CN111814159B - Picture viewing method, device and system - Google Patents

Picture viewing method, device and system Download PDF

Info

Publication number
CN111814159B
CN111814159B CN202010545766.3A CN202010545766A CN111814159B CN 111814159 B CN111814159 B CN 111814159B CN 202010545766 A CN202010545766 A CN 202010545766A CN 111814159 B CN111814159 B CN 111814159B
Authority
CN
China
Prior art keywords
picture
target picture
encrypted
target
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010545766.3A
Other languages
Chinese (zh)
Other versions
CN111814159A (en
Inventor
倪培超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongtongji Network Technology Co Ltd
Original Assignee
Shanghai Zhongtongji Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhongtongji Network Technology Co Ltd filed Critical Shanghai Zhongtongji Network Technology Co Ltd
Priority to CN202010545766.3A priority Critical patent/CN111814159B/en
Publication of CN111814159A publication Critical patent/CN111814159A/en
Application granted granted Critical
Publication of CN111814159B publication Critical patent/CN111814159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/5866Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to a picture viewing method, a picture viewing device and a picture viewing system, which are used for acquiring a target picture identifier of a target picture; detecting whether a target picture identifier exists in an encryption database; if the target picture exists, decrypting the encrypted picture associated with the target picture identifier in the encrypted database by using a preset encryption and decryption rule to obtain the target picture; if the target picture does not exist, acquiring the target picture through the server; encrypting the target picture by utilizing encryption and decryption rules to obtain an encrypted picture; associating the encrypted picture with the target picture identifier, and storing the encrypted picture and the target picture identifier into an encrypted database; and displaying the target picture. By adopting the technical scheme, the accessed picture can be encrypted and cached in the local database, and the picture can be directly obtained from the local database when being accessed again without obtaining the picture from a server, so that the load of the server can be reduced, the network request can be reduced, the influence of the network environment on the picture viewing is reduced, and the user experience is improved.

Description

Picture viewing method, device and system
Technical Field
The present invention relates to the field of image processing technologies, and in particular, to a method, an apparatus, and a system for viewing a picture.
Background
In recent years, the concept of 'big data' suddenly explodes, and the security of network data accompanying the big data is increasingly highlighted, wherein the security of network pictures is also valued by enterprises.
The more common method is that the picture is privately encrypted, the picture link loaded by the front end every time is returned by the back end encryption, and the link is disabled after being accessed again. The method can effectively solve the potential safety hazard of data caused by picture sharing and spreading again.
However, after the pictures are privately encrypted, the front end needs to pull the pictures to the server in real time every time, the user experience is greatly influenced by the network environment, and the same picture is pulled from the server for multiple times, so that the load of the server is increased, and the resource waste is caused.
Disclosure of Invention
In view of the above, the present invention aims to provide a method, an apparatus and a system for viewing a picture, so as to solve the problems in the prior art that the front end needs to pull the server in real time every time when loading the picture, the user experience is greatly affected by the network environment, and the same picture is pulled from the server for multiple times, so that the load of the server is increased, and resource waste is caused.
In order to achieve the above purpose, the invention adopts the following technical scheme:
a picture viewing method, comprising:
acquiring a target picture identifier of a target picture;
detecting whether the target picture identification exists in a preset encryption database;
if the target picture identifier exists in the encryption database, decrypting the encrypted picture associated with the target picture identifier in the encryption database by utilizing a preset encryption and decryption rule to obtain the target picture;
if the target picture identification does not exist in the encryption database, acquiring the target picture through a server;
encrypting the target picture by using the encryption and decryption rule to obtain the encrypted picture;
associating the encrypted picture with the target picture identification and storing the encrypted picture and the target picture identification in the encrypted database;
and displaying the target picture.
Further, in the above method for viewing a picture, the obtaining, by the server, the target picture includes:
sending a picture access request carrying the target picture identifier to the server so that the server returns a picture link address corresponding to the target picture identifier;
and acquiring the target picture through the picture link address.
Further, in the above picture viewing method, before detecting whether the target picture identifier exists in the preset encryption database, the method further includes:
acquiring user authentication information input by a current user and viewing authority information corresponding to the target picture identification;
verifying the user authentication information according to the viewing authority information, and judging whether the current user has the viewing authority or not;
correspondingly, the detecting whether the target picture identifier exists in the preset encryption database includes:
and if the current user has the viewing authority, detecting whether the target picture identifier exists in a preset encryption database.
Further, in the above-mentioned picture viewing method, the displaying the target picture includes:
acquiring current display parameters;
processing the target picture according to the current display parameters and displaying the processed target picture;
the current display parameters include: and automatically displaying parameters and/or manually displaying parameters input by the current user.
Further, in the above-mentioned picture viewing method, the encryption and decryption rule is set based on node. Js technology.
The invention also provides a picture viewing device, comprising:
the first acquisition module is used for acquiring a target picture identifier of a target picture;
the detection module is used for detecting whether the target picture identifier exists in a preset encryption database;
the decryption module is used for decrypting the encrypted picture associated with the target picture identifier in the encrypted database by utilizing a preset encryption and decryption rule if the target picture identifier exists in the encrypted database, so as to obtain the target picture;
the second acquisition module is used for acquiring the target picture through a server if the target picture identifier does not exist in the encryption database;
the encryption module is used for encrypting the target picture by utilizing the encryption and decryption rule to obtain the encrypted picture;
the association storage module is used for associating the encrypted picture with the target picture identification and storing the encrypted picture and the target picture identification into the encrypted database;
and the display module is used for displaying the target picture.
Further, in the above-mentioned picture viewing device, the second obtaining module includes: a request sending unit and a picture obtaining unit;
the request sending unit is used for sending a picture access request carrying the target picture identifier to the server so that the server returns a picture link address corresponding to the target picture identifier;
the picture obtaining unit is used for obtaining the target picture through the picture link address.
Further, the above-mentioned picture viewing device further includes: a verification module;
the first acquisition module is used for acquiring user authentication information input by a current user and viewing authority information corresponding to the target picture identification;
the verification module is used for verifying the user authentication information according to the viewing authority information and judging whether the current user has viewing authority or not;
the detection module is specifically configured to detect whether the target picture identifier exists in a preset encrypted database if the current user has viewing authority.
Further, in the above-mentioned picture viewing device, the display module includes: a parameter acquisition unit and a picture processing unit;
the parameter acquisition unit is used for acquiring current display parameters; the current display parameters include: automatically displaying parameters and/or manually displaying parameters input by the current user;
and the picture processing unit is used for processing the target picture according to the current display parameter and displaying the processed target picture.
The invention also provides a picture viewing system, comprising: a processor and a memory coupled to the processor;
the memory is used for storing a computer program at least for executing the picture viewing method of any one of claims 1-5;
the processor is used for calling and executing the computer program.
A picture viewing method, device and system, obtain the target picture identification of the target picture; detecting whether a target picture identifier exists in a preset encryption database; if the target picture exists, decrypting the encrypted picture associated with the target picture identifier in the encrypted database by using a preset encryption and decryption rule to obtain the target picture; if the target picture does not exist, acquiring the target picture through the server; encrypting the target picture by utilizing encryption and decryption rules to obtain an encrypted picture; associating the encrypted picture with the target picture identification, and storing the encrypted picture and the target picture identification in an encrypted database; and displaying the target picture. By adopting the technical scheme, the accessed picture can be encrypted and cached in the local database, and the picture can be directly obtained from the local database when being accessed again without obtaining the picture from a server, so that the load of the server can be reduced, the network request can be reduced, the influence of the network environment on the picture viewing is reduced, and the user experience is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart provided by one embodiment of a picture viewing method of the present invention;
FIG. 2 is a schematic diagram of a structure provided by an embodiment of a picture viewing device of the present invention;
fig. 3 is a schematic diagram of a picture viewing system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, based on the examples herein, which are within the scope of the invention as defined by the claims, will be within the scope of the invention as defined by the claims.
Fig. 1 is a flowchart provided by an embodiment of a picture viewing method of the present invention, as shown in fig. 1, where the picture viewing method of the present embodiment specifically includes the following steps:
s101, acquiring a target picture identifier of a target picture;
in this embodiment, if a user wants to view a certain picture, the front-end device takes the picture as a target picture and obtains a target picture identifier of the target picture. The front-end equipment can be a computer, a mobile phone and other equipment.
S102, detecting whether a target picture identifier exists in a preset encryption database;
the front-end equipment is preset with an encryption database which is used for storing the encrypted pictures which are cached from the server and encrypted and the identifiers corresponding to the pictures. After the front-end equipment acquires the target picture identifier, whether the target picture identifier exists in a preset encryption database or not needs to be detected.
S103, if the target picture identifier exists in the encryption database, decrypting the encrypted picture associated with the target picture identifier in the encryption database by utilizing a preset encryption and decryption rule to obtain the target picture;
if the target picture identification exists in the encryption database, the front-end equipment is not used for checking the target picture for the first time, so that the encryption and decryption rule set in advance can be utilized to directly decrypt the encrypted picture associated with the target picture identification in the encryption database, and the target picture corresponding to the target picture identification is obtained. When the encryption and decryption rule is set, the encryption and decryption rule can be set based on the node. Js technology, and compared with the pure javascript technology, the node. Js technology has higher picture processing speed, and in general, the picture processing speed can be improved by 5 times.
S104, if the target picture identification does not exist in the encryption database, acquiring a target picture through the server;
if the target picture identification is detected to be not in the encryption database, the front-end equipment is stated to be for viewing the target picture for the first time, and therefore the target picture needs to be acquired through the server. The specific steps for acquiring the target picture through the server are as follows:
firstly, sending a picture access request carrying a target picture identifier to a server so that the server returns a picture link address corresponding to the target picture identifier;
the front-end equipment needs to send a picture access request to the server, and the picture access request needs to carry a target picture identifier so that the server feeds back a picture link address corresponding to the target picture identifier to the front-end equipment.
And secondly, acquiring the target picture through the picture link address.
And after receiving the picture link address fed back by the server, the front-end equipment directly accesses the target picture corresponding to the target picture identifier by using the picture link address.
S105, encrypting the target picture by utilizing encryption and decryption rules to obtain an encrypted picture;
after the front-end equipment acquires the target picture from the server, the target picture is encrypted by utilizing an encryption and decryption rule, so that the encrypted picture is obtained.
S106, associating the encrypted picture with the target picture identification, and storing the encrypted picture and the target picture identification into an encrypted database;
after the front-end equipment obtains the encrypted picture, the encrypted picture and the target picture identification corresponding to the encrypted picture before encryption are required to be associated, and the associated encrypted picture and the target picture identification are stored in an encrypted database. The accessed picture is encrypted and cached in the encrypted database, and the picture is directly obtained from the encrypted database in the front-end equipment when the picture is accessed again, so that the picture is not required to be obtained from a server, the load of the server can be reduced, the network request can be reduced, the influence of the network environment on the picture viewing is reduced, and the user experience is improved.
And S107, displaying the target picture.
After the target picture is obtained through step S103 or step S104, the front-end device displays the target picture for the user to view. The specific steps for displaying the target picture are as follows:
firstly, acquiring current display parameters;
if the front-end equipment needs to display the target picture, the target picture can be displayed according to the corresponding display parameters. Thus, the front-end device needs to obtain current display parameters, where the current display parameters include: the automatic display parameters and/or the manual display parameters currently entered by the user. The automatic display parameters are display parameters matched with the front-end equipment, such as the size of a display screen, the definition of the display screen, the resolution of the display screen and the like of the front-end equipment. The user may also input custom display parameters as manual display parameters, such as sharpness, size, etc. when he wants to view a picture.
Secondly, processing the target picture according to the current display parameters and displaying the processed target picture;
after the front-end equipment acquires the current display parameters, processing the target picture according to the current display parameters, and displaying the processed target picture for the user to check. Therefore, the target picture can be displayed according to the model size of the front-end equipment and the preference of the user, and the user experience is improved.
The present embodiment is not limited to the execution sequence between step S107 and steps S105 to S106, and step S107 may be executed first, and then steps S105 to S106 may be executed. Steps S105 to S106 may be performed first, and step S107 may be performed later.
According to the picture viewing method, a target picture identifier of a target picture is obtained; detecting whether a target picture identifier exists in a preset encryption database; if the target picture exists, decrypting the encrypted picture associated with the target picture identifier in the encrypted database by using a preset encryption and decryption rule to obtain the target picture; if the target picture does not exist, acquiring the target picture through the server; encrypting the target picture by utilizing encryption and decryption rules to obtain an encrypted picture; associating the encrypted picture with the target picture identification, and storing the encrypted picture and the target picture identification in an encrypted database; and displaying the target picture. By adopting the technical scheme, the accessed picture can be encrypted and cached in the local database, and the picture can be directly obtained from the local database when being accessed again without obtaining the picture from a server, so that the load of the server can be reduced, the network request can be reduced, the influence of the network environment on the picture viewing is reduced, and the user experience is improved.
Further, before detecting whether the target picture identifier exists in the preset encryption database, the method further comprises the following steps:
firstly, acquiring user authentication information input by a current user and viewing authority information corresponding to a target picture identifier;
in order to ensure the security of the network picture, the current user verifies the authority of the current user before accessing the target picture. The front-end equipment needs to acquire user authentication information input by the current user and viewing authority information corresponding to the target picture identification. The user authentication information can comprise user information or account passwords and the like; the viewing authority information may include all user information having viewing authority, and the like.
Secondly, verifying the user authentication information according to the viewing authority information, and judging whether the current user has the viewing authority.
And verifying the user authentication information according to the viewing authority information, for example, verifying whether the current user authentication information is matched with the viewing authority information, namely, whether the viewing authority information comprises the same information as the user authentication information. According to the verification of the user authentication information, whether the current user has the viewing authority can be judged. If the current user is judged to have the viewing authority, continuing to execute the step of detecting whether the target picture identifier exists in the preset encryption database. If the current user is judged not to have the viewing authority, the user can be prompted to have no authority or the user can be prompted to acquire the authority. Thus, the security of network picture viewing can be improved.
In order to be more comprehensive, the application also provides a picture viewing device corresponding to the picture viewing method provided by the embodiment of the invention.
Fig. 2 is a schematic structural diagram provided by an embodiment of a picture viewing device according to the present invention, as shown in fig. 2, the picture viewing device of the present embodiment includes: the device comprises a first acquisition module 11, a detection module 12, a decryption module 13, a second acquisition module 14, an encryption module 15, an association storage module 16 and a display module 17.
A first obtaining module 11, configured to obtain a target picture identifier of a target picture;
the detection module 12 is used for detecting whether a target picture identifier exists in a preset encryption database;
the decryption module 13 is configured to decrypt, if the target picture identifier exists in the encryption database, the encrypted picture associated with the target picture identifier in the encryption database by using a preset encryption and decryption rule, so as to obtain the target picture;
the second obtaining module 14 is configured to obtain the target picture through the server if the target picture identifier does not exist in the encryption database;
the encryption module 15 is configured to encrypt the target picture by using encryption and decryption rules to obtain an encrypted picture;
an association storage module 16, configured to associate the encrypted picture with the target picture identifier, and store the encrypted picture and the target picture identifier in an encrypted database;
and the display module 17 is used for displaying the target picture.
In the picture viewing device of the present embodiment, the first obtaining module 11 obtains a target picture identifier of a target picture; the detection module 12 detects whether a target picture identifier exists in a preset encryption database; if the target picture exists, the decryption module 13 decrypts the encrypted picture associated with the target picture identifier in the encrypted database by utilizing a preset encryption and decryption rule to obtain the target picture; if not, the second obtaining module 14 obtains the target picture through the server; the encryption module 15 encrypts the target picture by using encryption and decryption rules to obtain an encrypted picture; the association storage module 16 associates the encrypted picture with the target picture identification and stores the encrypted picture and the target picture identification in the encrypted database; the display module 17 displays the target picture. By adopting the technical scheme, the accessed picture can be encrypted and cached in the local database, and the picture can be directly obtained from the local database when being accessed again without obtaining the picture from a server, so that the load of the server can be reduced, the network request can be reduced, the influence of the network environment on the picture viewing is reduced, and the user experience is improved.
Further, in the picture viewing apparatus of the present embodiment, the second obtaining module 14 includes: a request transmitting unit and a picture acquiring unit.
The request sending unit is used for sending a picture access request carrying a target picture identifier to the server so that the server returns a picture link address corresponding to the target picture identifier;
and the picture acquisition unit is used for acquiring the target picture through the picture link address.
Further, the picture viewing device of the embodiment further includes a verification module.
The first obtaining module 11 is configured to obtain user authentication information input by a current user and viewing authority information corresponding to a target picture identifier;
the verification module is used for verifying the user authentication information according to the viewing authority information and judging whether the current user has the viewing authority or not;
the detection module 12 is specifically configured to detect whether a target picture identifier exists in a preset encrypted database if the current user has viewing authority.
Further, in the picture viewing apparatus of the present embodiment, the display module 17 includes: a parameter acquisition unit and a picture processing unit.
The parameter acquisition unit is used for acquiring current display parameters; the current display parameters include: automatic display parameters and/or manual display parameters entered by a current user;
and the picture processing unit is used for processing the target picture according to the current display parameters and displaying the processed target picture.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 3 is a schematic structural diagram provided by an embodiment of a picture viewing system of the present invention, where the picture viewing system includes: a processor 22 and a memory 21 connected to the processor 22;
the memory 21 is used for storing a computer program for executing at least the picture viewing method described in the above embodiment;
the processor 22 is used to invoke and execute the computer program stored in the memory 21.
In the picture viewing system of the present embodiment, the processor 22 obtains the target picture identifier of the target picture; detecting whether a target picture identifier exists in a preset encryption database; if the target picture exists, decrypting the encrypted picture associated with the target picture identifier in the encrypted database by using a preset encryption and decryption rule to obtain the target picture; if the target picture does not exist, acquiring the target picture through the server; encrypting the target picture by utilizing encryption and decryption rules to obtain an encrypted picture; associating the encrypted picture with the target picture identification, and storing the encrypted picture and the target picture identification in an encrypted database; and displaying the target picture. By adopting the technical scheme, the accessed picture can be encrypted and cached in the local database, and the picture can be directly obtained from the local database when being accessed again without obtaining the picture from a server, so that the load of the server can be reduced, the network request can be reduced, the influence of the network environment on the picture viewing is reduced, and the user experience is improved.
It is to be understood that the same or similar parts in the above embodiments may be referred to each other, and that in some embodiments, the same or similar parts in other embodiments may be referred to.
It should be noted that in the description of the present invention, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Furthermore, in the description of the present invention, unless otherwise indicated, the meaning of "plurality" means at least two.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
Those of ordinary skill in the art will appreciate that all or a portion of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, and the program may be stored in a computer readable storage medium, where the program when executed includes one or a combination of the steps of the method embodiments.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, or the like.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.

Claims (6)

1. A picture viewing method, comprising:
acquiring a target picture identifier of a target picture;
detecting whether the target picture identification exists in a preset encryption database;
if the target picture identifier exists in the encryption database, decrypting the encrypted picture associated with the target picture identifier in the encryption database by utilizing a preset encryption and decryption rule to obtain the target picture;
if the target picture identification does not exist in the encryption database, acquiring the target picture through a server;
encrypting the target picture by using the encryption and decryption rule to obtain the encrypted picture;
associating the encrypted picture with the target picture identification and storing the encrypted picture and the target picture identification in the encrypted database;
displaying the target picture;
the obtaining, by the server, the target picture includes:
sending a picture access request carrying the target picture identifier to the server so that the server returns a picture link address corresponding to the target picture identifier;
acquiring the target picture through the picture link address;
before detecting whether the target picture identifier exists in the preset encryption database, the method further comprises the following steps:
acquiring user authentication information input by a current user and viewing authority information corresponding to the target picture identification;
verifying the user authentication information according to the viewing authority information, and judging whether the current user has the viewing authority or not;
correspondingly, the detecting whether the target picture identifier exists in the preset encryption database includes:
and if the current user has the viewing authority, detecting whether the target picture identifier exists in a preset encryption database.
2. The picture viewing method according to claim 1, wherein the displaying the target picture includes:
acquiring current display parameters;
processing the target picture according to the current display parameters and displaying the processed target picture;
the current display parameters include: and automatically displaying parameters and/or manually displaying parameters input by the current user.
3. The picture viewing method according to claim 1, wherein the encryption and decryption rule is set based on a node. Js technology.
4. A picture viewing device, comprising:
the first acquisition module is used for acquiring a target picture identifier of a target picture;
the detection module is used for detecting whether the target picture identifier exists in a preset encryption database;
the decryption module is used for decrypting the encrypted picture associated with the target picture identifier in the encrypted database by utilizing a preset encryption and decryption rule if the target picture identifier exists in the encrypted database, so as to obtain the target picture;
the second acquisition module is used for acquiring the target picture through a server if the target picture identifier does not exist in the encryption database;
the encryption module is used for encrypting the target picture by utilizing the encryption and decryption rule to obtain the encrypted picture;
the association storage module is used for associating the encrypted picture with the target picture identification and storing the encrypted picture and the target picture identification into the encrypted database;
the display module is used for displaying the target picture;
the second acquisition module includes: a request sending unit and a picture obtaining unit;
the request sending unit is used for sending a picture access request carrying the target picture identifier to the server so that the server returns a picture link address corresponding to the target picture identifier;
the picture obtaining unit is used for obtaining the target picture through the picture link address;
further comprises: a verification module;
the first acquisition module is used for acquiring user authentication information input by a current user and viewing authority information corresponding to the target picture identification;
the verification module is used for verifying the user authentication information according to the viewing authority information and judging whether the current user has viewing authority or not;
the detection module is specifically configured to detect whether the target picture identifier exists in a preset encrypted database if the current user has viewing authority.
5. The picture viewing device of claim 4, wherein the display module comprises: a parameter acquisition unit and a picture processing unit;
the parameter acquisition unit is used for acquiring current display parameters; the current display parameters include: automatically displaying parameters and/or manually displaying parameters input by the current user;
and the picture processing unit is used for processing the target picture according to the current display parameter and displaying the processed target picture.
6. A picture viewing system, comprising: a processor and a memory coupled to the processor;
the memory is used for storing a computer program at least for executing the picture viewing method of any one of claims 1-3;
the processor is used for calling and executing the computer program.
CN202010545766.3A 2020-06-16 2020-06-16 Picture viewing method, device and system Active CN111814159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010545766.3A CN111814159B (en) 2020-06-16 2020-06-16 Picture viewing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010545766.3A CN111814159B (en) 2020-06-16 2020-06-16 Picture viewing method, device and system

Publications (2)

Publication Number Publication Date
CN111814159A CN111814159A (en) 2020-10-23
CN111814159B true CN111814159B (en) 2023-06-13

Family

ID=72845070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010545766.3A Active CN111814159B (en) 2020-06-16 2020-06-16 Picture viewing method, device and system

Country Status (1)

Country Link
CN (1) CN111814159B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018072261A1 (en) * 2016-10-20 2018-04-26 宇龙计算机通信科技(深圳)有限公司 Information encryption method and device, information decryption method and device, and terminal
CN109740366A (en) * 2019-01-03 2019-05-10 深圳壹账通智能科技有限公司 Image Management method, apparatus, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9129107B2 (en) * 2011-02-10 2015-09-08 SecurenCrypt, LLC Document encryption and decryption
CN103617165B (en) * 2013-10-22 2017-02-15 小米科技有限责任公司 Picture loading method, device and terminal
CN105357325B (en) * 2015-12-15 2018-11-27 北京金山安全软件有限公司 Cloud picture loading method and device and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018072261A1 (en) * 2016-10-20 2018-04-26 宇龙计算机通信科技(深圳)有限公司 Information encryption method and device, information decryption method and device, and terminal
CN109740366A (en) * 2019-01-03 2019-05-10 深圳壹账通智能科技有限公司 Image Management method, apparatus, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111814159A (en) 2020-10-23

Similar Documents

Publication Publication Date Title
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
JP6814147B2 (en) Terminals, methods, non-volatile storage media
US8595497B2 (en) Electronic file sending method
US10346634B2 (en) Obscuring and deleting information from a messaging account
EP3659058B1 (en) Devices and methods for key attestation with multiple device certificates
US20120005475A1 (en) Terminal Device, Computer Program Product, and Communication Control Method
CN105490711A (en) Bluetooth automatic connection method, master device, slave device, and system
EP3176719B1 (en) Methods and devices for acquiring certification document
CN113067817B (en) Equipment activation method and device
US20130227681A1 (en) System, apparatus, and method for verifying augmented reality service
CN111339508A (en) Shared password analysis method and device, electronic equipment and storage medium
KR101634531B1 (en) Device and method for preventing information from being leakage by screen capture in video output apparatus
KR20160131886A (en) Terminal device and method for protecting information thereof
WO2019134276A1 (en) Method and system for protecting web page code, storage medium, and electronic device
CN110753257A (en) Data display method, display terminal, server, display system, and storage medium
CN109255249B (en) Image generation method, image generation apparatus, image display method, image display apparatus, and storage medium
CN113656713B (en) Network resource processing method, device and system
CN111241523A (en) Authentication processing method, device, equipment and storage medium
US10218505B1 (en) Server based settings for client software with asymmetric signing
CN111814159B (en) Picture viewing method, device and system
CN110602700B (en) Seed key processing method and device and electronic equipment
CN112565003A (en) Communication data testing method and device, storage medium and electronic equipment
CN111832458A (en) Anti-theft method and system
CN111461955A (en) Method and device for automatically increasing digital blind watermark in screenshot, electronic equipment and storage medium
CN107566354B (en) Webpage content detection method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant