WO2015058658A1 - 文本加密交互方法、加密方法及装置、解密方法及装置 - Google Patents

文本加密交互方法、加密方法及装置、解密方法及装置 Download PDF

Info

Publication number
WO2015058658A1
WO2015058658A1 PCT/CN2014/088888 CN2014088888W WO2015058658A1 WO 2015058658 A1 WO2015058658 A1 WO 2015058658A1 CN 2014088888 W CN2014088888 W CN 2014088888W WO 2015058658 A1 WO2015058658 A1 WO 2015058658A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption
text data
text
data
encrypted data
Prior art date
Application number
PCT/CN2014/088888
Other languages
English (en)
French (fr)
Inventor
龙腾
Original Assignee
上海合合信息科技发展有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海合合信息科技发展有限公司 filed Critical 上海合合信息科技发展有限公司
Publication of WO2015058658A1 publication Critical patent/WO2015058658A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

Definitions

  • the invention relates to an interaction method, in particular to an electronic text encryption interaction method.
  • the invention also relates to a text data encryption method, and a text data encryption device.
  • the invention further relates to a text data decryption method and a text data decryption apparatus.
  • the traditional encryption method requires one party to encrypt and package the data, transmit it to the other party through the network, decrypt it by the other party, and then read it.
  • Such encryption methods cannot be applied to some public network platforms, and since both the encryption party and the decryption party are connected through the network, the encryption algorithm and the secret key are easily stolen by the Trojan horse program.
  • the technical problem to be solved by the present invention is to provide a text encryption interaction method, a text data encryption method, a text data encryption device, a text data decryption method and a text data decryption device, which can be effectively used in public
  • the platform protects the privacy of user text and has better encryption.
  • the technical solution of the text encryption interaction method of the present invention includes:
  • the sender performs encryption operation on the text data to be sent, so that the encrypted data obtained after the encryption operation can be displayed in the form of characters including at least one of letters, numbers, characters, and symbols that can be uniquely recognized;
  • the receiver acquires the image of the encrypted data displayed in the form of a character, identifies the character on the image, and performs a decryption operation corresponding to the encryption operation on the identified encrypted data to obtain the text data.
  • the invention also discloses a text data encryption method used in the above text encryption interaction method, wherein the technical solution comprises: performing encryption operation on the text data to be encrypted, so that the encrypted data obtained after the encryption operation can be displayed in the form of characters.
  • the character includes at least one of a letter, a number, a character, and a symbol that can be uniquely recognized.
  • the invention further discloses a text data encryption device, wherein the technical solution is to encrypt the text data by using the text data encryption method.
  • the invention further discloses a text data decryption method used in the above text encryption interaction method, which is characterized in that it comprises acquiring an image of the encrypted data displayed in the form of characters, and identifying characters on the image. And performing a decryption operation corresponding to the encryption operation on the identified encrypted data to obtain the text data.
  • the invention further discloses a data decryption device, which is characterized in that the encrypted data is decrypted by using the above text data decryption method.
  • the invention enables the user to encrypt and decrypt the communication through the image, effectively protects the privacy of the user's speech, and strengthens the reliability of the encryption method.
  • FIG. 1 is a schematic diagram of a text encryption interaction method according to the present invention.
  • the invention discloses a text encryption interaction method, as shown in FIG. 1 , comprising:
  • the sender performs encryption operation on the text data to be sent, so that the encrypted data obtained after the encryption operation can be displayed in the form of characters including at least one of letters, numbers, characters, and symbols that can be uniquely recognized;
  • the receiver acquires the image of the encrypted data displayed in the form of a character, identifies the character on the image, and performs a decryption operation corresponding to the encryption operation on the identified encrypted data to obtain the text data.
  • a user A wants to send a message on the network, but A only wants that information to be seen by a particular user.
  • A can encrypt the information by the above method, and the encrypted data after encryption is displayed on the network in the form of characters. These characters are completely disordered and have no meaning to others, so others cannot Characters get any information.
