed-head-left-head-right turn to one face action sequence. The expression information in the present embodiment includes, but is not limited to, smiling, stubborn, angry, skin toning, and the like. The gesture information in this embodiment includes, but is not limited to, a fist, a scissor hand, a five-finger open, etc.
In the present embodiment, at least one of facial motion, facial motion sequence, expression information, and gesture information is determined according to the image data, that is, one of facial motion, facial motion sequence, expression information, and gesture information may be determined according to the image data, for example, expression information included in the image data may be determined according to the acquired image data; gesture information contained in the acquired image data can be determined according to the acquired image data; the facial motion contained therein may be determined from the acquired image data; a sequence of facial movements contained therein may be determined from the acquired image data. Various types of facial movements, facial movement sequences, expression information and gesture information can also be determined according to the image data, for example, the expression information and the gesture information contained in the image data can be determined according to the acquired image data; the facial motion and facial motion sequence contained therein may be determined from the acquired image data; expression information, gesture information, facial motion, and facial motion sequence contained therein may be determined from the acquired image data.
It should be noted that the execution order of S102 and S103 is not limited in this embodiment. S102 may be performed first, and then S103 may be performed; or executing S103 first and then executing S102; s102 and S103 may also be performed simultaneously.
And S104, encrypting the file to be encrypted according to the determined facial image characteristics and at least one of the determined facial motion, the determined facial motion sequence, the determined expression information and the determined gesture information.
The file to be encrypted in this embodiment is a file that a user desires to encrypt, and may be a text file, such as a word file, an excel file, a ppt file, a txt file, and the like; or video files such as avi files, mp4 files, flv files, vob files, etc.; but also audio files such as cd files, wave files, mp3 files, etc. The embodiment does not limit the file format of the file to be encrypted.
In this embodiment, the file to be encrypted is encrypted according to the determined facial image features and at least one of the determined facial movements, the determined facial movement sequence, the determined expression information, and the determined gesture information, for example, the file to be encrypted may be encrypted according to the determined facial image features and the determined facial movements.
According to the file encryption method provided by the embodiment, the file to be encrypted is encrypted by acquiring the image data, determining the facial image characteristics according to the image data, determining at least one of facial actions, facial action sequences, expression information and gesture information according to the image data, and encrypting the file according to the determined facial image characteristics and the determined at least one of the facial actions, the facial action sequences, the expression information and the gesture information, so that the file is encrypted. According to the file encryption method provided by the embodiment, in the file encryption process, a user does not need to input character strings, the operation is simple and convenient, the user experience is improved, and the file encryption method is encrypted through facial image features and at least one of facial actions, facial action sequences, expression information and gesture information, is not easy to crack and is high in safety.
In some embodiments, one implementation of determining at least one of facial motion, facial motion sequence, expression information, and gesture information from image data may be:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the file type of the file to be encrypted.
In this embodiment, different types of information may be determined for files to be encrypted of different file types. For example, as shown in table 1, if the file type of the file to be encrypted is a text file, the facial action may be determined from the image data; if the file type of the file to be encrypted is an audio file, determining a facial action sequence according to the image data; if the file type of the file to be encrypted is a video file, the expression information and the gesture information can be determined according to the image data. It should be noted that table 1 is merely an example, and is not limited to this in actual use.
Optionally, the information type may also be determined by using the corresponding relationship shown in table 2. For example, if the file type of the file to be encrypted is a word file, the facial motion may be determined from the image data; if the file type of the file to be encrypted is an excel file, determining a face action sequence according to the image data; if the file type of the file to be encrypted is a ppt file, the expression information and the gesture information can be determined according to the image data. It should be noted that table 2 is only an example, and is not limited to this in actual use.
TABLE 1
File type Type of information
Text file Facial movements
Audio file Facial motion sequence
Video files Expression information and gesture information
TABLE 2
File type Type of information
word file Facial movements
excel file Facial motion sequence
ppt document Expression information and gesture information
According to the file encryption method provided by the embodiment, at least one of facial actions, facial action sequences, expression information and gesture information is determined according to the image data and the file type of the file to be encrypted, and the file encryption method is used for encrypting the file, so that the file encryption interest is improved, and the file encryption safety is further improved.
In some embodiments, one implementation of determining at least one of facial motion, facial motion sequence, expression information, and gesture information from image data may be:
at least one of facial motion, facial motion sequence, expression information, and gesture information is determined from the image data and the time information.
The time information in this embodiment may be the time of encrypting the file, and taking table 3 as an example, if the time of encrypting the file falls within the range of 00:00-06:00, the facial motion and gesture information may be determined according to the image data; if the moment of encrypting the file falls into the range of 06:01-12:00, determining a facial action sequence and expression information according to the image data; if the moment of encrypting the file falls into the range of 12:01-15:00, determining expression information and gesture information according to the image data; if the time for encrypting the file falls within the range of 15:01-24:00, the gesture information can be determined according to the image data. It should be noted that table 3 only shows one possible case, and the practical use is not limited thereto. For example, different information types may also be set for different months, or different seasons.
TABLE 3
Time information Type of information
00:00-06:00 Facial movementsAnd gesture information
06:01-12:00 Facial motion sequence and expression information
12:01-15:00 Expression information and gesture information
15:01-24:00 Gesture information
According to the file encryption method provided by the embodiment, at least one of facial actions, facial action sequences, expression information and gesture information is determined according to the image data and the time information and is used for encrypting the file, so that the interestingness of file encryption is improved, and the security of file encryption is further improved.
In some embodiments, one implementation of encrypting the file to be encrypted according to the determined facial image features and the determined at least one of facial movements, facial movement sequences, expression information, and gesture information may be: determining an encryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information; and encrypting the file to be encrypted by adopting a preset encryption algorithm according to the encryption key.
In this embodiment, one implementation of determining the encryption key according to the determined facial image features and the determined at least one of the facial motion, the facial motion sequence, the expression information, and the gesture information may be to determine a GeoHash value of the determined facial image features and the determined at least one of the facial motion, the facial motion sequence, the expression information, and the gesture information. And then encrypting the file to be encrypted by adopting a preset encryption algorithm, wherein the preset encryption algorithm in the embodiment can be a symmetric encryption algorithm or an asymmetric encryption algorithm.
In the file encryption method provided by the embodiment, an encryption key is determined according to the determined facial image characteristics and at least one of the determined facial motion, the determined facial motion sequence, the determined expression information and the determined gesture information; according to the encryption key, the preset encryption algorithm is adopted to encrypt the file to be encrypted, and the security of file encryption is further improved.
Fig. 2 is a flowchart of an embodiment of a file decryption method according to the present invention. The file decryption method provided by the embodiment can be applied to terminal equipment, including but not limited to: smart phones, computers, tablet devices, personal digital assistants, and the like. As shown in fig. 2, the file decryption method provided in this embodiment may include:
s201, acquiring image data in real time through an image acquisition device.
The image acquisition device in this embodiment may be, for example, a camera of the terminal device itself, or a camera externally connected to the terminal device.
When a user opens an encrypted file, image data is acquired in real time through an image acquisition device, and the acquired image data may be picture data or video data.
And S202, determining the facial image characteristics according to the image data.
In this embodiment, the specific implementation manner of determining the facial image features according to the image data may refer to the implementation in S102, which is not described herein again.
It should be noted that, in the present embodiment, the facial image features determined according to the image data should be the same as or corresponding to the facial image features determined in the encryption. For example, if geometric features of the face image are used in encryption, geometric features of the face image are determined in decryption.
S203, determining at least one of facial movement, facial movement sequence, expression information and gesture information according to the image data.
In this embodiment, a specific implementation manner of determining at least one of the facial motion, the facial motion sequence, the expression information, and the gesture information according to the image data may refer to the implementation in S103, and is not described herein again.
It should be noted that, in the present embodiment, at least one of the facial motion, the facial motion sequence, the expression information, and the gesture information, which is determined from the image data, should be the same as or correspond to that determined in the encryption. For example, if a face action sequence is used in encryption, a face action sequence is determined in decryption; if the face action sequence and the expression information are used in encryption, the face action sequence and the expression information are determined in decryption.
S204, decrypting the encrypted file according to the determined facial image characteristics and at least one of the determined facial motion, the determined facial motion sequence, the determined expression information and the determined gesture information.
It can be understood that, when the determined facial image features and the determined at least one of the facial movements, the facial movement sequence, the expression information and the gesture information are the same as or correspond to the facial image features and the at least one of the facial movements, the facial movement sequence, the expression information and the gesture information adopted when the encrypted file is encrypted, the encrypted file can be successfully decrypted; otherwise, the encrypted file fails to be decrypted.
According to the file decryption method provided by the embodiment, the image data is acquired in real time through the image acquisition device, the facial image characteristics are determined according to the image data, at least one of facial actions, facial action sequences, expression information and gesture information is determined according to the image data, the encrypted file is decrypted according to the determined facial image characteristics and the determined at least one of the facial actions, the facial action sequences, the expression information and the gesture information, and decryption of the encrypted file is achieved. According to the file decryption method provided by the embodiment, in the file decryption process, a user does not need to input character strings, the operation is simple and convenient, the user experience is improved, the encrypted file is decrypted through the facial image features and at least one of facial actions, facial action sequences, expression information and gesture information, and the safety is high.
In some embodiments, one implementation of determining at least one of facial motion, facial motion sequence, expression information, and gesture information from image data may be:
at least one of facial motion, facial motion sequence, expression information, and gesture information is determined according to the image data and a file type of the encrypted file.
Specific implementation may refer to implementation in the file encryption process, for example, refer to implementations shown in table 1 and table 2.
In some embodiments, one implementation of determining at least one of facial motion, facial motion sequence, expression information, and gesture information from image data may be:
at least one of facial motion, a sequence of facial motion, expression information, and gesture information is determined based on the image data and the encryption time information of the encrypted file.
The specific implementation may refer to an implementation in the file encryption process, for example, refer to an implementation shown in table 3.
In some embodiments, one implementation of decrypting the encrypted file based on the determined facial image features and the determined at least one of facial motion, facial motion sequence, facial expression information, and gesture information may be: determining a decryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information; and decrypting the encrypted file by adopting a preset decryption algorithm according to the decryption key.
In this embodiment, one implementation manner of determining the decryption key according to the determined facial image features and the determined at least one of the facial motion, the facial motion sequence, the expression information, and the gesture information may be to determine the decryption key according to a key type and an encryption algorithm used when the encrypted file is encrypted, for example, if a symmetric encryption algorithm is used and an encryption key used when the encrypted file is a GeoHash value, determine the GeoHash value according to the determined facial image features and the determined at least one of the facial motion, the facial motion sequence, the expression information, and the gesture information, and perform decryption.
If a symmetric encryption algorithm is adopted, the encrypted file is successfully decrypted when the decryption key is the same as the encryption key; if an asymmetric encryption algorithm is adopted, when the encryption key and the decryption key form a pair of key pairs, the encrypted file is decrypted successfully.
In some embodiments, on the basis of the foregoing embodiments, in order to further improve security and convenience if decryption fails, the method may further include: sending a decryption request message to the encryptor; receiving image data sent by an encryptor; and decrypting the encrypted file according to the image data.
The file decryption method provided by the embodiment is suitable for the following application scenarios: users of encrypted documents also include other users besides the encryptor. In order to transmit and exchange information, a document is usually transmitted among a plurality of users, and at this time, an encryptor of the document is different from the user, and decryption is performed by acquiring image data in real time through an image acquisition device, which may result in decryption failure. In order to further improve the convenience of the user in use on the premise of ensuring the security of the file, the embodiment provides a remote decryption method.
In the file decryption method provided by this embodiment, after the decryption failure of the image data acquired in real time, a decryption request message may be sent to an encryptor of the encrypted file, where the decryption request message may include, for example, a file identifier to be decrypted, identification information of a file user, and the like. In this embodiment, a specific manner of sending the decryption request message is not limited, and the decryption request message may be sent through a short message, an instant messaging tool, the internet, and the like.
After receiving the decryption request message, the encryptor may verify whether the requester has the right to use the encrypted file according to the file identifier to be decrypted and the identification information of the file user, and may send image data to the requester if the requester is allowed to use the file. The image data is related to the image data used for encrypting the encrypted file, and can be preset by an encryptor or collected in real time.
After receiving the image data sent by the encryptor, the encrypted file is decrypted according to the image data.
According to the file decryption method provided by the embodiment, when decryption fails, the decryption request message is sent to the encryptor, the image data sent by the encryptor is received, and then the encrypted file is decrypted according to the image data, so that the security is further improved on the premise of ensuring the security of the file.
Fig. 3 shows a file encryption device, which is only illustrated in fig. 3, and the embodiment of the present invention is not limited thereto. Fig. 3 is a schematic structural diagram of a file encryption device according to an embodiment of the present invention. As shown in fig. 3, the file encryption apparatus 30 provided in this embodiment may include: an obtaining module 301, a first determining module 302, a second determining module 303 and an encrypting module 304.
An obtaining module 301, configured to obtain image data.
A first determining module 302, configured to determine facial image features according to the image data.
A second determining module 303, configured to determine at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data.
And the encryption module 304 is configured to encrypt the file to be encrypted according to the determined facial image features and at least one of the determined facial movements, facial movement sequences, expression information, and gesture information.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 1, and the implementation principle and the technical effect are similar, which are not described herein again.
Optionally, the obtaining module 301 may be specifically configured to:
acquiring preset image data; alternatively, the first and second electrodes may be,
and acquiring image data in real time through an image acquisition device.
Optionally, the second determining module 303 may be specifically configured to:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the file type of the file to be encrypted.
Optionally, the second determining module 303 may be specifically configured to:
at least one of facial motion, facial motion sequence, expression information, and gesture information is determined from the image data and the time information.
Optionally, the encryption module 304 may be specifically configured to:
determining an encryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information;
and encrypting the file to be encrypted by adopting a preset encryption algorithm according to the encryption key.
Fig. 4 is a schematic diagram of a file decryption apparatus according to an embodiment of the present invention, which is only illustrated in fig. 4, and the embodiment of the present invention is not limited thereto. Fig. 4 is a schematic structural diagram of a file decryption apparatus according to an embodiment of the present invention. As shown in fig. 4, the file decryption apparatus 40 provided in this embodiment may include: an acquisition module 401, a first determination module 402, a second determination module 404, and a decryption module 404.
The acquiring module 401 is configured to acquire image data in real time through an image acquisition device.
A first determining module 402, configured to determine facial image features according to the image data.
A second determination module 403 that determines at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data.
And a decryption module 404, configured to decrypt the encrypted file according to the determined facial image features and the determined at least one of facial movements, facial movement sequences, expression information, and gesture information.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Optionally, the second determining module 403 may specifically be configured to:
at least one of facial motion, facial motion sequence, expression information, and gesture information is determined according to the image data and a file type of the encrypted file.
Optionally, the second determining module 403 may specifically be configured to:
at least one of facial motion, a sequence of facial motion, expression information, and gesture information is determined based on the image data and the encryption time information of the encrypted file.
Optionally, the decryption module 404 may be specifically configured to:
determining a decryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information;
and decrypting the encrypted file by adopting a preset decryption algorithm according to the decryption key.
Optionally, the file decryption apparatus 40 may further include a sending module and a receiving module, wherein the sending module is configured to send a decryption request message to the encryptor when decryption fails; the receiving module is used for receiving the image data sent by the encryptor; the decryption module 404 may be specifically configured to decrypt the encrypted file according to the image data.
Fig. 5 is a schematic view showing an electronic device according to an embodiment of the present invention, which is only illustrated in fig. 5, and the embodiment of the present invention is not limited thereto. Fig. 5 is a schematic structural diagram of an embodiment of an electronic device provided in the present invention. The electronic device may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc. As shown in fig. 5, the electronic device provided in this embodiment may include one or more of the following components: processing component 501, memory 502, power component 504, multimedia component 506, audio component 503, input/output (I/O) interface 508, sensor component 507, and communication component 505.
The processing component 501 generally controls the overall operation of the electronic device, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 501 may include one or more processors 5011 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 501 may include one or more modules that facilitate interaction between the processing component 501 and other components. For example, the processing component 501 may include a multimedia module to facilitate interaction between the multimedia component 506 and the processing component 501.
The memory 502 is configured to store various types of data to support operations at the electronic device. Examples of such data include instructions for any application or method operating on the electronic device, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 502 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks. In this embodiment, a computer program is stored in the memory 502, and the computer program can be executed by the processor 5011 to implement the technical solution of the method embodiment corresponding to fig. 1 or fig. 2.
The power supply component 504 provides power to the various components of the electronic device. The power components 504 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for an electronic device.
The multimedia component 506 includes a screen that provides an output interface between the electronic device and a user, in some embodiments, the screen may include a liquid crystal display (L CD) and a Touch Panel (TP). if the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
The audio component 503 is configured to output and/or input audio signals. For example, the audio component 503 includes a Microphone (MIC) configured to receive external audio signals when the electronic device is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 502 or transmitted via the communication component 505. In this embodiment, a voice signal of the user performing voice control on the electronic device may be collected by the microphone, and then sent to the cloud server via the communication component 505. In some embodiments, the audio component 503 further includes a speaker for outputting audio signals. In this embodiment, the prompt information for the user may be played through the speaker.
The I/O interface 508 provides an interface between the processing component 501 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 507 includes one or more sensors for providing various aspects of status assessment for the electronic device. For example, the sensor component 507 may detect an open/closed state of the electronic device, the relative positioning of components, such as a display and keypad of the electronic device, the sensor component 507 may also detect a change in the position of the electronic device or a component of the electronic device, the presence or absence of user contact with the electronic device, orientation or acceleration/deceleration of the electronic device, and a change in the temperature of the electronic device. The sensor assembly 507 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 507 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 507 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 505 is configured to facilitate wired or wireless communication between the electronic device and other devices. In this embodiment, the communication component 505 is configured to implement interaction between an electronic device and a cloud server. The electronic device may access a wireless network based on a communication standard, such as WiFi, 2G, 3G, or 4G, or a combination thereof. In an exemplary embodiment, the communication component 505 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 505 further comprises a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), programmable logic devices (P L D), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 502 comprising instructions, executable by the processor 5011 of the electronic device to perform the above method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The electronic device provided in this embodiment may be used to execute the technical solution of the method embodiment corresponding to fig. 1 or fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, can implement the file encryption method or the file decryption method provided in any of the above method embodiments. The computer-readable storage medium in this embodiment may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, etc. that is integrated with one or more available media, and the available media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., DVDs), or semiconductor media (e.g., SSDs), etc.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (14)

1. A method for encrypting a file, comprising:
acquiring image data;
determining facial image characteristics according to the image data;
determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and encrypting the file to be encrypted according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information.
2. The method of claim 1, wherein the acquiring image data comprises:
acquiring preset image data; alternatively, the first and second electrodes may be,
and acquiring image data in real time through an image acquisition device.
3. The method of claim 1, wherein determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data comprises:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the file type of the file to be encrypted.
4. The method of claim 1, wherein determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data comprises:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the time information.
5. The method according to any one of claims 1 to 4, wherein the encrypting the file to be encrypted according to the determined facial image features and the determined at least one of facial movements, facial movement sequences, expression information and gesture information comprises:
determining an encryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information;
and encrypting the file to be encrypted by adopting a preset encryption algorithm according to the encryption key.
6. A method for decrypting a file, comprising:
acquiring image data in real time through an image acquisition device;
determining facial image characteristics according to the image data;
determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and decrypting the encrypted file according to the determined facial image characteristics and at least one of the determined facial action, the facial action sequence, the expression information and the gesture information.
7. The method of claim 6, wherein determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data comprises:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the file type of the encrypted file.
8. The method of claim 6, wherein determining at least one of facial motion, facial motion sequence, expression information, and gesture information from the image data comprises:
and determining at least one of facial motion, facial motion sequence, expression information and gesture information according to the image data and the encryption time information of the encrypted file.
9. The method of claim 6, wherein decrypting the encrypted file based on the determined facial image characteristics and the determined at least one of facial movements, facial movement sequences, facial expression information, and gesture information comprises:
determining a decryption key according to the determined facial image characteristics and at least one of the determined facial motion, facial motion sequence, expression information and gesture information;
and decrypting the encrypted file by adopting a preset decryption algorithm according to the decryption key.
10. The method of any of claims 6-9, wherein if decryption fails, the method further comprises:
sending a decryption request message to the encryptor;
receiving image data sent by the encryptor;
and decrypting the encrypted file according to the image data.
11. A file encryption apparatus, comprising:
the acquisition module is used for acquiring image data;
the first determining module is used for determining the facial image characteristics according to the image data;
a second determination module for determining at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and the encryption module is used for encrypting the file to be encrypted according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information.
12. A file decryption apparatus, comprising:
the acquisition module is used for acquiring image data in real time through the image acquisition device;
the first determining module is used for determining the facial image characteristics according to the image data;
a second determination module that determines at least one of facial movements, facial movement sequences, expression information, and gesture information from the image data;
and the decryption module is used for decrypting the encrypted file according to the determined facial image characteristics and at least one of the determined facial action, the determined facial action sequence, the determined expression information and the determined gesture information.
13. An electronic device, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the file encryption method of any one of claims 1 to 5 or the file decryption method of any one of claims 6 to 10.
14. A computer-readable storage medium, having stored thereon a computer program which is executed by a processor to implement the file encryption method according to any one of claims 1 to 5 or the file decryption method according to any one of claims 6 to 10.
CN201910012806.5A 2019-01-07 2019-01-07 File encryption and decryption method, device and equipment Active CN111414639B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910012806.5A CN111414639B (en) 2019-01-07 2019-01-07 File encryption and decryption method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910012806.5A CN111414639B (en) 2019-01-07 2019-01-07 File encryption and decryption method, device and equipment

Publications (2)

Publication Number Publication Date
CN111414639A true CN111414639A (en) 2020-07-14
CN111414639B CN111414639B (en) 2023-08-08

Family

ID=71492609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910012806.5A Active CN111414639B (en) 2019-01-07 2019-01-07 File encryption and decryption method, device and equipment

Country Status (1)

Country Link
CN (1) CN111414639B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114282882A (en) * 2021-11-15 2022-04-05 深圳市东信时代信息技术有限公司 Material work order auditing method, device and equipment and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040081020A1 (en) * 2002-10-23 2004-04-29 Blosser Robert L. Sonic identification system and method
CN101221612A (en) * 2007-01-11 2008-07-16 上海银晨智能识别科技有限公司 Method for enciphering and deciphering electric document file by face recognition
CN101706874A (en) * 2009-12-25 2010-05-12 青岛朗讯科技通讯设备有限公司 Method for face detection based on features of skin colors
CN101976321A (en) * 2010-09-21 2011-02-16 北京工业大学 Generated encrypting method based on face feature key
CN103282925A (en) * 2010-12-22 2013-09-04 英特尔公司 A system and method to protect user privacy in multimedia uploaded to internet sites
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
US20140032924A1 (en) * 2012-07-30 2014-01-30 David M. Durham Media encryption based on biometric data
CN103699223A (en) * 2013-12-11 2014-04-02 北京智谷睿拓技术服务有限公司 Control method and equipment based on gestures
CN104346727A (en) * 2013-07-25 2015-02-11 信帧电子技术(北京)有限公司 Handset authentication payment system and method based on human natural characteristic matching
CN105337742A (en) * 2015-11-18 2016-02-17 哈尔滨工业大学 LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
CN107465513A (en) * 2017-08-09 2017-12-12 西南大学 A kind of file encrypting method and system based on recognition of face
CN107810639A (en) * 2015-06-26 2018-03-16 乐威指南公司 The system and method for image based on user profiles automatically formatting media asset
US20180191501A1 (en) * 2016-12-31 2018-07-05 Nok Nok Labs, Inc. System and method for sharing keys across authenticators

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040081020A1 (en) * 2002-10-23 2004-04-29 Blosser Robert L. Sonic identification system and method
CN101221612A (en) * 2007-01-11 2008-07-16 上海银晨智能识别科技有限公司 Method for enciphering and deciphering electric document file by face recognition
CN101706874A (en) * 2009-12-25 2010-05-12 青岛朗讯科技通讯设备有限公司 Method for face detection based on features of skin colors
CN101976321A (en) * 2010-09-21 2011-02-16 北京工业大学 Generated encrypting method based on face feature key
CN103282925A (en) * 2010-12-22 2013-09-04 英特尔公司 A system and method to protect user privacy in multimedia uploaded to internet sites
US20140032924A1 (en) * 2012-07-30 2014-01-30 David M. Durham Media encryption based on biometric data
CN104346727A (en) * 2013-07-25 2015-02-11 信帧电子技术(北京)有限公司 Handset authentication payment system and method based on human natural characteristic matching
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system
CN103699223A (en) * 2013-12-11 2014-04-02 北京智谷睿拓技术服务有限公司 Control method and equipment based on gestures
CN107810639A (en) * 2015-06-26 2018-03-16 乐威指南公司 The system and method for image based on user profiles automatically formatting media asset
CN105337742A (en) * 2015-11-18 2016-02-17 哈尔滨工业大学 LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Key generation method and device
US20180191501A1 (en) * 2016-12-31 2018-07-05 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
CN107465513A (en) * 2017-08-09 2017-12-12 西南大学 A kind of file encrypting method and system based on recognition of face

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHONGZHEN ZHANG: "Face shape extraction and recognition using 3D morphing and distance mapping", PROCEEDINGS FOURTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION *
唐守军: "基于人脸识别和密码认证的文件夹加密方法", 现代电子技术, vol. 39, no. 3 *
李霖西: "基于Android平台的网络口令管家的设计与实现", 电脑与信息技术, vol. 24, no. 1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114282882A (en) * 2021-11-15 2022-04-05 深圳市东信时代信息技术有限公司 Material work order auditing method, device and equipment and storage medium

Also Published As

Publication number Publication date
CN111414639B (en) 2023-08-08

Similar Documents

Publication Publication Date Title
US9614842B2 (en) Device and method of setting or removing security on content
EP3236629A1 (en) Method and apparatus for processing surveillance video
CN103916233A (en) Information encryption method and device
CN105407098A (en) Identity verification method and device
CN103914520B (en) Data query method, terminal device and server
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN103914541B (en) The method and device of information search
CN104168277A (en) File security maintaining method and device
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
US20220382884A1 (en) Method and device for parsing shared password
CN107147815B (en) Call processing method and device based on taxi taking
CN105306716A (en) Data processing method, device and system
CN106372517A (en) File encryption method, file decryption method, file encryption device and equipment
CN103945275A (en) Picture recording control method and device and mobile terminal
CN111368232A (en) Password sharing reflux method and device, electronic equipment and storage medium
US20220294624A1 (en) Encryption method and device, electronic apparatus and storage medium
CN109219003B (en) Information encryption method and device, storage medium and electronic equipment
CN115333813A (en) Data encryption transmission method and device, electronic equipment and storage medium
CN104182697B (en) File encrypting method and device
CN109450894A (en) Information interacting method, device, system, server user's terminal and storage medium
CN111414639B (en) File encryption and decryption method, device and equipment
CN105046127A (en) Encryption and decryption method and apparatus
CN109800583B (en) Electronic device comprising a display and method of encrypting information
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN114124462B (en) Verification code transmission method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant