TWI667591B - Method for safely transferring pictures - Google Patents

Method for safely transferring pictures Download PDF

Info

Publication number
TWI667591B
TWI667591B TW107128317A TW107128317A TWI667591B TW I667591 B TWI667591 B TW I667591B TW 107128317 A TW107128317 A TW 107128317A TW 107128317 A TW107128317 A TW 107128317A TW I667591 B TWI667591 B TW I667591B
Authority
TW
Taiwan
Prior art keywords
terminal device
image file
original image
communication server
encrypted
Prior art date
Application number
TW107128317A
Other languages
Chinese (zh)
Other versions
TW202009774A (en
Inventor
潘人豪
陳村銘
吳憲
Original Assignee
秘傳應用資訊有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 秘傳應用資訊有限公司 filed Critical 秘傳應用資訊有限公司
Priority to TW107128317A priority Critical patent/TWI667591B/en
Application granted granted Critical
Publication of TWI667591B publication Critical patent/TWI667591B/en
Publication of TW202009774A publication Critical patent/TW202009774A/en

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

本發明係一種能安全傳輸圖檔之方法,應用至一第一終端裝置、一第二終端裝置及一通訊伺服器,且該第一終端裝置內儲存有一原始圖檔及一變形圖檔,該變形圖檔係由該原始圖檔經過一影像變形程序後所得,該方法係使該第一終端裝置能對該原始圖檔進行加密,之後,該原始圖檔能將加密之該原始圖檔及該變形圖檔傳送至該通訊伺服器,該通訊伺服器則會將該變形圖檔傳送至第二終端裝置,且當其接收到該第二終端裝置傳來之一原圖要求訊息後,始將加密之該原始圖檔傳送至該第二終端裝置,令該第二終端裝置能對加密之該原始圖檔進行解密,以呈現該原始圖檔。 The present invention is a method for safely transmitting a picture file, which is applied to a first terminal device, a second terminal device and a communication server, and the first terminal device stores an original image file and a deformation image file. The deformed image file is obtained by the original image file after an image deformation process, wherein the first terminal device can encrypt the original image file, and then the original image file can encrypt the original image file and The deformation image file is transmitted to the communication server, and the communication server transmits the deformation image file to the second terminal device, and after receiving the original image request message sent by the second terminal device, Transmitting the encrypted original image file to the second terminal device, enabling the second terminal device to decrypt the encrypted original image file to present the original image file.

Description

能安全傳輸圖檔之方法 Method for safely transferring pictures

本發明係關於傳輸圖檔的方法,尤指一種加密程序係由終端裝置完成,且複數終端裝置與通訊伺服器的傳輸圖檔過程,及通訊伺服器所儲存之圖檔,均為加密圖檔,以提高該圖檔之隱私性。 The invention relates to a method for transmitting a graphic file, in particular to an encryption program which is completed by a terminal device, and the transmission file process of the plurality of terminal devices and the communication server, and the image file stored by the communication server are all encrypted image files. To improve the privacy of the image file.

按,隨著智慧型手機興起,及無線網路技術的精進,現今人們除了以通話方式聯絡之外,透過即時通訊(Instant Messaging,簡稱IM)方式交流感情,幾乎成為未來的趨勢,根據「comScore」之資料內容可知,在2016年時,台灣使用「即時通訊」的人數已超過750萬人,意即,人們對於「即時通訊」的依賴性與日俱增,此一情況,不僅令即時通訊軟體踏入百家爭鳴的時代,更是造成即時通訊軟體不斷推陳出新,期能獲得消費者的青睞。 According to the rise of smart phones and the advancement of wireless network technology, people nowadays exchange their feelings through instant messaging (IM), which is almost the future trend, according to "comScore". According to the information, in 2016, the number of people using "instant messaging" in Taiwan has exceeded 7.5 million, which means that people's dependence on "instant messaging" is increasing day by day. This situation not only makes instant messaging software enter the market. The era of contending for a hundred schools has caused instant messaging software to continue to evolve and become popular with consumers.

又,為能在眾多即時通訊軟體中能夠脫穎而出,各家即時通訊軟體紛紛研發設計出各種功能,以發展出專屬特色,例如:「WhatsApp」此款即時通訊軟體,便是以沒有廣告與貼圖作為軟體特色;「LINE」此款即時通訊軟體,則是以可愛貼圖作為軟體特色;「Viber」此款即時通訊軟體,其最大特色係用戶無需打開該即時通訊軟體,便可以直接撥打VoIP電話;「WeChat」此款即時通訊軟體,係能以「搖一搖」方式搜尋周圍朋友;「M+」 此款即時通訊軟體,則能自動分辨電信業者。根據「SimilarWeb」針對187國的調查報告指出,「WhatsApp」在其中109個國家(如:俄國、巴西、印度、英國、德國、西班牙...等)中佔據領先地位,「Messenger」則在其中49個國家(如:美國、加拿大、澳洲...等)中居於主流,「Viber」則是在其中10個國家(如:白俄羅斯、烏克蘭、塞爾維亞...等)的主流通訊軟體;由此可知,具有特殊功能與特色的即時通訊軟體,確實能有效抓住使用者的眼球,並培養出使用者的高忠誠度,有鑒於此,即時通訊軟體市場實已引起眾多廠商激烈競逐,無不絞盡腦汁,研發出極具特色之功能,以能在該市場中佔有一席之地。 In addition, in order to be able to stand out in many instant messaging software, various instant messaging softwares have developed various functions to develop exclusive features. For example, "WhatsApp" is an instant messaging software with no ads or textures. "LINE" is an instant messaging software that uses cute textures as a software feature. "Viber" is an instant messaging software. Its biggest feature is that users can directly dial VoIP calls without opening the instant messaging software. "WeChat" is an instant messaging software that can search for friends around you by "shake"; "M+" This instant messaging software automatically distinguishes between carriers. According to "SimilarWeb" survey report on 187 countries, "WhatsApp" has a leading position in 109 countries (such as Russia, Brazil, India, Britain, Germany, Spain, etc.), and "Messenger" is among them. 49 countries (such as the United States, Canada, Australia, etc.) are in the mainstream, and "Viber" is the mainstream communication software in 10 countries (such as Belarus, Ukraine, Serbia, etc.); It can be seen that the instant messaging software with special functions and features can effectively grasp the eyes of users and cultivate the high loyalty of users. In view of this, the instant messaging software market has already caused fierce competition among many manufacturers. Do not rack your brains and develop distinctive features to gain a foothold in this market.

此外,現有智慧型手機除了原有之語音通話功能之外,更是具備照像、錄影、視訊通話、收聽音樂、觀看線上節目...等各種附加功能,且其記憶體容量亦大幅增加,因此,使用者不僅會在智慧型手機中儲存大量的照片、影片、音樂...等檔案,更是會將前述檔案分享與其他朋友,故,即時通訊軟體已非單純傳送文字訊息,更是能夠傳送照片、影片、音樂等檔案,甚至能夠將自身的地理位置資訊傳送至其他朋友,以能滿足使用者的「分享」需求。 In addition, in addition to the original voice call function, the existing smart phone has various additional functions such as photo, video, video call, music listening, online program watching, etc., and its memory capacity is also greatly increased. Therefore, the user not only stores a large number of files, videos, music, etc. in the smart phone, but also shares the aforementioned files with other friends. Therefore, the instant messaging software has not simply transmitted text messages, but Ability to transfer photos, videos, music and other files, and even transfer their geographic location information to other friends to meet the user's "sharing" needs.

有鑑於此,申請人乃在其研發的即時通訊軟體中,設計出一種嶄新的傳輸照片方式,以能吸引使用者的目光,茲簡單說明如後,一般言,在即時通訊軟體的使用過程中,除了文字以外,人們亦普遍會以照片來呈現近況,尤其是,對於初識且未蒙面的男女來說,更是會透過傳送自拍照的方式,瞭解對方外表,但現有的即時通訊軟體均是直接將照片傳送予對方,因此,申請人為能提高雙方聊天互動的樂趣,乃在其中一方傳輸 照片後,將該照片進行變形處理,並將變形照片傳送予另一方,之後,另一方能夠根據特定條件(如:完成活動),而取得原始照片(即,未變形照片),藉以加強雙方互動,同時,能以變形照片勾起對方興趣。然而,申請人發現,前述方式於安全性上仍有如下缺失:(1)當雙方傳輸照片時,雲端伺服器上會儲存(或暫存)該原始照片(即,未變形照片),此時,若有惡意使用者侵入該雲端伺服器,則能夠盜取該原始照片(即,未變形照片);(2)目前對照片進行加密的過程,通常是使用者上傳照片後,再由雲端伺服器進行加密,因此,當惡意使用者侵入該雲端伺服器時,能容易取得該雲端伺服器的加密方式,進而解密,造成該原始照片(即,未變形照片)被竊取;(3)當雲端伺服器將照片傳輸至另一方的終端裝置時,其所傳輸的照片係為原始照片(即,未變形照片),畢竟,雲端伺服器的加密行為是為了保護其內的照片,但在傳輸之前,係會先進行解密,因此,惡意使用者能夠在傳輸過程中,攔截並盜取該原始照片(即,未變形照片)。 In view of this, the applicant has designed a new way of transferring photos in the instant messaging software developed by the applicant to attract the attention of the user. It is briefly explained in the following, in general, during the use of instant messaging software. In addition to text, people generally use photos to present their current situation. In particular, for men and women who are new and unmasked, they will know how to look at each other by sending a selfie, but the existing instant messaging software. Both of them send photos directly to each other. Therefore, the applicant is able to improve the fun of chat interaction between the two parties. After the photo, the photo is deformed and the deformed photo is transmitted to the other party, and then the other party can obtain the original photo (ie, the undeformed photo) according to specific conditions (eg, completing the activity), thereby enhancing the interaction between the two parties. At the same time, you can evoke the interest of the other party with a distorted photo. However, the applicant has found that the foregoing method still has the following defects in security: (1) When the two parties transmit photos, the original photo (ie, undeformed photo) is stored (or temporarily stored) on the cloud server. If a malicious user invades the cloud server, the original photo (ie, undeformed photo) can be stolen; (2) the current process of encrypting the photo is usually after the user uploads the photo, and then the cloud is served by the cloud. Encryption, therefore, when a malicious user invades the cloud server, the encryption mode of the cloud server can be easily obtained, and then decrypted, causing the original photo (ie, undeformed photo) to be stolen; (3) when the cloud When the server transmits the photo to the other terminal device, the photo transmitted is the original photo (ie, the undeformed photo). After all, the encryption behavior of the cloud server is to protect the photo inside, but before the transmission. The system decrypts first, so the malicious user can intercept and steal the original photo (ie, undeformed photo) during the transmission.

雖然照片僅有影像,但是其上之人臉、背景...等內容,均包含了諸多資訊,且屬於個人隱私,因此,如何有效解決前述問題,以確保照片的安全性與隱私性,進而能令使用者安心使用,並提高使用者使用該即時通訊軟體的意願,即成為本發明在此亟欲達成之重要課題。 Although the photos are only images, the faces, backgrounds, etc. on them contain a lot of information and are personal privacy. Therefore, how to effectively solve the above problems to ensure the security and privacy of photos, and then The user's willingness to use the user and increase the user's willingness to use the instant messaging software has become an important issue for the present invention.

有鑑於前述申請人所設計之傳輸照片方式,仍不夠完善,因此,發明人憑藉著多年來的研發經驗,在進行多次的研究與測試後,終於 設計出本發明之一種能安全傳輸圖檔之方法,期能讓使用者於使用即時通訊軟體分享照片的過程中,能夠確保照片的隱私性,而不易被惡意使用者竊取。 In view of the above-mentioned method of transmitting photos designed by the applicant, it is still not perfect. Therefore, the inventor, after years of research and development experience, has finally conducted many researches and tests. The method for safely transmitting the image file of the present invention is designed, and the user can ensure the privacy of the photo in the process of sharing the photo by using the instant messaging software, and is not easily stolen by the malicious user.

本發明之一目的,係提供一種能安全傳輸圖檔之方法,該方法係應用至一網路系統,該網路系統包括一第一終端裝置、一第二終端裝置及一通訊伺服器,其中,該第一終端裝置與該第二終端裝置分別安裝有一即時通訊軟體,且該等終端裝置能分別透過該即時通訊軟體與該通訊伺服器建立連線,該第一終端裝置內儲存有一原始圖檔及一變形圖檔,且該變形圖檔係由該原始圖檔經過一影像變形程序後所得,在該第一終端裝置上傳圖檔之前,該第一終端裝置能以至少一加密金鑰對該原始圖檔進行加密,之後,該第一終端裝置將加密之該原始圖檔及該變形圖檔傳送至該通訊伺服器,該通訊伺服器會將該變形圖檔傳送至該第二終端裝置,並儲存加密之該原始圖檔,嗣,當該通訊伺服器接收該第二終端裝置傳來之一原圖要求訊息後,其會將加密之該原始圖檔傳送至該第二終端裝置,該第二終端裝置即能以一第一解密金鑰對加密之該原始圖檔進行解密,以在一顯示幕上呈現該原始圖檔,如此,無論是通訊伺服器上所儲存之圖檔,或是該等終端裝置與通訊伺服器間傳輸圖檔,均僅有加密之該原始圖檔,以保障原始圖檔的隱私性。 An object of the present invention is to provide a method for securely transferring a picture file, the method being applied to a network system, the network system comprising a first terminal device, a second terminal device and a communication server, wherein The first terminal device and the second terminal device respectively have an instant messaging software installed, and the terminal devices can respectively establish a connection with the communication server through the instant messaging software, and the first terminal device stores an original image. a file and a deformed image file, wherein the image file is obtained by the image file after the image file is deformed by the image file, and the first terminal device can use at least one encryption key pair before the first terminal device uploads the image file. The original image file is encrypted, and then the first terminal device transmits the encrypted original image file and the deformed image file to the communication server, and the communication server transmits the modified image file to the second terminal device. And storing the encrypted original image file, 嗣, when the communication server receives the original image request message sent by the second terminal device, it will transmit the encrypted original image file Up to the second terminal device, the second terminal device can decrypt the encrypted original image file with a first decryption key to present the original image file on a display screen, thus, whether it is a communication server The image file stored on the file or the transfer file between the terminal device and the communication server only encrypts the original image file to ensure the privacy of the original image file.

本發明之另一目的,係該第一終端裝置在上傳該變形圖檔至該通訊伺服器之前,會對該變形圖檔進行加密,以使該通訊伺服器將加密之該變形圖檔傳送至該第二終端裝置後,該第二終端裝置能以一第二解密金鑰對加密之該變形圖檔進行解密,如此,即能提高圖檔的隱私性,避免 惡意使用者將變形圖檔還原回原始圖檔。 Another object of the present invention is that the first terminal device encrypts the deformed image file before uploading the deformed image file to the communication server, so that the communication server transmits the encrypted deformed image file to the After the second terminal device, the second terminal device can decrypt the encrypted image file with a second decryption key, thereby improving the privacy of the image file and avoiding The malicious user restores the deformed image file back to the original image file.

為便 貴審查委員能對本發明目的、技術特徵及其功效,做更進一步之認識與瞭解,茲舉實施例配合圖式,詳細說明如下: For your convenience, the review committee can make a further understanding and understanding of the purpose, technical features and effects of the present invention. The embodiments are combined with the drawings, and the details are as follows:

〔習知〕 [study]

no

〔本發明〕 〔this invention〕

10‧‧‧網際網路 10‧‧‧Internet

11‧‧‧第一終端裝置 11‧‧‧First terminal device

111‧‧‧即時通訊軟體 111‧‧‧ instant messaging software

12‧‧‧第二終端裝置 12‧‧‧Second terminal device

121‧‧‧即時通訊軟體 121‧‧‧ instant messaging software

2‧‧‧通訊伺服器 2‧‧‧Communication Server

21‧‧‧帳戶資料 21‧‧‧Account information

211‧‧‧帳戶 211‧‧ accounts

23‧‧‧款項資料 23‧‧‧ Payment Information

231‧‧‧款項 231‧‧‧

301~305‧‧‧步驟 301~305‧‧‧Steps

S‧‧‧網路系統 S‧‧‧Network System

H1‧‧‧扣款通知元件 H1‧‧‧deduction notification component

第1圖係本發明之網路系統示意圖;第2圖係本發明之原始圖檔與變形圖檔之示意圖;第3圖係本發明之帳戶資料與款項資料之示意圖;第4圖係本發明之流程圖;第5圖係本發明之第二終端裝置的一畫面示意圖;第6圖係本發明之第二終端裝置的另一畫面示意圖;及第7圖係本發明之第二終端裝置的再一畫面示意圖。 1 is a schematic diagram of a network system of the present invention; FIG. 2 is a schematic diagram of an original image file and a deformation image file of the present invention; FIG. 3 is a schematic diagram of account information and money data of the present invention; FIG. 5 is a schematic diagram of a second terminal device of the present invention; FIG. 6 is another schematic diagram of a second terminal device of the present invention; and FIG. 7 is a second terminal device of the present invention. Another screen diagram.

本發明係一種能安全傳輸圖檔之方法,請參閱第1圖所示,在一實施例中,該方法係應用至一網路系統S,該網路系統S包括一第一終端裝置11、一第二終端裝置12及一通訊伺服器2,其中,該第一終端裝置11能為智慧型手機,其上安裝有一即時通訊軟體111,例如:Skype、Line、M+、Whatsapp、Mimitalks...等,又,該第二終端裝置12能為平板電腦,其上亦安裝有即時通訊軟體121,當該第一終端裝置11與第二終端裝置12分別啟動對應之即時通訊軟體111、121後,其能分別連接至一網際網路10,以透過該即時通訊軟體111、121與該通訊伺服器2建立連線,進而能彼此相互傳送信息。 The present invention is a method for securely transmitting a picture file. Referring to FIG. 1 , in an embodiment, the method is applied to a network system S, where the network system S includes a first terminal device 11 , A second terminal device 12 and a communication server 2, wherein the first terminal device 11 can be a smart phone, and an instant messaging software 111 is installed thereon, for example: Skype, Line, M+, Whatsapp, Mimitalks... In addition, the second terminal device 12 can be a tablet computer, and the instant messaging software 121 is also installed thereon. After the first terminal device 11 and the second terminal device 12 respectively activate the corresponding instant messaging software 111 and 121, They can be respectively connected to an Internet 10 to establish a connection with the communication server 2 through the instant messaging software 111, 121, so that information can be transmitted to each other.

承上,復請參閱第1圖所示,該第一終端裝置11內儲存有一原始圖檔及一變形圖檔,且該變形圖檔係由該原始圖檔經過一影像變形程序後所得,在該實施例中,該原始圖檔能經過高斯模糊後,形成該變形圖檔(如第2圖所示),但是,在本發明之其它實施例中,業者能夠透過其它方式,例如:馬賽克、遮罩、負片...等,只要該變形圖檔無法完整呈現原始圖檔的內容,即為本發明所稱之變形圖檔。在此特別一提者,該第一終端裝置11之原始圖檔的取得來源,能夠為第一終端裝置11之攝像模組所拍攝,或是由雲端空間(如:Flickr)下載而來,或是由外部裝置(如:記憶卡、相機...等)所取得,又,該影像變形程序能夠為該即時通訊軟體111所內建之功能。 As shown in FIG. 1 , the first terminal device 11 stores an original image file and a deformation image file, and the deformation image file is obtained by the image transformation process after the original image file is obtained. In this embodiment, the original image file can be subjected to Gaussian blurring to form the deformation image file (as shown in FIG. 2), but in other embodiments of the present invention, the operator can pass other methods, such as mosaic, A mask, a negative film, etc., as long as the deformed image file cannot completely present the content of the original image file, that is, the deformed image file referred to in the present invention. In particular, the source of the original image of the first terminal device 11 can be captured by the camera module of the first terminal device 11 or downloaded from a cloud space (eg, Flickr), or It is obtained by an external device (such as a memory card, a camera, etc.), and the image warping program can be a built-in function of the instant messaging software 111.

在該實施例中,請參閱第1及3圖所示,該通訊伺服器2內尚設有一帳戶資料21及一款項資料23,該帳戶資料21包括複數個帳戶211,且各該帳戶211能夠為使用者所註冊之帳號(如:a1~a4)、手機號碼或手機唯一碼(International Mobile Equipment Identity,簡稱IMEI)...等,其主要是用來代表各該帳戶211所對應的使用者身份,該款項資料23則包括複數筆款項231,且各該款項231能夠為現金或虛擬點數,又,每一個帳戶211均會對應於一筆款項231,舉例來說,請參閱第3圖所示,「a1」的帳戶211所對應之款項231為1000點,「a3」的帳戶211所對應之款項231為2000點...等。 In this embodiment, as shown in Figures 1 and 3, the communication server 2 is further provided with an account data 21 and a payment data 23, the account information 21 includes a plurality of accounts 211, and each of the accounts 211 can The user account (such as: a1~a4), the mobile phone number, or the mobile phone unique code (IMEI), etc., is mainly used to represent the user corresponding to each account 211. Identity, the amount of money 23 includes a plurality of payments 231, and each of the funds 231 can be cash or virtual points, and each account 211 will correspond to a sum of money 231, for example, see Figure 3 The amount 231 corresponding to the account 211 of "a1" is 1000 points, and the amount 231 corresponding to the account 211 of "a3" is 2000 points...etc.

為詳細說明本發明之整體技術特徵,茲舉例說明本案的運作流程,請參閱第1~4圖所示,其中,假設甲方為第一終端裝置11的使用者,乙方為第二終端裝置12的使用者,當甲方欲傳送圖檔(如:自拍照)予乙方時,該方法能執行下列步驟: In order to explain the overall technical features of the present invention, the operation flow of the present invention will be exemplified, as shown in FIGS. 1 to 4, wherein it is assumed that Party A is the user of the first terminal device 11, and Party B is the second terminal device 12. The user can perform the following steps when Party A wants to transfer a picture file (such as a selfie) to Party B:

步驟(301):在該實施例中,該第一終端裝置11能將該原始圖檔轉換成「BASE64格式NO_WRAP」,產生一組「AESKEY(原始圖檔用)及AESIV(原始圖檔用)」(即,第一加密金鑰),嗣,該第一終端裝置11以該「AESKEY(原始圖檔用)及AESIV(原始圖檔用)」(即,第一加密金鑰)對該原始圖檔進行加密,以形成加密之原始圖檔。惟,在本發明之其它實施例中,業者能夠根據不同的加密技術與需求,產生對應的加密之原始圖檔,甚至在加密之原始圖檔中,增加使用者的個人識別碼(UID),以能驗證該加密之原始圖檔是屬於哪一個使用者,又,為提高隱私性與安全權,該第一終端裝置11亦可就使用者的個人識別碼(UID)進行加密程序,但並不以此為限。承前所述,只要該第一終端裝置11能以至少一加密金鑰對該原始圖檔進行加密,即為本步驟之技術特徵。 Step (301): In this embodiment, the first terminal device 11 can convert the original image file into "BASE64 format NO_WRAP", and generate a set of "AESKEY (for the original image file) and AESIV (for the original image file). (ie, the first encryption key), 第一, the first terminal device 11 uses the "AESKEY (for original image file) and AESIV (for original image file)" (ie, the first encryption key) for the original The image file is encrypted to form an encrypted original image file. However, in other embodiments of the present invention, the operator can generate a corresponding encrypted original image file according to different encryption technologies and requirements, and even increase the user's personal identification number (UID) in the encrypted original image file. In order to verify which user the encrypted original image belongs to, and in order to improve privacy and security, the first terminal device 11 may also perform an encryption process on the user's personal identification number (UID), but Not limited to this. As described above, as long as the first terminal device 11 can encrypt the original image file with at least one encryption key, it is a technical feature of the step.

步驟(302):在該實施例中,該第一終端裝置11能先將加密之該原始圖檔傳送至該通訊伺服器2,並取得對應加密之該原始圖檔的一第一圖片識別碼(如:原始圖檔ID),嗣,該第一終端裝置11能對原始圖檔進行高斯模糊,以取得一模糊圖檔(如第2圖之右方照片),之後,該第一終端裝置11能將該變形圖檔傳送至該通訊伺服器2,並取得對應該變形圖檔的一第二圖片識別碼(如:變形圖檔ID)。惟,除了前述產生變形圖檔的時機之外,在本發明之其它實施例中,該第一終端裝置11亦能夠在對原始圖檔進行加密前,或是將加密之原始圖檔上傳至通訊伺服器2之前,先形成該模糊圖檔,之後,該第一終端裝置11再將加密之該原始圖檔及該變形圖檔一同傳送至該通訊伺服器2,而非僅限於前述過程,合先陳明。 Step (302): In this embodiment, the first terminal device 11 can first transmit the encrypted original image file to the communication server 2, and obtain a first picture identification code corresponding to the encrypted original image file. (eg, original image file ID), 第一, the first terminal device 11 can perform Gaussian blur on the original image file to obtain a blurred image file (such as the photo on the right in FIG. 2), and then the first terminal device 11 can transmit the deformed image file to the communication server 2, and obtain a second picture identification code (such as a deformed image file ID) corresponding to the deformed image file. However, in addition to the foregoing timing of generating the deformed image file, in other embodiments of the present invention, the first terminal device 11 can also upload the encrypted original image file to the communication before encrypting the original image file. Before the server 2, the fuzzy image file is formed, and then the first terminal device 11 transmits the encrypted original image file and the deformed image file to the communication server 2, instead of being limited to the foregoing process. Chen Ming.

步驟(303):該通訊伺服器2能將該變形圖檔傳送至該第二終 端裝置12,並儲存加密之該原始圖檔;在該實施例中,該通訊伺服器2係先傳送第二圖片識別碼(如:變形圖檔ID)予該第二終端裝置12,該第二終端裝置12能以該第二圖片識別碼(如:變形圖檔ID),向該通訊伺服器2要求及取得該變形圖檔,惟,在本發明之其它實施例中,業者能夠根據實際需求,調整前述方式。在此特別聲明者,步驟(302)~(303)之過程,係該等終端裝置11、12與通訊伺服器2間的互動過程,對於使用者的使用情境來說,則是甲方與乙方透過該即時通訊軟體111、121聊天,在聊天過程中,甲方能選擇一張照片(如第2圖之左方照片)傳送給乙方,之後,乙方能在其第二終端裝置12的顯示幕上看到該變形圖檔(如第5圖所示)。 Step (303): the communication server 2 can transmit the deformation image file to the second terminal End device 12, and storing the encrypted original image file; in this embodiment, the communication server 2 first transmits a second picture identification code (eg, a deformed image file ID) to the second terminal device 12, the first The second terminal device 12 can request and obtain the deformation image file from the communication server 2 by using the second picture identification code (eg, the deformed image file ID). However, in other embodiments of the present invention, the operator can Demand, adjust the above method. In this special statement, the process of steps (302)-(303) is the interaction process between the terminal devices 11, 12 and the communication server 2, and for the user's use situation, it is the party A and the party B. Through the instant messaging software 111, 121 chat, during the chat, Party A can select a photo (such as the photo on the left of Figure 2) to be transmitted to Party B, and then Party B can display the display on its second terminal device 12. The deformation image is seen on the top (as shown in Figure 5).

步驟(304):當乙方欲進一步察看原始圖檔時,其能夠操作該第二終端裝置12,例如,點選第5圖畫面上之變形圖檔、其它虛擬按鈕或實體按鍵,之後,該第二終端裝置12能產生一扣款通知元件H1(如第6圖所示),嗣,乙方能夠點選該扣款通知元件H1中的「確定」(虛擬按鈕),該第二終端裝置12會產生一原圖要求訊息,該原圖要求訊息至少包括一個人識別碼及第一圖片識別碼(如:原始圖檔ID),其中,該個人識別碼與其中一帳戶211相匹配,該第二終端裝置12會將該原圖要求訊息傳送至該通訊伺服器2,該通訊伺服器2能根據該原圖要求訊息的內容,取得該第二終端裝置12所對應之帳戶211及款項231,並執行一扣款程序(如,每解鎖一張照片需扣除3點),又,該通訊伺服器2在成功扣除預定金額(即,3點)後,會根據第一圖片識別碼將對應的加密之原始圖檔傳送至第二終端裝置12,以進行後續解密處理,同時,該通訊伺服器2亦會將前述預定金額(即,3點)加入至對應該第一終端裝置11的款項231中;反之,當該通訊伺服器2扣款失敗(即,款 項231內的金額小於預定金額)後,其則不傳送加密之原始圖檔。惟,在本發明之其它實施例中,並不限定前述作法,例如,業者能夠使每一個使用者保有數次免費解鎖照片的權利,因此,使用者只要操作該第二終端裝置12,使得該第二終端裝置12產生原圖要求訊息,且該通訊伺服器2能根據該原圖要求訊息的內容,將對應的加密之原始圖檔傳送至第二終端裝置12,即為本步驟之技術特徵。 Step (304): When Party B wants to further view the original image file, it can operate the second terminal device 12, for example, click on the deformed image file on the fifth drawing surface, other virtual buttons or physical buttons, and then, the first The second terminal device 12 can generate a deduction notification component H1 (as shown in FIG. 6). Then, the party B can click "OK" (virtual button) in the deduction notification component H1, and the second terminal device 12 Generating an original picture request message, the original picture request message includes at least one person identification code and a first picture identification code (eg, original picture file ID), wherein the personal identification code matches one of the accounts 211, the second terminal The device 12 transmits the original request request message to the communication server 2, and the communication server 2 can obtain the account 211 and the payment 231 corresponding to the second terminal device 12 according to the content of the original request message, and execute A deduction procedure (for example, deducting 3 points for each photo unlocked), and after successfully deducting the predetermined amount (ie, 3 o'clock), the communication server 2 will encrypt the corresponding image according to the first picture identification code. The original image file is transmitted to the second terminal 12, for subsequent decryption processing, at the same time, the communication server 2 will also add the aforementioned predetermined amount (ie, 3 points) to the money 231 corresponding to the first terminal device 11; otherwise, when the communication server 2 Deduction failed (ie, payment After the amount in item 231 is less than the predetermined amount, it does not transmit the encrypted original image. However, in other embodiments of the present invention, the foregoing method is not limited. For example, the operator can save each user the right to unlock the photo several times for free. Therefore, the user only needs to operate the second terminal device 12 so that the user The second terminal device 12 generates an original image request message, and the communication server 2 can transmit the corresponding encrypted original image file to the second terminal device 12 according to the content of the original image request message, that is, the technical feature of the step .

步驟(305):該第二終端裝置12接收到加密之該原始圖檔後,能夠以一第一解密金鑰(如:「AESKEY(原始圖檔用)及AESIV(原始圖檔用)」)對加密之該原始圖檔進行解密,以取得「BASE64格式NO_WRAP」的原始圖檔,之後,該第二終端裝置12能轉換「BASE64格式NO_WRAP」的原始圖檔,並在顯示幕上呈現該原始圖檔(如第7圖所示)。 Step (305): After receiving the encrypted original image file, the second terminal device 12 can use a first decryption key (for example, "AESKEY (for original image file) and AESIV (for original image file)") Decrypting the original image file to obtain the original image file of "BASE64 format NO_WRAP", after which the second terminal device 12 can convert the original image file of "BASE64 format NO_WRAP" and present the original image on the display screen. Figure file (as shown in Figure 7).

在此聲明者,根據不同的加密技術(如:進階加密標準(Advanced Encryption Standard,簡稱AES)、資料加密標準(Data Encryption Standard,簡稱DES)、非對稱加密(asymmetric cryptography)...等),該第一加密金鑰與第一解密金鑰的內容能夠相同或不同,其中,當「金鑰」用以對圖檔加密時,即為「加密金鑰」,但當「金鑰」用以對圖檔解密時,即為「解密金鑰」,合先敘明。在該實施例中,復請參閱第1及4圖所示,該第二終端裝置12取得第一解密金鑰的方式,至少包括下列兩種方式: In this statement, according to different encryption technologies (such as: Advanced Encryption Standard (AES), Data Encryption Standard (DES), asymmetric cryptography, etc.) The content of the first encryption key and the first decryption key can be the same or different, wherein when the "key" is used to encrypt the image file, it is "encryption key", but when the "key" is used When decrypting the image file, it is the "decryption key", which is described first. In this embodiment, as shown in FIGS. 1 and 4, the manner in which the second terminal device 12 obtains the first decryption key includes at least the following two methods:

(A1)第一種方式:該第一終端裝置11將加密之該原始圖檔傳送至該通訊伺服器2後,能將該第一解密金鑰傳送至該第二終端裝置12,其中,該第一終端裝置11傳送第一解密金鑰時,亦能夠對該第一解密金鑰的內容進行加密,以提高保密性,例如,甲乙雙方能夠採用非對稱加密 (asymmetric cryptography)技術,且分別保有公鑰與私鑰,因此,甲方傳送第一解密金鑰予乙方後,乙方能以自己的私鑰解開加密內容,並取得該第一解密金鑰,但同樣不以此為限,此外,甲乙雙方亦能夠在一開始進行通訊聊天時,便相互交換公鑰(當其採用非對稱加密技術),因此,甲乙雙方在後續聊天時,第一終端裝置11與第二終端裝置12所交換的訊息(包括文字、照片、加密後之圖片、影片...等),均能夠先行採用非對稱加密技術進行加密,以提高安全性與隱私性。 (A1) The first mode: after the first terminal device 11 transmits the encrypted original image file to the communication server 2, the first decryption key can be transmitted to the second terminal device 12, wherein When the first terminal device 11 transmits the first decryption key, the content of the first decryption key can also be encrypted to improve confidentiality. For example, both sides can use asymmetric encryption. (asymmetric cryptography) technology, and retains the public key and the private key respectively. Therefore, after Party A transmits the first decryption key to Party B, Party B can unlock the encrypted content with its own private key and obtain the first decryption key. However, it is not limited to this. In addition, both parties can exchange public keys (when they use asymmetric encryption technology) when they start communication chats. Therefore, when the two parties are in the follow-up chat, the first terminal device 11 The messages exchanged with the second terminal device 12 (including text, photos, encrypted pictures, movies, etc.) can be encrypted first by using asymmetric encryption technology to improve security and privacy.

(A2)第二種方式:該通訊伺服器2在成功扣除預定款項後,其會傳送一索鑰訊息至該第一終端裝置11,該第一終端裝置11接收到該索鑰訊息後,便會將該第一解密金鑰傳送至該第二終端裝置12,誠如前述,該第一終端裝置11傳送該第一解密金鑰時,亦能夠對該第一解密金鑰的內容進行加密。 (A2) The second mode: after successfully deducting the predetermined payment, the communication server 2 transmits a key message to the first terminal device 11, and after receiving the key message, the first terminal device 11 The first decryption key is transmitted to the second terminal device 12. As described above, when the first terminal device 11 transmits the first decryption key, the content of the first decryption key can also be encrypted.

綜上所述可知,藉由本發明之整體技術特徵,係能達成下列功效:(1)由於該通訊伺服器2上所儲存之原始圖檔係已經過加密處理,因此,當惡意使用者侵入該通訊伺服器2後,因無法對加密之原始圖檔進行解密,而未能取得原始圖檔的內容,故能有效維護使用者與圖檔的隱私性,此外,僅管該通訊伺服器2擁有變形圖檔,但因該變形圖檔無法完整呈現原始圖檔的內容,故仍具有一定的保密效果;(2)由於本發明之加密程序係由第一終端裝置11所完成,解密程序則是由第二終端裝置12所完成,故,無論是第一終端裝置11傳送圖檔至通訊伺服器2,或是通訊伺服器2傳送圖檔至第二終端裝置12,均是傳送「加 密之原始圖檔」,因此,當惡意使用者於前述傳輸途中,惡意攔截傳輸內容時,仍會因無法對加密之原始圖檔進行解密,而未能取得原始圖檔的內容;(3)該第一終端裝置11於傳送第一解密金鑰時,是刻意錯開傳送「加密之原始圖檔」之時機,且雙方使用者透過即時通訊軟體111、121聊天時,本就會有諸多訊息往返,因此,惡意使用者並無法輕易地取得第一解密金鑰,進而降低惡意使用者正確解密「加密之原始圖檔」的機率。 In summary, it can be seen that, by the overall technical features of the present invention, the following effects can be achieved: (1) since the original image file stored on the communication server 2 has been encrypted, when a malicious user invades the After the communication server 2, since the encrypted original image file cannot be decrypted, and the content of the original image file cannot be obtained, the privacy of the user and the image file can be effectively maintained, and in addition, only the communication server 2 has Deformed image file, but because the deformation image file cannot completely present the content of the original image file, it still has a certain security effect; (2) since the encryption program of the present invention is completed by the first terminal device 11, the decryption program is It is completed by the second terminal device 12, so whether the first terminal device 11 transmits the image file to the communication server 2 or the communication server 2 transmits the image file to the second terminal device 12, The original image file of the secret, therefore, when the malicious user maliciously intercepts the transmission content during the aforementioned transmission, the original image file cannot be obtained because the original image file cannot be decrypted; (3) When the first terminal device 11 transmits the first decryption key, it is intentionally staggered to transmit the "encrypted original image file", and when the two users chat through the instant messaging software 111, 121, there are many messages to and from. Therefore, the malicious user cannot easily obtain the first decryption key, thereby reducing the probability that the malicious user correctly decrypts the "encrypted original image file".

另外,為了避免惡意使用者將模糊圖檔還原,而取得原始圖檔的內容,在本發明之另一實施例,復請參閱第1及4圖所示,於步驟(302)中,該第一終端裝置11在產生該模糊圖檔後,其能先將該模糊圖檔轉換成「BASE64格式NO_WRAP」,並產生一組「AESKEY(模糊圖檔用)及AESIV(模糊圖檔用)」(即,第二加密金鑰),之後,該第一終端裝置11以該組「AESKEY(模糊圖檔用)及AESIV(模糊圖檔用)」(即,第二加密金鑰)對該模糊圖檔進行加密,以形成加密之該模糊圖檔,且其能為文字組成格式[加密模糊圖檔BASE64],又,該第一終端裝置11能將加密之該模糊圖檔傳送至該通訊伺服器2,使得該通訊伺服器2所擁有之圖檔均為加密後的圖檔,以提高圖檔的安全性。 In addition, in order to prevent the malicious user from restoring the blurred image file and obtaining the content of the original image file, in another embodiment of the present invention, refer to the first and fourth figures, in step (302), the first After the terminal device 11 generates the blurred image file, it can first convert the blurred image file into "BASE64 format NO_WRAP", and generate a set of "AESKEY (for blur image files) and AESIV (for blur image files)" ( That is, the second encryption key), after which the first terminal device 11 uses the set of "AESKEY (for fuzzy image files) and AESIV (for fuzzy image files)" (ie, the second encryption key) for the blurred map. The file is encrypted to form the encrypted fuzzy image file, and can be in a text composition format [encrypted fuzzy image file BASE64], and the first terminal device 11 can transmit the encrypted fuzzy image file to the communication server. 2. The image files owned by the communication server 2 are all encrypted files to improve the security of the image file.

再者,復請參閱第1及4圖所示,當通訊伺服器2接收到加密之該模糊圖檔後,其能於步驟(303)中,將加密之該變形圖檔傳送至該第二終端裝置12,該第二終端裝置12能以一第二解密金鑰對加密之該變形圖檔進行解密,以在該顯示幕上呈現該變形圖檔,其中,該第二解密金鑰能與第二加密金鑰的內容能夠相同或不同,且同樣能如前述(A1)的方式,由第一 終端裝置11將第二解密金鑰傳送至該第二終端裝置12。在此特別聲明者,為能提高傳輸圖檔的安全性,業者亦能夠採用多種加密程序,對同一張圖檔進行加密,因此,只要第一終端裝置能先對原始圖檔進行一次或多次加密,且第二終端裝置於接收變形圖檔後,又向通訊伺服器取得加密之原始圖檔,並能對加密之原始圖檔進行一次或多次解密,則為本發明所欲主張之範圍。 Furthermore, as shown in FIGS. 1 and 4, after the communication server 2 receives the encrypted fuzzy image file, it can transmit the encrypted deformation image file to the second in step (303). The terminal device 12, the second terminal device 12 can decrypt the encrypted deformed image file with a second decryption key to present the deformed image file on the display screen, wherein the second decryption key can The contents of the second encryption key can be the same or different, and can also be the first in the manner of (A1) above. The terminal device 11 transmits the second decryption key to the second terminal device 12. In particular, in order to improve the security of the transmission file, the operator can also encrypt the same image file by using various encryption programs, so that the first terminal device can perform the original image file one or more times first. Encrypted, and after receiving the deformed image file, the second terminal device obtains the encrypted original image file from the communication server, and can decrypt the encrypted original image file one or more times, which is the scope of the claimed invention. .

按,以上所述,僅係本發明之較佳實施例,惟,本發明所主張之權利範圍,並不侷限於此,按凡熟悉該項技藝人士,依據本發明所揭露之技術內容,可輕易思及之等效變化,均應屬不脫離本發明之保護範疇。 The above is only the preferred embodiment of the present invention, but the scope of the claims of the present invention is not limited thereto, and according to those skilled in the art, according to the technical content disclosed in the present invention, Equivalent changes that are easily considered are within the scope of protection of the invention.

Claims (6)

一種能安全傳輸圖檔之方法,係應用至一網路系統,該網路系統包括一第一終端裝置、一第二終端裝置及一通訊伺服器,其中,該第一終端裝置與該第二終端裝置分別安裝有一即時通訊軟體,當該第一終端裝置與該第二終端裝置分別啟動該即時通訊軟體後,其能透過該即時通訊軟體與該通訊伺服器建立連線,該第一終端裝置內至少儲存有一原始圖檔及一變形圖檔,且該變形圖檔係由該原始圖檔經過一影像變形程序後所得,該方法係使該網路系統執行下列步驟:該第一終端裝置以至少一加密金鑰對該原始圖檔進行加密;該第一終端裝置將加密之該原始圖檔及該變形圖檔傳送至該通訊伺服器;該通訊伺服器將該變形圖檔傳送至該第二終端裝置,並儲存加密之該原始圖檔;該通訊伺服器接收該第二終端裝置傳來之一原圖要求訊息後,將加密之該原始圖檔傳送至該第二終端裝置;及該第二終端裝置以至少一第一解密金鑰對加密之該原始圖檔進行解密,以呈現該原始圖檔。 A method for securely transmitting a file is applied to a network system, the network system including a first terminal device, a second terminal device, and a communication server, wherein the first terminal device and the second device The terminal device is respectively installed with an instant messaging software. After the first terminal device and the second terminal device respectively activate the instant messaging software, the first terminal device and the second terminal device can establish a connection with the communication server through the instant messaging software. The first terminal device At least one original image file and one deformed image file are stored in the image file, and the image file is obtained by the image patterning process. The method is configured to enable the network system to perform the following steps: the first terminal device At least one encryption key encrypts the original image file; the first terminal device transmits the encrypted original image file and the deformed image file to the communication server; the communication server transmits the modified image file to the first a second terminal device, and storing the encrypted original image file; after receiving the original image request message sent by the second terminal device, the communication server encrypts the original image file Sent to the second terminal; and the second terminal apparatus at least a first of the encrypted decryption key to decrypt the original image file, to render the original image file. 如請求項1所述之方法,其中,該第一終端裝置在上傳該變形圖檔至該通訊伺服器之前,係對該變形圖檔進行加密,再將加密之該變形圖檔傳輸至該通訊伺服器,該通訊伺服器將加密之該變形圖檔傳送至該第二終端裝置後,該第二終端裝置能以一第二解密金鑰對加密之該變形圖檔進行解密,以呈現該變形圖檔。 The method of claim 1, wherein the first terminal device encrypts the deformed image file before uploading the deformed image file to the communication server, and then transmits the encrypted deformed image file to the communication a server, after the communication server transmits the encrypted deformation image file to the second terminal device, the second terminal device can decrypt the encrypted deformation image file with a second decryption key to present the deformation Image file. 如請求項2所述之方法,其中,該通訊伺服器內尚設有一帳戶資料及一款項資料,該帳戶資料包括複數個帳戶,該款項資料包括複數筆款項, 且每一個帳戶均對應於一筆款項,該通訊伺服器接收該第二終端裝置傳來之一原圖要求訊息,且尚未將加密之該原始圖檔傳送至該第二終端裝置前,會執行下列步驟:根據該第二終端裝置所對應之帳戶及款項,對該第二終端裝置執行一扣款程序,並在成功扣除預定金額後,將加密之該原始圖檔傳送至該第二終端裝置。 The method of claim 2, wherein the communication server further has an account information and a payment data, the account information includes a plurality of accounts, and the payment includes a plurality of funds. And each account corresponds to a sum of money, and the communication server receives an original request message sent by the second terminal device, and before transmitting the encrypted original image file to the second terminal device, the following Step: Perform a debit procedure on the second terminal device according to the account and the money corresponding to the second terminal device, and after successfully deducting the predetermined amount, transmit the encrypted original image file to the second terminal device. 如請求項1、2或3所述之方法,其中,該第一終端裝置將加密之該原始圖檔傳送至該通訊伺服器後,會將該第一解密金鑰傳送至該第二終端裝置。 The method of claim 1, 2 or 3, wherein the first terminal device transmits the encrypted original image file to the communication server, and transmits the first decryption key to the second terminal device . 如請求項3所述之方法,其中,該通訊伺服器在成功扣除預定款項後,係會傳送一索鑰訊息至該第一終端裝置,以使該第一終端裝置將該第一解密金鑰傳送至該第二終端裝置,以供該第二終端裝對加密之該原始圖檔進行解密。 The method of claim 3, wherein the communication server transmits a key message to the first terminal device after the successful deduction of the predetermined amount, so that the first terminal device decrypts the first decryption key And transmitting to the second terminal device, for the second terminal to decrypt the encrypted original image file. 如請求項2或3所述之方法,其中,該第一終端裝置將加密之該原始圖檔傳送至該通訊伺服器後,會將該第一解密金鑰與該第二解密金鑰傳送至該第二終端裝置。 The method of claim 2 or 3, wherein the first terminal device transmits the encrypted original image file to the communication server, and transmits the first decryption key and the second decryption key to The second terminal device.
TW107128317A 2018-08-14 2018-08-14 Method for safely transferring pictures TWI667591B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107128317A TWI667591B (en) 2018-08-14 2018-08-14 Method for safely transferring pictures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107128317A TWI667591B (en) 2018-08-14 2018-08-14 Method for safely transferring pictures

Publications (2)

Publication Number Publication Date
TWI667591B true TWI667591B (en) 2019-08-01
TW202009774A TW202009774A (en) 2020-03-01

Family

ID=68316641

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107128317A TWI667591B (en) 2018-08-14 2018-08-14 Method for safely transferring pictures

Country Status (1)

Country Link
TW (1) TWI667591B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI798694B (en) * 2021-05-11 2023-04-11 明基電通股份有限公司 Data sharing method and data sharing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201523325A (en) * 2013-12-04 2015-06-16 Tencent Tech Shenzhen Co Ltd A method for file compressing and uncompressing, and a device and system thereof
TW201712590A (en) * 2015-09-24 2017-04-01 鴻海精密工業股份有限公司 A cloud encryption system and method
CN207198852U (en) * 2017-06-27 2018-04-06 上海传英信息技术有限公司 Managing device and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201523325A (en) * 2013-12-04 2015-06-16 Tencent Tech Shenzhen Co Ltd A method for file compressing and uncompressing, and a device and system thereof
TW201712590A (en) * 2015-09-24 2017-04-01 鴻海精密工業股份有限公司 A cloud encryption system and method
CN207198852U (en) * 2017-06-27 2018-04-06 上海传英信息技术有限公司 Managing device and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
A *

Also Published As

Publication number Publication date
TW202009774A (en) 2020-03-01

Similar Documents

Publication Publication Date Title
WO2019218919A1 (en) Private key management method and apparatus in blockchain scenario, and system
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
WO2017128869A1 (en) Information processing method, first terminal, second terminal, and server
CN110663055A (en) Facilitating funds transfer between user accounts
CN105634737B (en) Data transmission method, terminal and system
US20120143758A1 (en) Account Transfer Techniques
US10708237B2 (en) System and method for chat messaging in a zero-knowledge vault architecture
CN109146470A (en) Generate the method and device of payment code
US11245530B2 (en) System and method for secure communication
CA3178180A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN104202163A (en) Password system based on mobile terminal
CN107579903B (en) Picture message secure transmission method and system based on mobile device
TW201423465A (en) An image management system and method based on fingerprint identification
Aggarwal et al. Security aspect in instant mobile messaging applications
US9454677B1 (en) Secure communication architecture including video sniffer
CN108923931A (en) A kind of electronic certificate processing method, equipment and computer readable storage medium
EP4037250A1 (en) Message transmitting system with hardware security module
TWI667591B (en) Method for safely transferring pictures
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
JP2016100007A (en) Network authentication method using card device
CN103986640A (en) Instant messaging method and system capable of guaranteeing safety of user communication content
CN112671530B (en) Data processing method and device and data processing device
US11863538B2 (en) Methods and systems for generating a symmetric key for mobile device encryption
Mallick et al. Security aspects of social media applications