  • the user A can inform the specific user of the corresponding decryption method.
  • the specific user recognizes the characters on the encrypted data image, the text information is obtained according to the decryption method provided by A. In this way, User A's information can be read only by a specific user.
  • the recipient acquires the image of the encrypted data displayed in the form of characters in a photographing manner.
  • a smart phone is used to capture an encrypted data image, and then the characters of the encrypted data are identified to decrypt the budget.
  • the text data is directly displayed, and the text data may be stored.
  • the invention also discloses a text data encryption method used in the above text encryption interaction method, which comprises performing encryption operation on the text data to be encrypted, so that the encrypted data obtained after the encryption operation can be displayed in the form of characters, the characters being at least Includes one of letters, numbers, words, and symbols that can be uniquely identified.
  • the invention can encrypt the text data segment.
  • a check digit is set in the encrypted data to verify the correctness of the encrypted data.
  • the invention further discloses a text data encryption device for encrypting text data by using the above text data encryption method.
  • the invention further discloses a text data decryption method used in the above text encryption interaction method, which comprises acquiring an image of the encrypted data displayed in the form of characters, and identifying characters on the image, and identifying the obtained characters.
  • the encrypted data is subjected to a decryption operation corresponding to the encryption operation to obtain the text data.
  • the text data is subjected to a cryptographic operation in a segmentation manner during the encryption operation, and the encrypted data segment is decrypted according to the segmentation at the time of the cryptographic operation. If the recipient does not capture all the images of the encrypted data and only captures part of the image, it is also possible to decrypt only the captured encrypted data to obtain the text data of the portion. In addition, if an error occurs during the identification process of the encrypted data, the individual characters are not correctly recognized, and in the subsequent decryption operation, the normal decryption budget of the other segments is not affected, and the correct text data is obtained.
  • a check bit is set in the encrypted data, and the correctness of the encrypted data is verified according to the check bit before the decryption operation. In this way, if an error occurs in the process of identifying the encrypted data, it can be found in time. If the segmentation encryption method is adopted, the check digit can also be set in each segment to determine whether the identification of each segmented encrypted data is correct.
  • the present invention further discloses a data decryption apparatus for decrypting encrypted data by using the above text data decryption method.
  • the data decryption apparatus further includes a photographing module and a display module, the photographing module acquires an image of the encrypted data displayed in the form of characters in a photographing manner, and the display module displays the photographed image while the image is in the image The encrypted data displayed in the form of characters is replaced with the text data at the corresponding position.
  • the display module includes a preview frame, and the preview frame displays an image acquired by the shooting module in real time in real time.
  • the preview frame displays encrypted data
  • the display module replaces the encrypted data with the corresponding position in the corresponding position. text data.
  • the data decryption device of the present invention can be based on a smartphone or tablet platform. After the encrypted data is displayed, the camera of the smartphone or tablet is aimed at the image of the encrypted data, and the text data is displayed in real time on the corresponding position on the image on the display screen of the smartphone or tablet.
  • the present invention can obtain the encrypted data through the image, so that the encrypted computer system and the decrypted computer system can be completely connected through the network, so that the probability of the encryption method or the secret key being stolen through the network is greatly reduced, and the data encryption is greatly improved. reliability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Facsimile Transmission Control (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种文本加密交互方法、一种文本数据加密方法、一种文本数据加密装置,以及一种文本数据解密方法和一种文本数据解密装置,发送方将待发送的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种;接收方获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。本发明通过采用上述技术方案,使得用户可以通过图像进行加密解密交流,有效的保护了用户言论的私密性,加强了加密方法的可靠性。

Description

文本加密交互方法、加密方法及装置、解密方法及装置 技术领域
本发明涉及一种交互方法,尤其是以电子方式进行的文本加密交互方法。本发明还涉及一种文本数据加密方法,以及一种文本数据加密装置。本发明又涉及一种文本数据解密方法,以及一种文本数据解密装置。
背景技术
随着网络的发展,人们通过网络进行交流已经越来越便捷。尤其是近些年,论坛、微博等为人们思想的碰撞提供了非常好的平台。但是随着网络的普及,人们的隐私安全也越来越成为一个亟待解决的问题。如果用户发一条微博,或者在论坛上留一条评论,有可能只是希望某些特定的人能够阅读,但是却能够被全世界的人都看到。有时在网上不经意的一条留言,很可能在未来的某一天给自己带来巨大的麻烦。而在这些应用中,传统的加密方法也非常不适用。传统的加密方法,需要一方将数据加密打包之后,通过网络传送给另一方,再由另一方解密,然后阅读。这样的加密方法无法应用与一些公开的网络平台,并且由于加密方与解密方都通过网络连接,加密算法和秘钥容易被木马程序窃取。
发明内容
本发明所要解决的技术问题是提供一种文本加密交互方法、一种文本数据加密方法、一种文本数据加密装置,以及一种文本数据解密方法和一种文本数据解密装置,能够有效的在公共平台保护用户文本的私密性,并且具有更好的加密效果。
为解决上述技术问题,本发明文本加密交互方法的技术方案是,包括:
发送方将待发送的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种;
接收方获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。
本发明还公开了一种上述文本加密交互方法中所采用的文本数据加密方法,其技术方案是,包括对待加密的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种。
本发明又公开了一种文本数据加密装置,其技术方案是,采用上述文本数据加密方法对文本数据进行加密。
本发明再公开了一种上述文本加密交互方法中所采用的文本数据解密方法,其技术方案是,包括获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。
本发明再公开了一种数据解密装置,其技术方案是,采用上述文本数据解密方法对加密数据进行解密。
本发明通过采用上述技术方案,使得用户可以通过图像进行加密解密交流,有效的保护了用户言论的私密性,加强了加密方法的可靠性。
附图说明
下面结合附图和实施例对本发明作进一步详细的说明:
图1为本发明文本加密交互方法的示意图。
具体实施方式
本发明公开了一种文本加密交互方法,如图1所示,包括:
发送方将待发送的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种;
接收方获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。
一用户A希望在网络上发一条信息,但是A只希望该信息被特定的用户看到。此时,A可以采用上述方法对信息进行加密,加密之后的加密数据以字符的形式显示在网络上,这些字符在别人看来,完全是无序且有没有任何意义的,因此别人无法从这些字符获得任何信息。之后,用户A可以将相应的解密方法告诉特定的用户,特定的用户将加密数据图像上的字符识别后,根据A提供的解密方法获得文本信息。这样,用户A的信息就可以只被特定的用户正确阅读。
所述接收方以拍摄的方式获取所述以字符的形式显示的加密数据的图像。例如,使用智能手机拍摄加密数据图像,然后对加密数据的字符进行识别,进行解密预算。
所述接收方得到所述文本数据后,直接将该文本数据显示,也可以将将该文本数据存储。
本发明还公开了一种上述文本加密交互方法中所采用的文本数据加密方法,包括对待加密的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种。
本发明可以对所述文本数据分段进行加密。
所述加密数据中设置有校验位,对所加密数据的正确性进行校验。
本发明又公开了一种文本数据加密装置,采用上述文本数据加密方法对文本数据进行加密。
本发明再公开了一种上述文本加密交互方法中所采用的文本数据解密方法,包括获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。
所述文本数据在加密运算时以分段的方式进行加密运算,解密时根据加密运算时的分段,对所述加密数据分段进行解密。如果接收方没有拍摄加密数据的全部图像,而只拍摄了部分图像时,也可以只将所拍摄的加密数据进行解密,得到该部分的文本数据。另外,如果在加密数据识别过程中发生错误,导致个别字符没有正确识别,在后续解密运算中,也不会影响其它分段的正常解密预算,得到正确的文本数据。
所述加密数据中设置有校验位,根据所述校验位在解密运算之前对所述加密数据的正确性进行校验。这样,如果加密数据识别过程中发生错误,可以及时的发现,如果采用分段加密的方式,也可以在每个分段都设置校验位,以确定每个分段加密数据的识别是否正确。
本发明再公开了一种数据解密装置,采用上述文本数据解密方法对加密数据进行解密。
所述数据解密装置还包括拍摄模块和显示模块,所述拍摄模块以拍摄方式获取所述以字符的形式显示的加密数据的图像,所述显示模块将所拍摄的图像进行显示,同时将图像中以字符的形式显示的加密数据在相应的位置替换成所述文本数据。
述显示模块包括预览框,所述预览框实时的显示所述拍摄模块实时获取的图像,当所述预览框中显示有加密数据时,所述显示模块将加密数据在相应的位置替换成所述文本数据。
本发明的数据解密装置可以基于智能手机或者平板电脑平台。当加密数据被显示之后,用智能手机或者平板电脑的摄像头对准在加密数据的图像上,智能手机或者平板电脑的显示屏上就会在图像上相应的位置实时的显示出文本数据。
另外,本发明由于通过图像获取加密数据,使得加密的计算机系统与解密的计算机系统可以完全不通过网络连接,从而使得加密方法或秘钥被通过网络窃取的几率大大降低,大大提高了数据加密的可靠性。
以上所述仅为本发明的较佳是实力而已,并非用以限定本发明的实质技术内容范围,本发明的实质技术内容是广义的定义于申请的权利要求范围中,任何他人完成的技术实体或方法,若是与申请的权利要求范围所定义的完全相同,也或 是一种等效的变更,均将被视为涵盖于该权利要求范围之中。

Claims (14)

  1. 一种文本加密交互方法,其特征在于,包括:
    发送方将待发送的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种;
    接收方获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。
  2. 根据权利要求1所述的文本加密交互方法,其特征在于,所述接收方以拍摄的方式获取所述以字符的形式显示的加密数据的图像。
  3. 根据权利要求1所述的文本加密交互方法,其特征在于,所述接收方得到所述文本数据后,将该文本数据显示。
  4. 根据权利要求1所述的文本加密交互方法,其特征在于,所述接收方得到所述文本数据后,将该文本数据存储。
  5. 一种权利要求1-4中任意一项所述的文本加密交互方法中所采用的文本数据加密方法,其特征在于,包括对待加密的文本数据进行加密运算,使得加密运算后得到的加密数据能够以字符的形式显示,所述字符至少包括字母、数字、文字以及可被唯一辨认的符号中的一种。
  6. 根据权利要求5所述的文本数据加密方法,其特征在于,对所述文本数据分段进行加密。
  7. 根据权利要求5或6所述的文本数据加密方法,其特征在于,所述加密数据中设置有校验位,对所加密数据的正确性进行校验。
  8. 一种文本数据加密装置,其特征在于,采用如权利要求5-7中任意一项所述的文本数据加密方法对文本数据进行加密。
  9. 一种权利要求1-4中任意一项所述的文本加密交互方法中所采用的文本数据解密方法,其特征在于,包括获取所述以字符的形式显示的加密数据的图像,对所述图像上的字符进行识别,对识别得到的加密数据进行与所述加密运算相对应的解密运算,得到所述文本数据。
  10. 根据权利要求9所述的文本数据解密方法,其特征在于,所述文本数据在加密运算时以分段的方式进行加密运算,解密时根据加密运算时的分段,对所述加密数据分段进行解密。
  11. 根据权利要求9或10所述的文本数据解密方法,其特征在于,所述加密数据中设置有校验位,根据所述校验位在解密运算之前对所述加密数据的正确性进行校验。
  12. 一种数据解密装置,其特征在于,采用如权利要求9-11中任意一项所 述的文本数据解密方法对加密数据进行解密。
  13. 根据权利要求12所述的解密装置,其特征在于,包括拍摄模块和显示模块,所述拍摄模块以拍摄方式获取所述以字符的形式显示的加密数据的图像,所述显示模块将所拍摄的图像进行显示,同时将图像中以字符的形式显示的加密数据在相应的位置替换成所述文本数据。
  14. 根据权利要求13所述的解密装置,其特征在于,所述显示模块包括预览框,所述预览框实时的显示所述拍摄模块实时获取的图像,当所述预览框中显示有加密数据时,所述显示模块将加密数据在相应的位置替换成所述文本数据。
PCT/CN2014/088888 2013-10-21 2014-10-20 文本加密交互方法、加密方法及装置、解密方法及装置 WO2015058658A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310494287.3A CN103532960B (zh) 2013-10-21 2013-10-21 解密装置
CN201310494287.3 2013-10-21

Publications (1)

Publication Number Publication Date
WO2015058658A1 true WO2015058658A1 (zh) 2015-04-30

Family

ID=49934639

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/088888 WO2015058658A1 (zh) 2013-10-21 2014-10-20 文本加密交互方法、加密方法及装置、解密方法及装置

Country Status (2)

Country Link
CN (1) CN103532960B (zh)
WO (1) WO2015058658A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532960B (zh) * 2013-10-21 2017-09-26 上海合合信息科技发展有限公司 解密装置
CN104486081A (zh) * 2014-12-15 2015-04-01 英华达(上海)科技有限公司 Nfc设备数据的加密传输方法和系统
CN105577361A (zh) * 2015-04-20 2016-05-11 宇龙计算机通信科技(深圳)有限公司 一种信息处理方法及其装置
CN104993923B (zh) * 2015-07-02 2018-03-27 武汉大学 一种信息隐藏与加密技术相结合的雷达数据保护方法
CN105429866B (zh) * 2016-01-01 2018-09-11 江苏图码信息科技有限公司 私信码产品
CN108337233B (zh) * 2017-12-26 2021-07-23 广东辰宜信息科技有限公司 一种对内容信息加密的方法、电子设备及存储介质
CN113139534B (zh) * 2021-05-06 2022-07-15 上海交通大学 两阶段安全多方计算的图片文本定位识别方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118710A (zh) * 2011-03-08 2011-07-06 上海红松信息技术有限公司 手机终端之间数据传输系统及其传输方法
CN102546174A (zh) * 2011-12-20 2012-07-04 贾松仁 二维码加密/解密方法和防伪方法
CN102624529A (zh) * 2012-03-12 2012-08-01 深圳市文鼎创数据科技有限公司 动态令牌密钥因子的设置方法和装置
CN103532960A (zh) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 文本加密交互方法、加密方法及装置、解密方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459723A (zh) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 手机信息的保密处理方法
CN102073977A (zh) * 2010-12-13 2011-05-25 中国联合网络通信集团有限公司 数字签名的生成和验证方法、设备及系统
CN102334306A (zh) * 2011-07-18 2012-01-25 华为终端有限公司 一种信息即时加密解密的方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118710A (zh) * 2011-03-08 2011-07-06 上海红松信息技术有限公司 手机终端之间数据传输系统及其传输方法
CN102546174A (zh) * 2011-12-20 2012-07-04 贾松仁 二维码加密/解密方法和防伪方法
CN102624529A (zh) * 2012-03-12 2012-08-01 深圳市文鼎创数据科技有限公司 动态令牌密钥因子的设置方法和装置
CN103532960A (zh) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 文本加密交互方法、加密方法及装置、解密方法及装置

Also Published As

Publication number Publication date
CN103532960B (zh) 2017-09-26
CN103532960A (zh) 2014-01-22

Similar Documents

Publication Publication Date Title
WO2015058658A1 (zh) 文本加密交互方法、加密方法及装置、解密方法及装置
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN104125210B (zh) 增强保密性的头戴式显示装置及用其访问加密信息的方法
JP4931924B2 (ja) メディアデータ処理装置及びメディアデータ処理方法
JP6814147B2 (ja) 端末、方法、不揮発性記憶媒体
EP3955146A1 (en) Identity management service using a block chain
US9530134B2 (en) Authentication on mobile device using two-dimensional code
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
KR20140042905A (ko) 신원 인증 관리 장치 및 신원 인증 관리 방법
CN105678114B (zh) 一种照片的预览方法及装置
TWI505126B (zh) 獲取金鑰的方法和裝置
JP2018207294A (ja) 画像情報検証装置
WO2017128486A1 (zh) 解锁方法、解锁装置及可穿戴智能设备和终端
CN106375274A (zh) 消息加密
US20230196830A1 (en) Verification of liveness and person id to certify digital image
CN108900472B (zh) 信息的传输方法和装置
US11558375B1 (en) Password protection with independent virtual keyboard
TWI493939B (zh) A Communication System Using Fingerprint Information Authentication and Its Use
JP6541311B2 (ja) 暗号情報コードを利用した復号システム、プログラム及び方法
WO2015028339A1 (en) Mobile transaction data verification device and method of data verification
CN116756750A (zh) 医疗敏感数据采集脱敏方法
CN105025203A (zh) 结合生理特征之影像加解密方法及其影像捕获设备
TWI667591B (zh) Method for safely transferring pictures
CN110740112B (zh) 认证方法、装置和计算机可读存储介质
CN105787320A (zh) 隐私数据的入侵检测方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14856548

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 25/07/2016 )

122 Ep: pct application non-entry in european phase

Ref document number: 14856548

Country of ref document: EP

Kind code of ref document: A1