WO2018014489A1 - 加密拍摄方法和装置 - Google Patents

加密拍摄方法和装置 Download PDF

Info

Publication number
WO2018014489A1
WO2018014489A1 PCT/CN2016/108887 CN2016108887W WO2018014489A1 WO 2018014489 A1 WO2018014489 A1 WO 2018014489A1 CN 2016108887 W CN2016108887 W CN 2016108887W WO 2018014489 A1 WO2018014489 A1 WO 2018014489A1
Authority
WO
WIPO (PCT)
Prior art keywords
encrypted
fingerprint
pressure value
decrypted
valid
Prior art date
Application number
PCT/CN2016/108887
Other languages
English (en)
French (fr)
Inventor
柳勇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018014489A1 publication Critical patent/WO2018014489A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the embodiments of the present invention relate to the field of photographing technologies, and in particular, to a photographing and encryption method and apparatus.
  • mobile phones, PADs (tablets) and other mobile terminals are usually equipped with a camera, and the user can perform photographing, video recording, etc., and the frequency of use is high.
  • the encryption processing method is usually based on The password entered by the user encrypts the file.
  • the related method of encrypting and shooting a document is cumbersome, and at least a plurality of steps such as photographing, saving a shooting file, opening an encryption software, inputting an encryption password, and saving an encryption setting are required to complete the encryption of the captured file, and the user experience is poor.
  • the main purpose of the embodiments of the present invention is to provide an encryption shooting method and apparatus, which aims to solve the technical problem that the encryption process of the captured file is cumbersome.
  • an embodiment of the present invention provides an encrypted photographing method, and the encrypted photographing method includes the following steps:
  • the shooting device is controlled to perform shooting, and a shooting file is obtained;
  • the captured file is encrypted according to the encrypted information.
  • the encrypted information includes a valid fingerprint and an effective pressure value interval, the received input encrypted instruction to acquire an encrypted pressure value, according to pre-configured encrypted information
  • the steps of verifying the encrypted pressure value include:
  • the execution step is: controlling shooting
  • the device takes a picture and gets a shot file.
  • the encrypted information includes a plurality of valid fingerprints, and an effective pressure value interval corresponding to the valid fingerprints, wherein the encrypted fingerprint matches the valid fingerprint, and the encrypted pressure value is located In the interval of the effective pressure value, the step of determining that the encrypted fingerprint and the encrypted pressure value pass the verification includes:
  • the encrypted pressure value is located in an effective pressure value interval corresponding to the valid fingerprint matching the encrypted fingerprint, determining the encrypted fingerprint and The encrypted pressure value is verified.
  • the method further includes:
  • the photographed file is decrypted.
  • the step of decrypting the captured file includes:
  • the shot file is decrypted within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint.
  • an embodiment of the present invention further provides an encrypted photographing apparatus, where the encrypted photographing apparatus includes:
  • a verification module configured to receive the input encrypted shooting instruction and obtain an encrypted pressure value, and verify the encrypted pressure value according to the pre-configured encryption information
  • a shooting module configured to control the photographing device to perform shooting if the encrypted pressure value passes the verification, to obtain a shooting file
  • the encryption module is configured to encrypt the captured file according to the encrypted information.
  • the encryption information includes a valid fingerprint and an effective pressure value interval
  • the verification module is further configured to:
  • Receiving the input encrypted shooting instruction obtaining an encrypted fingerprint and an encrypted pressure value corresponding to the encrypted fingerprint; if the encrypted fingerprint matches the valid fingerprint, and the encrypted pressure value is within the effective pressure value interval, determining The encrypted fingerprint and the encrypted pressure value are verified.
  • the encryption information includes a plurality of valid fingerprints, and an effective pressure value interval corresponding to each valid fingerprint
  • the verification module is further configured to:
  • the encrypted pressure value is located in an effective pressure value interval corresponding to the valid fingerprint matching the encrypted fingerprint, determining the encrypted fingerprint and The encrypted pressure value is verified.
  • the encrypted photographing apparatus further includes:
  • a decryption module configured to acquire a decrypted fingerprint and a corresponding decryption pressure value according to the decryption instruction input based on the encrypted captured file; if a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, The decryption pressure value is located in the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, and the captured file is decrypted.
  • the decryption module is further configured to
  • the captured file is decrypted.
  • a computer storage medium is further provided, and the computer storage medium may store an execution instruction for executing the encrypted photographing method in the above embodiment.
  • An encryption shooting method and apparatus after receiving an input encrypted shooting instruction, acquiring an encryption pressure value carried by an encrypted shooting instruction, and verifying an encryption pressure value according to the pre-configured encryption information; if the encryption pressure value passes the school In the test, the photographing device is controlled to shoot, and the photographed file is obtained; then, the photographed file is encrypted according to the encrypted information, and the encrypted photographed file is saved, thereby realizing the encryption of the photographed file.
  • the user only needs to input the pressure to control the automatic encryption of the photographed photos or videos, without the user having to manually input the password, and the technical problem of solving the encryption process of the captured file is cumbersome, which greatly simplifies the encrypted shooting file. step.
  • FIG. 1 is a schematic flow chart of a first embodiment of an encrypted photographing method according to the present invention
  • FIG. 2 is a schematic flow chart of a second embodiment of an encrypted photographing method according to the present invention.
  • FIG. 3 is a schematic flow chart of a third embodiment of an encrypted photographing method according to the present invention.
  • FIG. 4 is a schematic flow chart of a fourth embodiment of an encrypted photographing method according to the present invention.
  • FIG. 5 is a schematic flowchart diagram of a fifth embodiment of an encrypted photographing method according to the present invention.
  • FIG. 6 is a first embodiment, a second embodiment, and a third embodiment of an encrypted photographing apparatus of the present invention. Functional module diagram;
  • FIG. 7 is a schematic diagram of functional modules of a fourth embodiment and a fifth embodiment of an encrypted photographing apparatus according to the present invention.
  • the main solution of the embodiment of the present invention is: receiving an input encrypted shooting instruction and acquiring an encrypted pressure value, and verifying the encrypted pressure value according to the pre-configured encryption information; if the encrypted pressure value passes the verification, controlling the shooting device Shooting is performed to obtain a shot file; the shot file is encrypted according to the encrypted information.
  • the invention provides a solution, which enables the user to control the automatic encryption of the photographed photos or videos by only inputting the pressure, without the need for the user to manually input the password, and solves the technical problem of the cumbersome process of the captured file, which greatly simplifies.
  • the steps to encrypt the captured file are described in detail below.
  • a first embodiment of an encrypted photographing method of the present invention provides an encrypted photographing method, and the encrypted photographing method includes:
  • Step S10 Receive an input encrypted shooting instruction and obtain an encrypted pressure value, and verify the encrypted pressure value according to the pre-configured encryption information.
  • the mobile terminal is controlled to enter the encrypted shooting mode by the user input pressure, and the captured file is automatically encrypted in the encrypted shooting mode, which is simple and convenient to operate, and simplifies the steps of encrypting the captured file.
  • This embodiment illustrates an example in which a user uses a camera of a mobile terminal to perform shooting.
  • the mobile terminal detects the encrypted shooting instruction input by the user.
  • the photographing device is a device capable of taking photographs and photographing, such as a camera or the like.
  • the user can input an encrypted shooting instruction in various manners.
  • a control button for encrypting shooting is displayed in the display interface of the mobile terminal, and the user is prompted to input the encryption after selecting the control button for the encrypted shooting.
  • the pressure value the user can press the input pressure on the pressure sensing device configured on the mobile terminal, or press the input pressure in the preset area on the pressure sensing screen of the mobile terminal, and the mobile terminal detects the pressure input by the user, and determines the detection.
  • the encrypted shooting instruction input by the user is acquired, and the pressure value input by the user is obtained as the encrypted pressure value of the encrypted shooting instruction.
  • the mobile terminal may not provide the control button for the encrypted shooting.
  • the shooting device After the shooting device is activated, if the user presses the input pressure on the pressure sensing device, or in the preset area on the pressure sensing screen.
  • the mobile terminal determines that the encrypted photographing instruction input by the user is detected, and acquires the pressure value input by the user as the encrypted pressure value of the encrypted photographing instruction.
  • the mobile terminal After detecting that the user inputs the encrypted shooting instruction, the mobile terminal acquires the encrypted pressure value carried in the encrypted shooting instruction.
  • the pre-configured encrypted information may be a fixed effective pressure value or an effective pressure value interval, and the user may set the effective pressure value in advance.
  • This embodiment exemplifies the encrypted information as an effective pressure value interval.
  • the mobile terminal calculates the effective pressure value according to the effective pressure value and the pressure value floating range input by the user. Interval and configure encryption information.
  • the mobile terminal determines that the encrypted pressure value passes the check; if the encrypted pressure value is not within the effective pressure value interval, the mobile terminal determines that the encrypted pressure value has not passed the check.
  • the mobile terminal calculates the effective pressure value as [8N, 12N], that is, the pressure value in the range of 8N to 12N is valid. Then, if the encryption pressure value input by the user is less than 8N or greater than 12N, it is determined that the encrypted pressure value has not passed the verification; otherwise, it is determined that the encrypted pressure value input by the user passes the verification.
  • Step S20 If the encrypted pressure value passes the verification, the shooting device is controlled to perform shooting to obtain a shooting file.
  • the mobile terminal After the verification result of the encrypted pressure value is obtained, if the encrypted pressure value passes the verification, it is determined that the encrypted shooting instruction passes the verification, and the mobile terminal is controlled to enter the encrypted shooting mode.
  • the shooting of the photo and/or the recording of the video is performed according to the shooting instruction input by the user, and the obtained photo and/or video is the shooting file obtained in the current encrypted shooting mode.
  • the imaging device configured with the mobile terminal can only perform one shooting in the encrypted shooting mode, that is, in the encrypted shooting mode, the user can only take one photo or record a video.
  • the mobile terminal controls to automatically exit the encrypted shooting mode.
  • the photographing apparatus configuring the mobile terminal can perform multiple shots in the encrypted photographing mode, that is, in the encrypted photographing mode, the user can take multiple photos and/or record multiple videos, and the mobile terminal shoots the files. Encrypt.
  • Step S30 Encrypt the captured file according to the encrypted information.
  • the mobile terminal After the captured file is obtained, the mobile terminal encrypts the captured file according to the encrypted information.
  • the character string corresponding to the encrypted information may be used as a secret key to encrypt the captured file. Then, save the encrypted shot file.
  • the decryption command is required to decrypt the captured file.
  • the decryption pressure value is obtained according to the decryption instruction input based on the photographing file; the decryption pressure value is verified according to the encrypted information, and if the decryption pressure value passes the verification, the photographed file is decrypted.
  • the decryption pressure value is verified, if the decryption pressure value is equal to the effective pressure value, or the decryption pressure value is within the effective pressure value interval, it is determined that the decryption pressure value is verified, and the decryption command is valid.
  • the decryption process is more convenient for the encrypted file obtained by encrypting the captured file based on the pressure value.
  • the user may input the encrypted pressure value or the decryption pressure value input by the user in real time on the screen of the mobile terminal when the user inputs the encrypted shooting instruction or the decryption instruction.
  • the encrypted pressure value carried by the encrypted shooting instruction is obtained, and the encrypted pressure value is verified according to the pre-configured encrypted information; if the encrypted pressure value is verified, the shooting device is controlled to shoot. , the captured file is obtained; then, the captured file is encrypted according to the encrypted information, and the encrypted captured file is saved, and the captured file is encrypted.
  • the user only needs to input the pressure to control the automatic encryption of the captured photos or videos, without the need for the user to manually input the password, and the technical problem of solving the encryption process of the captured file is cumbersome, which greatly simplifies the encrypted shooting. The steps of the file.
  • a second embodiment of the present invention provides an encrypted photographing method.
  • the encrypted information includes an effective fingerprint and an effective pressure value interval.
  • S10 includes:
  • Step S11 Receive an input encrypted shooting instruction, and obtain an encrypted fingerprint and an encrypted pressure value corresponding to the encrypted fingerprint.
  • Step S12 If the encrypted fingerprint matches the valid fingerprint, and the encrypted pressure value is within the effective pressure value interval, it is determined that the encrypted fingerprint and the encrypted pressure value pass the verification, and the execution step is performed. :S20.
  • the pre-configured encrypted information includes a pre-entered valid fingerprint and the valid The effective pressure value interval corresponding to the fingerprint.
  • the user when setting the encryption information, the user may input an effective fingerprint based on the fingerprint identification device, and input an effective pressure value based on the pressure sensing device.
  • the mobile terminal configures an effective pressure value interval corresponding to the valid fingerprint according to the effective pressure value input by the user and the preset allowable floating range.
  • the encrypted information is obtained, and the encrypted information includes an effective fingerprint value interval corresponding to the valid fingerprint and the valid fingerprint.
  • the fingerprint identification device and the pressure sensing device may be deployed in the same identifier, and the pressure value pressed by the user when the valid fingerprint is entered is obtained, and the effective fingerprint is configured.
  • Corresponding effective pressure value interval That is, the encrypted information includes a valid fingerprint, and an effective pressure value interval corresponding to the input when the valid fingerprint is entered.
  • the user can input the encrypted fingerprint through the recognizer, press the recognizer to input the encryption pressure, and input the encrypted shooting instruction.
  • the user can input the encrypted shooting instruction through a simple pressing action, and the operation is simple and convenient.
  • the mobile terminal when receiving the encrypted shooting instruction input by the user, acquires the encrypted fingerprint carried by the encrypted shooting instruction, and the encrypted pressure value corresponding to the input when the user inputs the encrypted fingerprint.
  • the mobile terminal separately checks the encrypted fingerprint and the encrypted pressure value according to the encrypted information.
  • the shooting device is controlled to perform shooting in the encrypted shooting mode to obtain a shooting file.
  • the captured file is encrypted based on the encrypted information, for example, the obtained fingerprint file is encrypted using the valid fingerprint in the encrypted information and the character string corresponding to the valid pressure value interval as the secret key. Then, save the encrypted shot file.
  • the encrypted fingerprint does not match the valid fingerprint, or the encrypted pressure value is not within the effective pressure value interval, it is determined that the encrypted fingerprint and the encrypted pressure value have not passed the verification, and the encrypted shooting mode is not entered, thereby ensuring the rights of the owner of the mobile terminal. , to avoid the troubles caused by other users to perform encrypted shooting without the owner's permission.
  • the encrypted information includes an effective fingerprint and an effective pressure value interval, and after receiving the encrypted shooting instruction input by the user, acquiring the encrypted fingerprint and the encrypted fingerprint carried by the encrypted shooting instruction. Corresponding encryption pressure value; if the encrypted fingerprint matches the valid fingerprint, and the encryption pressure value is within the effective pressure value interval, it is determined that the encrypted fingerprint and the encrypted pressure value are verified, the shooting device is controlled to shoot, and the obtained captured file is encrypted. .
  • one-key encryption is performed by fingerprint and touch pressure, which greatly improves the usability of the encrypted photographing.
  • the encrypted fingerprint and the encryption pressure can be simultaneously input, the security of the encrypted shooting is improved by the dual control of the fingerprint and the pressure value without increasing the operation steps.
  • the method further includes:
  • the captured file is decrypted.
  • the encrypted file needs to be decrypted first. After selecting the encrypted shooting file, the user can press the fingerprint on the recognizer to input the decryption command.
  • the mobile terminal When receiving the decryption instruction, the mobile terminal acquires the decrypted fingerprint carried in the decryption instruction and the decryption pressure value generated when the decrypted fingerprint is entered.
  • the mobile terminal separately checks the decrypted fingerprint and the decrypted pressure value based on the encrypted information.
  • the decrypted fingerprint matches the valid fingerprint and the decryption pressure value is within the effective pressure value interval, it is determined that the decrypted fingerprint and the decrypted pressure value are verified to decrypt the captured file.
  • the valid fingerprint in the encrypted information and the character string corresponding to the valid pressure value interval are used as the secret key, and the captured file is decrypted to display the encrypted photo or video.
  • the decrypted fingerprint does not match the valid fingerprint, or the decryption pressure value is not within the effective pressure value interval, it is determined that the decrypted fingerprint and the decrypted pressure value have not passed the verification, and the captured file is not decrypted. You can also prompt the user to view the photo or video, and ask the user to enter the fingerprint again to decrypt it.
  • the double verification of the fingerprint and the pressure value is realized, and the file is decrypted only when the fingerprint and the pressure value are verified, thereby ensuring the security of the file.
  • the encrypted fingerprint and the encryption pressure can be input at the same time, without increasing the operation steps, Through the dual control of fingerprint and pressure value, the security of the decrypted file is improved.
  • a third embodiment of the present invention provides an encrypted photographing method.
  • the encrypted information includes a plurality of valid fingerprints, and the valid fingerprints.
  • the step S12 includes:
  • Step S13 If a valid fingerprint matching the encrypted fingerprint is found in the encrypted information, and the encrypted pressure value is located in an effective pressure value interval corresponding to the valid fingerprint matching the encrypted fingerprint, determining the The encrypted fingerprint and the encrypted pressure value are verified.
  • the user can input multiple fingerprints to configure the encrypted information.
  • the user may separately press and input multiple effective fingerprints on the identifier, and the mobile terminal configures each valid according to the pressure value input when the user inputs each valid fingerprint and the pre-configured floating range.
  • the effective pressure value interval corresponding to the fingerprint may be separately press and input multiple effective fingerprints on the identifier, and the mobile terminal configures each valid according to the pressure value input when the user inputs each valid fingerprint and the pre-configured floating range.
  • the encrypted information is generated according to each valid fingerprint and the effective pressure value interval corresponding to each valid fingerprint.
  • the mobile terminal After receiving the encrypted shooting instruction input by the user and verifying the encrypted fingerprint and the encrypted pressure value according to the encrypted information, the mobile terminal searches for valid fingerprints matching the encrypted fingerprint among the valid fingerprints in the encrypted information.
  • the encrypted pressure value is verified, and it is determined whether the encrypted pressure value is within the effective pressure value interval corresponding to the found valid fingerprint.
  • the shooting device is controlled to perform shooting in the encrypted shooting mode to obtain a shooting file.
  • the captured file is encrypted.
  • the captured file is encrypted by using all valid fingerprints in the encrypted information and a character string corresponding to the corresponding effective pressure value interval as a secret key. Then, the obtained encrypted captured file is saved.
  • the user can separately input the fingerprint of 10 fingers as the effective fingerprint, and the mobile terminal configures each valid fingerprint according to the pressing pressure when the user inputs 10 effective fingerprints respectively.
  • the valid pressure value interval is obtained as the encrypted information for each valid fingerprint obtained and the effective pressure value interval corresponding to each valid fingerprint.
  • the user enters the first fingerprint it prompts “Up to 10 fingerprints can be entered, whether to continue to enter”. If the user selects “No”, the valid fingerprint and the corresponding pressure value are saved and the recording is stopped; if the user selects “Yes” Save the current fingerprint and the corresponding pressure value, enter the second fingerprint, and continue to prompt "Up to 10 fingerprints can be entered. Continue to enter", and so on.
  • the fingerprint entry process is ended until the 10th fingerprint and the corresponding pressure are entered.
  • the mobile terminal configures an effective pressure value interval corresponding to each valid fingerprint according to the pressure value corresponding to each valid fingerprint and the preset floating range. Then, according to the obtained valid fingerprints and the corresponding effective pressure value intervals, the encrypted information is configured.
  • the user can press the identifier through any one of the 10 fingers to input the encrypted fingerprint and the corresponding encrypted pressure value. If the valid fingerprint matching the encrypted fingerprint is found in the encrypted information, and the encrypted pressure value is within the effective pressure value interval corresponding to the found valid fingerprint, it is determined that the encrypted fingerprint and the encrypted pressure value are valid, and the control enters the encrypted shooting mode.
  • the captured file is encrypted using the encrypted information including the 10 valid fingerprints and their corresponding valid pressure value intervals.
  • the valid fingerprint matching the encrypted fingerprint is not found in the encrypted information, or the encrypted pressure value is not within the effective pressure value interval corresponding to the valid fingerprint matching the encrypted fingerprint, it is determined that the encrypted fingerprint and the encrypted pressure value verification fails, Perform encrypted shooting.
  • the valid information includes a plurality of valid fingerprints and a corresponding effective pressure value interval. If the valid fingerprint matching the encrypted fingerprint is found in the encrypted information, and the encrypted pressure value is located in the effective fingerprint matching the encrypted fingerprint. Within the valid pressure value interval, it is determined that the encrypted fingerprint and the encrypted pressure value are verified, and the subject needs to be encrypted.
  • the encrypted information by configuring the encrypted information to include multiple valid fingerprints and corresponding effective pressure value intervals, any set of encrypted fingerprints input by the user and the corresponding encrypted pressure value can be entered into the encrypted shooting mode after being verified, and the fingerprint can be More selective options increase the flexibility of control over encrypted shooting modes.
  • the fourth embodiment of the present invention provides an encrypted photographing method. Based on the embodiment shown in FIG. 3, after the step S30, the method further includes:
  • Step S40 Acquire a decrypted fingerprint and a corresponding decryption pressure value according to the decryption instruction input based on the encrypted captured file.
  • Step S50 If a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, and the decrypted pressure value is located in an effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, decrypting the Shoot the file.
  • the encrypted file needs to be decrypted first.
  • the user may press the fingerprint on the recognizer to input a decryption instruction.
  • the mobile terminal When receiving the decryption instruction, the mobile terminal acquires the decrypted fingerprint carried in the decryption instruction and the decryption pressure value generated when the decrypted fingerprint is entered.
  • the mobile terminal verifies the decrypted fingerprint and the decrypted pressure value based on the encrypted information.
  • the mobile terminal searches for a valid fingerprint that matches the encrypted fingerprint among the plurality of valid fingerprints of the encrypted information.
  • the decryption pressure value is within the effective pressure value range of the found valid fingerprint, it is determined that the decrypted fingerprint and the decrypted pressure value are verified to decrypt the captured file.
  • each valid fingerprint in the encrypted information and a character string corresponding to the corresponding effective pressure value interval are used as a secret key, and the captured file is decrypted.
  • the decryption pressure value is not within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, it is determined that the decrypted fingerprint and the decrypted pressure value verification fails, Decrypt the file.
  • the mobile terminal acquires the decryption pressure value corresponding to the decrypted fingerprint and the decrypted fingerprint according to the decryption instruction;
  • the encrypted information is verified by the decrypted fingerprint and the decrypted pressure value. If a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, and the decrypted pressure value is within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, the captured file is decrypted. .
  • the double verification of the fingerprint and the pressure value is realized, and the file is decrypted only when the fingerprint and the pressure value are verified, thereby ensuring the security of the file.
  • the encrypted fingerprint and the encryption pressure can be simultaneously input, the security of the decrypted file is improved by the dual control of the fingerprint and the pressure value without increasing the operation steps.
  • the encrypted information includes a plurality of valid fingerprints and corresponding effective pressure value intervals, the user only needs to input a set of matching decrypted fingerprints and decryption pressure values to decrypt the captured file, and the user can selectively many.
  • the fifth embodiment of the present invention provides an encrypted photographing method.
  • the step S50 includes:
  • Step S51 If a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, and the decrypted pressure value is in an effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, decrypting the Shoot the file.
  • the encrypted file needs to be decrypted first.
  • the user may press the fingerprint on the recognizer to input a decryption instruction.
  • the mobile terminal When receiving the decryption instruction, the mobile terminal acquires the decrypted fingerprint carried in the decryption instruction and the decryption pressure value generated when the decrypted fingerprint is entered.
  • the mobile terminal verifies the decrypted fingerprint and the decrypted pressure value based on the encrypted information.
  • the mobile terminal searches for a valid fingerprint that matches the encrypted fingerprint among the plurality of valid fingerprints of the encrypted information.
  • a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, it is determined whether the found valid fingerprint matches the input encrypted fingerprint when the user captures the currently encrypted captured file in the encrypted shooting mode.
  • the valid fingerprint found here matches the encrypted fingerprint, that is, the current decrypted fingerprint is
  • the encrypted fingerprint of the encrypted shooting mode is turned on, and it is determined whether the decrypted pressure value is within the effective pressure value range of the found valid fingerprint.
  • the decryption pressure value is within the effective pressure value range of the found valid fingerprint, it is determined that the decrypted fingerprint and the decrypted pressure value are verified to decrypt the captured file.
  • each valid fingerprint in the encrypted information and a character string corresponding to the corresponding effective pressure value interval are used as a secret key, and the captured file is decrypted.
  • the decrypted fingerprint If the valid fingerprint matching the decrypted fingerprint is not found in the encrypted information, or the valid fingerprint matching the decrypted fingerprint does not match the encrypted fingerprint, or the decrypted pressure value is not within the effective pressure value corresponding to the valid fingerprint matching the decrypted fingerprint , it is determined that the decryption fingerprint and the decryption pressure value verification fails, and the file decryption is not performed.
  • the mobile terminal acquires the decryption pressure value corresponding to the decrypted fingerprint and the decrypted fingerprint according to the decryption instruction; and then, according to the encrypted information, the decrypted fingerprint and the decrypted pressure value are verified, if A valid fingerprint matching the decrypted fingerprint is found in the encrypted information, and the valid fingerprint matching the decrypted fingerprint matches the encrypted fingerprint, and the decrypted pressure value is within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, and then the decrypted shooting is performed. file.
  • the double verification of the fingerprint and the pressure value is realized, and the file is decrypted only when the fingerprint and the pressure value are verified, thereby ensuring the security of the file.
  • the encryption and decryption of the captured file must be the same fingerprint of the user, and the decryption pressure value and the encrypted pressure value are both in the same effective pressure value interval, which enhances the security of the encrypted shooting.
  • the first embodiment of the encrypted photographing apparatus of the present invention provides an encrypted photographing apparatus, and the encrypted photographing apparatus includes:
  • the verification module 10 is configured to receive the input encrypted shooting instruction and obtain an encrypted pressure value, and verify the encrypted pressure value according to the pre-configured encryption information.
  • the mobile terminal is controlled to enter the encrypted shooting mode by the user input pressure, and the captured file is automatically performed in the encrypted shooting mode.
  • Encryption processing simple and convenient operation, simplifies the steps of encrypting and shooting files.
  • This embodiment illustrates an example in which a user uses a camera of a mobile terminal to perform shooting.
  • the encrypted camera can be deployed in the mobile terminal.
  • the verification module 10 detects the encrypted photographing instruction input by the user.
  • the photographing device is a device capable of taking photographs and photographing, such as a camera or the like.
  • the user can input an encrypted shooting instruction in various manners.
  • a control button for encrypting shooting is displayed in the display interface of the mobile terminal, and the user is prompted to input the encryption after selecting the control button for the encrypted shooting.
  • the pressure value the user can press the input pressure on the pressure sensing device configured on the mobile terminal, or press the input pressure in the preset area on the pressure sensing screen of the mobile terminal, and after the verification module 10 detects the pressure input by the user, It is determined that the encrypted shooting instruction input by the user is detected, and the pressure value input by the user is acquired as the encrypted pressure value of the encrypted shooting instruction.
  • the verification module 10 may not provide the control button for the encrypted shooting. After the shooting device is activated, if the user presses the input pressure on the pressure sensing device, or presets on the pressure sensing screen. When the input pressure is pressed in the area, the verification module 10 determines that the encrypted shooting instruction input by the user is detected, and acquires the pressure value input by the user as the encrypted pressure value of the encrypted shooting instruction.
  • the verification module 10 After detecting that the user inputs the encrypted shooting instruction, the verification module 10 acquires the encrypted pressure value carried in the encrypted shooting instruction.
  • the verification module 10 then verifies the encrypted pressure value based on the pre-configured encryption information.
  • the pre-configured encrypted information may be a fixed effective pressure value or an effective pressure value interval, and the user may set the effective pressure value in advance.
  • This embodiment exemplifies the encrypted information as an effective pressure value interval.
  • the mobile terminal calculates the effective pressure value according to the effective pressure value and the pressure value floating range input by the user. Interval and configure encryption information.
  • the verification module 10 determines that the encrypted pressure value passes the check; if the encrypted pressure value is not within the effective pressure value interval, the verification module 10 determines that the encrypted pressure value has not passed the check.
  • the mobile terminal calculates the effective pressure value as [8N, 12N], that is, the pressure value in the range of 8N to 12N is valid. Then, if the encryption pressure value input by the user is less than 8N or greater than 12N, the verification module 10 determines that the encryption pressure value has not passed the verification; otherwise, the verification module 10 determines that the encryption pressure value input by the user passes the verification.
  • the verification module 10 obtains the verification result of the encrypted pressure value.
  • the photographing module 20 is configured to control the photographing device to perform photographing if the encrypted pressure value passes the verification to obtain a photographed file.
  • the photographing module 20 determines that the encrypted photographing instruction passes the check, and controls the mobile terminal to enter the encrypted photographing mode.
  • the shooting module 20 performs shooting of the photo and/or recording of the video according to the shooting instruction input by the user, and the obtained photo and/or video is the shooting file obtained in the current encrypted shooting mode.
  • the imaging device configured with the mobile terminal can only perform one shooting in the encrypted shooting mode, that is, in the encrypted shooting mode, the user can only take one photo or record a video.
  • the shooting module 20 controls to automatically exit the encrypted shooting mode.
  • the camera configured with the mobile terminal can perform multiple shootings in the encrypted shooting mode, that is, in the encrypted shooting mode, the user can take multiple photos and/or record multiple videos, and the encryption module 30 shoots The file is encrypted.
  • the shooting module 20 controls to exit the encrypted shooting mode.
  • the encryption module 30 is configured to encrypt the captured file according to the encrypted information, and save the encrypted captured file.
  • the encryption module 30 After the captured file is obtained, the encryption module 30 encrypts the captured file according to the encrypted information.
  • the character string corresponding to the encrypted information may be used as a secret key to encrypt the captured file.
  • the encryption module 30 then saves the encrypted captured file.
  • the decryption command is required to decrypt the captured file.
  • the decryption pressure value is obtained according to the decryption instruction input based on the photographing file; the decryption pressure value is verified according to the encrypted information, and if the decryption pressure value passes the verification, the photographed file is decrypted.
  • the decryption pressure value is verified, if the decryption pressure value is equal to the effective pressure value, or the decryption pressure value is within the effective pressure value interval, it is determined that the decryption pressure value is verified, and the decryption command is valid.
  • the decryption process is more convenient for the encrypted file obtained by encrypting the captured file based on the pressure value.
  • the user may input the encrypted pressure value or the decryption pressure value input by the user in real time on the screen of the mobile terminal when the user inputs the encrypted shooting instruction or the decryption instruction.
  • the verification module 10 after receiving the input encrypted shooting instruction, obtains the encrypted pressure value carried by the encrypted shooting instruction, and checks the encrypted pressure value according to the pre-configured encrypted information; if the encrypted pressure value passes the verification, the shooting is performed.
  • the module 20 controls the photographing device to perform photographing to obtain a photographed file; then, the encryption module 30 encrypts the photographed file according to the encrypted information, and saves the encrypted photographed file, thereby realizing encryption of the photographed file.
  • the user only needs to input the pressure to control the automatic encryption of the captured photos or videos, without the need for the user to manually input the password, and the technical problem of solving the encryption process of the captured file is cumbersome, which greatly simplifies the encrypted shooting. The steps of the file.
  • the second embodiment of the encrypted photographing apparatus of the present invention provides an encrypted photographing apparatus, wherein the encrypted information includes an effective fingerprint and an effective pressure value interval, and the verification module 10 Also set to,
  • Receiving the input encrypted shooting instruction obtaining an encrypted fingerprint and an encrypted pressure value corresponding to the encrypted fingerprint; if the encrypted fingerprint matches the valid fingerprint, and the encrypted pressure value is within the effective pressure value interval, determining The encrypted fingerprint and the encrypted pressure value are verified.
  • the pre-configured encryption information includes a pre-recorded valid fingerprint and an effective pressure value interval corresponding to the valid fingerprint.
  • the user when setting the encryption information, the user may input an effective fingerprint based on the fingerprint identification device, and input an effective pressure value based on the pressure sensing device.
  • the encrypted photographing device configures an effective pressure value interval corresponding to the effective fingerprint according to the effective pressure value input by the user and the preset allowable floating range. Thereby, the encrypted information is obtained, and the encrypted information includes an effective fingerprint value interval corresponding to the valid fingerprint and the valid fingerprint.
  • the fingerprint identification device and the pressure sensing device may be deployed in the same identifier, and the pressure value pressed by the user when the valid fingerprint is entered is obtained, and the effective fingerprint is configured.
  • Corresponding effective pressure value interval That is, the encrypted information includes a valid fingerprint, and an effective pressure value interval corresponding to the input when the valid fingerprint is entered.
  • the user can input the encrypted fingerprint through the recognizer, press the recognizer to input the encryption pressure, and input the encrypted shooting instruction.
  • the user can input the encrypted shooting instruction through a simple pressing action, and the operation is simple and convenient.
  • the verification module 10 obtains the encrypted fingerprint carried by the encrypted shooting instruction when receiving the encrypted shooting instruction input by the user, and the encrypted pressure value corresponding to the input when the user inputs the encrypted fingerprint.
  • the verification module 10 separately verifies the encrypted fingerprint and the encrypted pressure value based on the encrypted information.
  • the verification module 10 determines that the encrypted fingerprint and the encrypted pressure value pass the verification, and then the shooting module 20 controls the shooting device to shoot in the encrypted shooting mode. , get the filming file.
  • the encryption module 30 encrypts the captured file based on the encrypted information, for example, using the valid fingerprint in the encrypted information and the character string corresponding to the valid pressure value interval as the secret key to encrypt the obtained captured file. Then, save the encrypted shot file.
  • the verification module 10 determines that the encrypted fingerprint and the encrypted pressure value have not passed the verification, does not enter the encrypted shooting mode, and guarantees the rights of the owner of the mobile terminal, and prevents other users from performing without the owner's permission. The trouble caused by encrypted shooting.
  • the encrypted information includes an effective fingerprint and an effective pressure value interval.
  • the verification module 10 After receiving the encrypted shooting instruction input by the user, the verification module 10 obtains the encrypted fingerprint value corresponding to the encrypted fingerprint and the encrypted fingerprint carried by the encrypted shooting instruction; When the encrypted fingerprint matches the valid fingerprint, and the encrypted pressure value is within the effective pressure value interval, it is determined that the encrypted fingerprint and the encrypted pressure value pass the verification, the shooting module 20 controls the imaging device to perform the shooting, and the encryption module 30 encrypts the obtained captured file.
  • the shooting module 20 controls the imaging device to perform the shooting
  • the encryption module 30 encrypts the obtained captured file.
  • one-key encryption is performed by fingerprint and touch pressure, which greatly improves the usability of the encrypted photographing.
  • the encrypted fingerprint and the encryption pressure can be simultaneously input, the security of the encrypted shooting is improved by the dual control of the fingerprint and the pressure value without increasing the operation steps.
  • the encrypted photographing apparatus further includes:
  • the decryption module 40 is configured to receive a decryption instruction input based on the encrypted captured file, and obtain a decryption pressure value corresponding to the decrypted fingerprint and the decrypted fingerprint according to the decryption instruction; if the decrypted fingerprint matches the valid fingerprint And the decryption pressure value is within the valid pressure value interval, and the shot file is decrypted.
  • the encrypted file needs to be decrypted first. After selecting the encrypted shooting file, the user can press the fingerprint on the recognizer to input the decryption command.
  • the decryption module 40 When receiving the decryption instruction, the decryption module 40 acquires the decrypted fingerprint carried in the decrypted command, and the decrypted pressure value generated when the decrypted fingerprint is entered.
  • the decryption module 40 separately checks the decrypted fingerprint and the decrypted pressure value based on the encrypted information.
  • the decryption module 40 determines that the decrypted fingerprint and the decrypted pressure value pass the verification to decrypt the captured file. At the time of decryption, the decryption module 40 decrypts the captured file and displays the encrypted photo or video using the valid fingerprint in the encrypted information and the character string corresponding to the valid pressure value interval as the secret key.
  • the decryption module 40 determines that the decrypted fingerprint and the decrypted pressure value have not passed the verification, and does not decrypt the captured file. You can also prompt the user to view the photo or video, and ask the user to enter the fingerprint again to decrypt it.
  • the double verification of the fingerprint and the pressure value is realized, and the file is decrypted only when the fingerprint and the pressure value are verified, thereby ensuring the security of the file.
  • the encrypted fingerprint and the encryption pressure can be simultaneously input, the security of the decrypted file is improved by the dual control of the fingerprint and the pressure value without increasing the operation steps.
  • the third embodiment of the encrypted photographing apparatus of the present invention provides an encrypted photographing apparatus.
  • the encrypted information includes a plurality of valid fingerprints, and each of the The effective pressure value interval corresponding to the valid fingerprint, the verification module 10 is further configured to
  • the encrypted pressure value is located in an effective pressure value interval corresponding to the valid fingerprint matching the encrypted fingerprint, determining the encrypted fingerprint and The encrypted pressure value is verified.
  • the user can input multiple fingerprints to configure the encrypted information.
  • the user may separately press and input multiple effective fingerprints on the identifier, and the encrypted imaging device respectively configures the pressure values input according to the user when each valid fingerprint is entered, and the pre-configured floating range.
  • the effective pressure value interval corresponding to the valid fingerprint may be separately press and input.
  • the encrypted information is generated according to each valid fingerprint and the effective pressure value interval corresponding to each valid fingerprint.
  • the verification module 10 After receiving the encrypted shooting instruction input by the user and verifying the encrypted fingerprint and the encrypted pressure value according to the encrypted information, the verification module 10 searches for valid fingerprints matching the encrypted fingerprint among the valid fingerprints in the encrypted information.
  • the verification module 10 verifies the encrypted pressure value, and determines whether the encrypted pressure value is within the effective pressure value interval corresponding to the found effective fingerprint.
  • the verification module 10 determines that both the encrypted fingerprint and the encrypted pressure value pass the verification, and then the shooting module 20 controls the imaging device to perform the operation in the encrypted shooting mode. Shoot and get the shot file.
  • the encryption module 30 performs encryption processing on the captured file.
  • the captured file is encrypted by using all valid fingerprints in the encrypted information and a character string corresponding to the corresponding effective pressure value interval as a secret key. Then, the obtained encrypted captured file is saved.
  • the encrypted imaging device configures the effective pressure value interval corresponding to each valid fingerprint according to the pressing pressure when the user inputs 10 effective fingerprints respectively, and the obtained effective fingerprints are obtained.
  • the effective pressure value interval corresponding to each valid fingerprint is used as the encrypted information.
  • the user enters the first fingerprint it prompts “Up to 10 fingerprints can be entered, whether to continue to enter”. If the user selects “No”, the valid fingerprint and the corresponding pressure value are saved and the recording is stopped; if the user selects “Yes” Save the current fingerprint and the corresponding pressure value, enter the second fingerprint, and continue to prompt "Up to 10 fingerprints can be entered. Continue to enter”, and so on. After entering the 10th fingerprint and the corresponding pressure, the fingerprint entry process is ended. Then, the encrypted photographing device configures an effective pressure value interval corresponding to each valid fingerprint according to the pressure value corresponding to each valid fingerprint and the preset floating range. Then, according to the obtained valid fingerprints and the corresponding effective pressure value intervals, the encrypted information is configured.
  • the user can press the identifier through any one of the 10 fingers to input the encrypted fingerprint and the corresponding encrypted pressure value. If the verification module 10 finds a valid fingerprint matching the encrypted fingerprint in the encrypted information, and the encryption pressure value is within the effective pressure value interval corresponding to the found effective fingerprint, it is determined that the encrypted fingerprint and the encrypted pressure value are valid, and the control enters Encrypted shooting mode.
  • the encryption module 30 encrypts the captured file using the encrypted information including the 10 valid fingerprints and their corresponding effective pressure value intervals.
  • the verification module 10 determines the encrypted fingerprint and the encrypted pressure value. The test failed and no encrypted shooting was taken.
  • the valid information includes a plurality of valid fingerprints and a corresponding effective pressure value interval. If the valid fingerprint matching the encrypted fingerprint is found in the encrypted information, and the encrypted pressure value is located in the effective fingerprint matching the encrypted fingerprint. Within the valid pressure value interval, the verification module 10 determines that the encrypted fingerprint and the encrypted pressure value pass the verification, and needs to encrypt the subject.
  • the encrypted information by configuring the encrypted information to include multiple valid fingerprints and corresponding effective pressure value intervals, any set of encrypted fingerprints input by the user and the corresponding encrypted pressure value can be entered into the encrypted shooting mode after being verified, and the fingerprint can be More selective options increase the flexibility of control over encrypted shooting modes.
  • the fourth embodiment of the present invention provides an encrypted photographing apparatus.
  • the decryption module 40 is further configured to be based on the third embodiment of the encrypted photographing apparatus of the present invention.
  • the shot file is decrypted within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint.
  • the encrypted file needs to be decrypted first.
  • the user may press the fingerprint on the recognizer to input a decryption instruction.
  • the decryption module 40 When receiving the decryption instruction, the decryption module 40 acquires the decrypted fingerprint carried in the decrypted command, and the decrypted pressure value generated when the decrypted fingerprint is entered.
  • the decryption module 40 then verifies the decrypted fingerprint and the decrypted pressure value based on the encrypted information.
  • the decryption module 40 searches for a valid fingerprint that matches the encrypted fingerprint among the plurality of valid fingerprints of the encrypted information.
  • the decryption pressure value is within the effective pressure value range of the valid fingerprint found here, then it is determined The decrypted fingerprint and the decrypted pressure value are verified to decrypt the captured file.
  • each valid fingerprint in the encrypted information and a character string corresponding to the corresponding effective pressure value interval are used as a secret key, and the captured file is decrypted.
  • the decryption pressure value is not within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, it is determined that the decrypted fingerprint and the decrypted pressure value verification fails, Decrypt the file.
  • the decryption module 40 acquires the decrypted pressure value corresponding to the decrypted fingerprint and the decrypted fingerprint according to the decrypted instruction; and then, according to the encrypted information, the decrypted fingerprint and the decrypted pressure value are verified. If a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, and the decrypted pressure value is within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, the captured file is decrypted.
  • the double verification of the fingerprint and the pressure value is realized, and the file is decrypted only when the fingerprint and the pressure value are verified, thereby ensuring the security of the file.
  • the encrypted fingerprint and the encryption pressure can be simultaneously input, the security of the decrypted file is improved by the dual control of the fingerprint and the pressure value without increasing the operation steps.
  • the encrypted information includes a plurality of valid fingerprints and corresponding effective pressure value intervals, the user only needs to input a set of matching decrypted fingerprints and decryption pressure values to decrypt the captured file, and the user can selectively many.
  • the fifth embodiment of the present invention provides an encrypted photographing method.
  • the decryption module 40 is further configured to be based on the fourth embodiment of the encrypted photographing apparatus of the present invention.
  • the photographed file is decrypted.
  • the encrypted file needs to be decrypted first.
  • the user can select the encrypted captured file after the identifier is in the recognizer Press to enter the fingerprint and enter the decryption command.
  • the decryption module 40 When receiving the decryption instruction, the decryption module 40 acquires the decrypted fingerprint carried in the decrypted command, and the decrypted pressure value generated when the decrypted fingerprint is entered.
  • the decryption module 40 then verifies the decrypted fingerprint and the decrypted pressure value based on the encrypted information.
  • the decryption module 40 searches for a valid fingerprint that matches the encrypted fingerprint among the plurality of valid fingerprints of the encrypted information.
  • a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, it is determined whether the found valid fingerprint matches the input encrypted fingerprint when the user captures the currently encrypted captured file in the encrypted shooting mode.
  • the current decrypted fingerprint is the encrypted fingerprint of the encrypted shooting mode when the currently encrypted file is captured, and it is determined whether the decrypted pressure value is located in the valid fingerprint found here.
  • the effective pressure value range.
  • the decryption pressure value is within the effective pressure value range of the found valid fingerprint, it is determined that the decrypted fingerprint and the decrypted pressure value are verified to decrypt the captured file.
  • each valid fingerprint in the encrypted information and a character string corresponding to the corresponding effective pressure value interval are used as a secret key, and the captured file is decrypted.
  • the decrypted fingerprint If the valid fingerprint matching the decrypted fingerprint is not found in the encrypted information, or the valid fingerprint matching the decrypted fingerprint does not match the encrypted fingerprint, or the decrypted pressure value is not within the effective pressure value corresponding to the valid fingerprint matching the decrypted fingerprint , it is determined that the decryption fingerprint and the decryption pressure value verification fails, and the file decryption is not performed.
  • the decryption module 40 acquires the decrypted pressure value corresponding to the decrypted fingerprint and the decrypted fingerprint according to the decrypted instruction; and then, according to the encrypted information, the decrypted fingerprint and the decrypted pressure value are verified. If a valid fingerprint matching the decrypted fingerprint is found in the encrypted information, and the valid fingerprint matching the decrypted fingerprint matches the encrypted fingerprint, and the decrypted pressure value is within the effective pressure value interval corresponding to the valid fingerprint matching the decrypted fingerprint, decrypting Shoot the file.
  • the double verification of the fingerprint and the pressure value is realized, and the file is decrypted only when the fingerprint and the pressure value are verified. safety.
  • the encryption and decryption of the captured file must be the same fingerprint of the user, and the decryption pressure value and the encrypted pressure value are both in the same effective pressure value interval, which enhances the security of the encrypted shooting.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the encrypted pressure value carried by the encrypted shooting instruction is obtained, and the encrypted pressure value is verified according to the pre-configured encrypted information; if the encrypted pressure value is verified, the shooting device is controlled to perform Shooting, getting the captured file; then, encrypting the captured file according to the encrypted information, and saving the encrypted captured file, and encrypting the captured file.
  • the user only needs to input the pressure to control the automatic encryption of the photographed photos or videos, without the user having to manually input the password, and the technical problem of solving the encryption process of the captured file is cumbersome, which greatly simplifies the encrypted shooting file. step.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Studio Devices (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

一种加密拍摄方法及加密拍摄装置,该方法包括:接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值(S10);若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件(S20);根据所述加密信息对所述拍摄文件进行加密(S30)。该加密拍摄方法和装置使用户仅需要输入压力即可以控制对拍摄得到的照片或视频等文件自动加密,无需用户手动输入密码,解决拍摄文件的加密过程较为繁琐的技术问题,极大地简化了加密拍摄文件的步骤。

Description

加密拍摄方法和装置 技术领域
本发明实施例涉及拍照技术领域,尤其涉及一种拍摄加密方法和装置。
背景技术
目前,手机、PAD(平板电脑)等移动终端中通常都配置有摄像头,用户可以进行拍照、视频录制等,使用频率高。
当用户使用移动终端的摄像头拍摄保密度较高的照片或是视频时,需要先进行照片或是视频的拍摄,再启动加密软件对拍摄得到的文件进行加密处理,而加密处理的方式通常为根据用户输入的密码对文件进行加密。
可见,相关的加密拍摄文件的方法较为繁琐,至少需要拍摄、保存拍摄文件、打开加密软件、输入加密密码、保存加密设置等多个步骤才能完成对拍摄文件的加密,用户体验差。
发明内容
本发明实施例的主要目的在于提供一种加密拍摄方法和装置,旨在解决拍摄文件的加密过程较为繁琐的技术问题。
为实现上述目的,本发明实施例提供一种加密拍摄方法,所述加密拍摄方法包括以下步骤:
接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值;
若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;
根据所述加密信息对所述拍摄文件进行加密。
在一个实施例中,所述加密信息包括有效指纹和有效压力值区间,所述接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息 校验所述加密压力值的步骤包括:
接收输入的加密拍摄指令,获取加密指纹及所述加密指纹对应的加密压力值;
若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验,转入执行步骤:控制拍摄装置进行拍摄,得到拍摄文件。
在一个实施例中,所述加密信息包括多个有效指纹,和所述各有效指纹对应的有效压力值区间,所述若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验的步骤包括:
若在所述加密信息中查找到与所述加密指纹匹配的有效指纹,且所述加密压力值位于所述与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
在一个实施例中,所述根据所述加密信息对所述拍摄文件进行加密的步骤之后,还包括:
根据基于加密后的所述拍摄文件输入的解密指令,获取解密指纹和对应的解密压力值;
若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在一个实施例中,所述若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件的步骤包括:
若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述与解密指纹匹配的有效指纹与所述加密指纹匹配,且所述解密压力值位于 所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
此外,为实现上述目的,本发明实施例还提供一种加密拍摄装置,所述加密拍摄装置包括:
校验模块,设置为接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值;
拍摄模块,设置为若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;
加密模块,设置为根据所述加密信息对所述拍摄文件进行加密。
在一个实施例中,所述加密信息包括有效指纹和有效压力值区间,所述校验模块还设置为,
接收输入的加密拍摄指令,获取加密指纹及所述加密指纹对应的加密压力值;若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
在一个实施例中,所述加密信息包括多个有效指纹,和所述各有效指纹对应的有效压力值区间,所述校验模块还设置为,
若在所述加密信息中查找到与所述加密指纹匹配的有效指纹,且所述加密压力值位于所述与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
在一个实施例中,所述加密拍摄装置还包括:
解密模块,设置为根据基于加密后的所述拍摄文件输入的解密指令,获取解密指纹和对应的解密压力值;若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在一个实施例中,所述解密模块还设置为,
若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述与解密指纹匹配的有效指纹与所述加密指纹匹配,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在本发明实施例中,还提供了一种计算机存储介质,该计算机存储介质可以存储有执行指令,该执行指令用于执行上述实施例中的加密拍摄方法。
本发明实施例提出的一种加密拍摄方法和装置,接收输入的加密拍摄指令后,获取加密拍摄指令携带的加密压力值,根据预先配置的加密信息校验加密压力值;若加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;然后,根据加密信息对拍摄文件进行加密,并保存加密后的拍摄文件,实现了对拍摄文件的加密。在发明中,用户仅需要输入压力即可以控制对拍摄得到的照片或视频等文件自动加密,无需用户手动输入密码,解决拍摄文件的加密过程较为繁琐的技术问题,极大地简化了加密拍摄文件的步骤。
附图说明
图1为本发明加密拍摄方法第一实施例的流程示意图;
图2为本发明加密拍摄方法第二实施例的流程示意图;
图3为本发明加密拍摄方法第三实施例的流程示意图;
图4为本发明加密拍摄方法第四实施例的流程示意图;
图5为本发明加密拍摄方法第五实施例的流程示意图;
图6为本发明加密拍摄装置第一实施例、第二实施例和第三实施例的 功能模块示意图;
图7为本发明加密拍摄装置第四实施例和第五实施例的功能模块示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例的主要解决方案是:接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值;若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;根据所述加密信息对所述拍摄文件进行加密。
由于相关技术中加密拍摄文件的方法较为繁琐,至少需要拍摄、保存拍摄文件、打开加密软件、输入加密密码、保存加密设置等多个步骤才能完成对拍摄文件的加密,用户体验差。
本发明提供一种解决方案,使用户仅需要输入压力即可以控制对拍摄得到的照片或视频等文件自动加密,无需用户手动输入密码,解决拍摄文件的加密过程较为繁琐的技术问题,极大地简化了加密拍摄文件的步骤。
参照图1,本发明加密拍摄方法第一实施例提供一种加密拍摄方法,所述加密拍摄方法包括:
步骤S10、接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值。
本实施例在打开摄像头、进入拍摄模式后,通过用户输入压力控制移动终端进入加密拍摄模式,在加密拍摄模式下自动对拍摄得到的文件进行加密处理,操作简单便捷,简化了加密拍摄文件的步骤。
本实施例以用户使用移动终端的摄像头进行拍摄举例说明。
具体的,作为一种实施方式,用户打开移动终端的拍摄装置或是通过第三方应用软件调用拍摄装置,进入拍摄模式后,移动终端检测用户输入的加密拍摄指令。本实施例中拍摄装置为可进行拍照、摄影的装置,例如摄像头等。
需要说明的是,用户可通过多种方式输入加密拍摄指令,例如,在拍摄模式下,移动终端的显示界面中显示有加密拍摄的控制按钮,用户选中加密拍摄的控制按钮后,提示用户输入加密压力值,用户可在移动终端上配置的压力传感装置上按压输入压力,或是在移动终端压力感应屏上预设的区域中按压输入压力,移动终端检测到用户输入的压力后,判定检测到用户输入的加密拍摄指令,并获取用户输入的压力值作为加密拍摄指令的加密压力值。
为了更加快捷的进入加密拍摄模式,移动终端可以不提供加密拍摄的控制按钮,在拍摄装置启动后,若用户在压力传感装置上按压输入压力,或是在压力感应屏上预设的区域中按压输入压力,则移动终端判定检测到用户输入的加密拍摄指令,并获取用户输入的压力值作为加密拍摄指令的加密压力值。
在检测到用户输入加密拍摄指令后,移动终端获取加密拍摄指令中携带的加密压力值。
然后,根据预先配置的加密信息校验加密压力值。其中,预先配置的加密信息可以是固定的有效压力值,也可以是有效压力值区间,用户可提前设置此有效压力值。
本实施例以加密信息为有效压力值区间进行举例说明。作为一种实施方式,用户在进行加密信息的设置时,输入一有效压力值,并设置对应的压力值浮动范围,则移动终端根据用户输入的有效压力值和压力值浮动范围计算得到有效压力值区间,并配置加密信息。
若加密压力值位于有效压力值区间内,则移动终端判定加密压力值通过校验;若加密压力值不位于有效压力值区间内,则移动终端判定加密压力值未通过校验。
例如,用户在设置加密信息时,输入的压力值为10N,对应的浮动区间为2N,则移动终端计算得到有效压力值为[8N,12N],也即8N至12N范围内的压力值有效。则若用户输入的加密压力值小于8N,或大于12N,则判定加密压力值未通过校验;否则,判定用户输入的加密压力值通过校验。
由此,得到加密压力值的校验结果。
步骤S20、若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件。
在得到加密压力值的校验结果后,若加密压力值通过校验,则判定加密拍摄指令通过校验,控制移动终端进入加密拍摄模式。
在加密拍摄模式下,根据用户输入的拍摄指令进行照片的拍摄和/或视频的录制,得到的照片和/或视频即为当前加密拍摄模式下得到的拍摄文件。
具体的,作为一种实施方式,可以配置移动终端的拍摄装置在加密拍摄模式下仅能进行一次拍摄,也即在加密拍摄模式下,用户仅能拍摄一张照片或是录制一段视频。
在根据加密信息对拍摄文件进行加密后,移动终端就控制自动退出加密拍摄模式。
作为另一种实施方式,配置移动终端的拍摄装置在加密拍摄模式下可以进行多次拍摄,也即在加密拍摄模式下,用户可以拍摄多张照片和/或录制多段视频,移动终端对拍摄文件进行加密。
在收到退出加密拍摄模式的控制指令时,控制退出加密拍摄模式。
步骤S30、根据所述加密信息对所述拍摄文件进行加密。
在得到拍摄文件后,移动终端根据加密信息加密拍摄文件,作为一种实施方式,可以将加密信息对应的字符串作为秘钥,加密拍摄文件。然后,保存加密后的拍摄文件。
由此,实现了拍摄文件的加密。
当用户需要查看或是调用被加密的拍摄文件时,需输入解密指令对拍摄文件进行解密。
具体的,作为一种实施方式,根据基于拍摄文件输入的解密指令,获取解密压力值;根据加密信息校验解密压力值,若解密压力值通过校验,则解密拍摄文件。
在校验解密压力值时,若解密压力值等于有效压力值,或是解密压力值位于有效压力值区间内,则判定解密压力值通过校验,解密指令有效。
由于用户在使用移动终端时,手指输入的压力大小通常是稳定、波动不大的,因此,基于压力值对拍摄文件进行加密得到的加密文件,解密过程也比较方便。
可选的,为了使用户更加清晰输入的压力值,提升控制效果,则可以在用户输入加密拍摄指令或解密指令时,在移动终端的屏幕上对应实时显示用户输入的加密压力值或解密压力值。
在本实施例中,接收输入的加密拍摄指令后,获取加密拍摄指令携带的加密压力值,根据预先配置的加密信息校验加密压力值;若加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;然后,根据加密信息对拍摄文件进行加密,并保存加密后的拍摄文件,实现了对拍摄文件的加密。在本实施例中,用户仅需要输入压力即可以控制对拍摄得到的照片或视频等文件自动加密,无需用户手动输入密码,解决拍摄文件的加密过程较为繁琐的技术问题,极大地简化了加密拍摄文件的步骤。
可选的,参照图2,本发明加密拍摄方法第二实施例提供一种加密拍摄方法,基于上述图1所示的实施例,所述加密信息包括有效指纹和有效压力值区间,所述步骤S10包括:
步骤S11、接收输入的加密拍摄指令,获取加密指纹及所述加密指纹对应的加密压力值;
步骤S12、若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验,转入执行步骤:S20。
本实施例中,预先配置的加密信息包括预先录入的有效指纹和此有效 指纹对应的有效压力值区间。
具体的,作为一种实施方式,用户在设置加密信息时,可以基于指纹识别装置输入有效指纹,基于压力传感装置输入有效压力值。移动终端根据用户输入的有效压力值和预设的允许浮动范围,配置此有效指纹对应的有效压力值区间。由此,得到加密信息,加密信息包括有效指纹和有效指纹对应的有效压力值区间。
可选的,为例简化用户输入加密信息的步骤,可以将指纹识别装置和压力传感装置部署在同一识别器中,获取用户在在录入有效指纹时,按压的压力值,配置得到此有效指纹对应的有效压力值区间。也即,加密信息包括有效指纹,和录入此有效指纹时对应输入的有效压力值区间。
拍摄模式下,用户可以通过识别器输入加密指纹,同时按压识别器输入加密压力,输入加密拍摄指令。本实施例使得用户通过一个简单的按压动作即可实现加密拍摄指令的输入,操作简单方便。
则移动终端在收到用户输入的加密拍摄指令时,获取加密拍摄指令携带的加密指纹,和用户输入此加密指纹时对应输入的加密压力值。
然后,移动终端根据加密信息分别校验加密指纹和加密压力值。
若加密指纹与有效指纹匹配,且加密压力值位于有效压力值区间内,则判定加密指纹及加密压力值通过校验,然后,控制拍摄装置在加密拍摄模式下进行拍摄,得到拍摄文件。
然后,根据所述加密信息对拍摄文件进行加密,例如,使用加密信息中的有效指纹和有效压力值区间对应的字符串作为秘钥,加密得到的拍摄文件。然后,保存加密后的拍摄文件。
若加密指纹与有效指纹不匹配,或加密压力值不位于有效压力值区间内,则判定加密指纹及加密压力值未通过校验,不会进入加密拍摄模式,保障了移动终端的拥有者的权利,避免了其他用户在未经拥有者允许的情况下进行加密拍摄所带来的困扰。
在本实施例中,加密信息包括有效指纹和有效压力值区间,在收到用户输入的加密拍摄指令后,获取加密拍摄指令携带的加密指纹及加密指纹 对应的加密压力值;若加密指纹与有效指纹匹配,且加密压力值位于有效压力值区间内,则判定加密指纹及加密压力值通过校验,控制拍摄装置进行拍摄,对得到的拍摄文件进行加密。本实施例在拍摄照片或视频时,通过指纹和感触压力进行一键加密,大大提高了加密拍摄的易用性。并且,由于加密指纹和加密压力可以同时输入,在不增加操作步骤的前提下,通过指纹和压力值的双重控制,提高了加密拍摄的安全性。
可选的,所述步骤S30之后,还包括:
接收基于所述加密后的拍摄文件输入的解密指令,根据所述解密指令获取解密指纹和所述解密指纹对应的解密压力值;
若所述解密指纹与所述有效指纹匹配,且所述解密压力值位于所述有效压力值区间内,则解密所述拍摄文件。
具体的,作为一种实施方式,在用户需要查看或调用被加密的拍摄文件时,首先需要对加密文件进行解密。用户可以在选中被加密的拍摄文件后,在识别器上按压录入指纹,输入解密指令。
移动终端在接收到解密指令时,获取解密指令中携带的解密指纹,和录入解密指纹时按压产生的解密压力值。
然后,移动终端根据加密信息分别校验解密指纹和解密压力值。
若解密指纹与有效指纹匹配,且解密压力值位于有效压力值区间内,则判定解密指纹和解密压力值通过校验,解密拍摄文件。在解密时,使用加密信息中的有效指纹和有效压力值区间对应的字符串作为秘钥,解密得到拍摄文件,显示加密的照片或视频。
若解密指纹与有效指纹不匹配,或解密压力值不位于有效压力值区间内,则判定解密指纹和解密压力值未通过校验,不解密拍摄文件。还可以提示用户无权查看此照片或视频,请用户再次输入指纹进行解密。
由此,实现了对拍摄文件的解密。
本实施例在解密拍摄文件时,实现了对指纹和压力值的双重校验,仅在指纹和压力值均通过校验的情况下解密文件,保障了文件的安全性。并且,由于加密指纹和加密压力可以同时输入,在不增加操作步骤的前提下, 通过指纹和压力值的双重控制,提高了解密文件的安全性。
可选的,参照图3,本发明加密拍摄方法第三实施例提供一种加密拍摄方法,基于上述图2所示的实施例,所述加密信息包括多个有效指纹,和所述各有效指纹对应的有效压力值区间,所述步骤S12包括:
步骤S13、若在所述加密信息中查找到与所述加密指纹匹配的有效指纹,且所述加密压力值位于所述与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
本实施例中,用户可以录入多个指纹进行加密信息的配置。
具体的,作为一种实施方式,用户可以在识别器上分别进行按压,录入多个有效指纹,移动终端根据用户录入各有效指纹时输入的压力值,以及预先配置的浮动范围,分别配置各有效指纹对应的有效压力值区间。
然后,根据各有效指纹,及各有效指纹对应的有效压力值区间,生成加密信息。
在收到用户输入的加密拍摄指令,根据加密信息校验加密指纹和加密压力值后,移动终端在加密信息中的各有效指纹中,查找与加密指纹匹配的有效指纹。
若在加密信息中成功查找到与加密指纹匹配的有效指纹,则验证加密压力值,判断加密压力值是否位于此查找到的有效指纹对应的有效压力值区间内。
若加密压力值位于此查找到的有效指纹对应的有效压力值区间内,则判定加密指纹与加密压力值均通过校验,然后,控制拍摄装置在加密拍摄模式下进行拍摄,得到拍摄文件。
然后,对拍摄文件进行加密处理,例如,使用加密信息中全部的有效指纹及对应的有效压力值区间对应的字符串作为秘钥,对拍摄文件进行加密。然后,保存得到的加密后的拍摄文件。
例如,用户可以分别录入10个手指的指纹作为有效指纹,则移动终端根据用户分别输入10个有效指纹时的按压压力,配置各有效指纹对应 的有效压力值区间,将得到的各有效指纹,和各有效指纹对应的有效压力值区间作为加密信息。
当用户录入第1个指纹时,提示“最多可以录入10个指纹,是否继续录入”,若用户选择“否”则保存此有效指纹及对应的压力值,并停止录入;用户选择“是”则保存当前指纹及对应的压力值,录入第2个指纹,并继续提示“最多可以录入10个指纹。是否继续录入”,依次类推。直到录入第10个指纹和对应压力的后,结束指纹录入过程。然后,移动终端根据各有效指纹对应的压力值,及预设的浮动范围,配置各有效指纹对应的有效压力值区间。然后,根据得到各有效指纹和对应的各有效压力值区间,配置得到加密信息。
则用户在输入加密拍摄指令时,可以通过10个手指中的任意一个手指按压识别器,录入加密指纹和对应的加密压力值。若在加密信息中查找到与加密指纹匹配的有效指纹,且加密压力值位于此查找到的有效指纹对应的有效压力值区间内时,判定加密指纹和加密压力值有效,控制进入加密拍摄模式。
并且,在得到拍摄文件时,使用包含10个有效指纹及其对应的有效压力值区间的加密信息,对拍摄文件进行加密。
若在加密信息中未查找到与加密指纹匹配的有效指纹,或加密压力值不位于与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定加密指纹与加密压力值校验失败,不进行加密拍摄。
在本实施例中,有效信息中包括多个有效指纹及对应的有效压力值区间,若在加密信息中查找到与加密指纹匹配的有效指纹,且加密压力值位于与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定加密指纹及加密压力值通过校验,需要对拍摄对象进行加密。本实施例通过配置加密信息中包括多个有效指纹及对应的有效压力值区间内,在用户输入的任意一组加密指纹及对应的加密压力值通过验证后均可以进入加密拍摄模式,指纹的可选择性选择更多,提升了对加密拍摄模式控制的灵活性。
可选的,参照图4,本发明加密拍摄方法第四实施例提供一种加密拍摄方法,基于上述图3所示的实施例,所述步骤S30之后,还包括:
步骤S40、根据基于加密后的所述拍摄文件输入的解密指令,获取解密指纹和对应的解密压力值;
步骤S50、若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在用户需要查看或调用被加密的拍摄文件时,首先需要对加密文件进行解密。
作为一种实施方式,用户可以在选中被加密的拍摄文件后,在识别器上按压录入指纹,输入解密指令。
移动终端在接收到解密指令时,获取解密指令中携带的解密指纹,和录入解密指纹时按压产生的解密压力值。
然后,移动终端根据加密信息校验解密指纹和解密压力值。
具体的,移动终端在加密信息的多个有效指纹中,查找与加密指纹匹配的有效指纹。
若在加密信息中查找到与解密指纹匹配的有效指纹,则判断解密压力值是否位于此查找到的有效指纹的有效压力值区间内。
若解密压力值位于此查找到的有效指纹的有效压力值区间内,则判定解密指纹和解密压力值通过校验,解密拍摄文件。
在解密时,使用加密信息中的各有效指纹和对应的有效压力值区间所对应的字符串作为秘钥,解密得到拍摄文件。
若在加密信息中未查找到与解密指纹匹配的有效指纹,或解密压力值不位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则判定解密指纹与解密压力值校验失败,不进行文件解密。
由此,实现了对拍摄文件的解密。
在本实施例中,若用户需要解密拍摄文件,输入解密指令,则移动终端根据解密指令获取解密指纹和解密指纹对应的解密压力值;然后,根据 加密信息校验解密指纹和解密压力值,若在加密信息中查找到与解密指纹匹配的有效指纹,且解密压力值位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密拍摄文件。本实施例在解密拍摄文件时,实现了对指纹和压力值的双重校验,仅在指纹和压力值均通过校验的情况下解密文件,保障了文件的安全性。并且,由于加密指纹和加密压力可以同时输入,在不增加操作步骤的前提下,通过指纹和压力值的双重控制,提高了解密文件的安全性。并且,由于加密信息中包含多个有效指纹及对应的有效压力值区间,因此,仅需要用户输入一组匹配的解密指纹及解密压力值即可实现对拍摄文件的解密,用户的可选择性更多。
可选的,参照图5,本发明加密拍摄方法第五实施例提供一种加密拍摄方法,基于上述图4所示的实施例,所述步骤S50包括:
步骤S51、若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于与所述解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在用户需要查看或调用被加密的拍摄文件时,首先需要对加密文件进行解密。
作为一种实施方式,用户可以在选中被加密的拍摄文件后,在识别器上按压录入指纹,输入解密指令。
移动终端在接收到解密指令时,获取解密指令中携带的解密指纹,和录入解密指纹时按压产生的解密压力值。
然后,移动终端根据加密信息校验解密指纹和解密压力值。
具体的,移动终端在加密信息的多个有效指纹中,查找与加密指纹匹配的有效指纹。
若在加密信息中查找到与解密指纹匹配的有效指纹,则判断此查找到的有效指纹是否与用户在开启加密拍摄模式拍摄当前被加密的拍摄文件时,输入的加密指纹匹配。
若此查找到的有效指纹与加密指纹匹配,也即,当前的解密指纹就是 在拍摄当前被加密的文件时,开启加密拍摄模式的加密指纹,则判断解密压力值是否位于此查找到的有效指纹的有效压力值区间内。
若解密压力值位于此查找到的有效指纹的有效压力值区间内,则判定解密指纹和解密压力值通过校验,解密拍摄文件。
在解密时,使用加密信息中的各有效指纹和对应的有效压力值区间所对应的字符串作为秘钥,解密得到拍摄文件。
若在加密信息中未查找到与解密指纹匹配的有效指纹,或与解密指纹匹配的有效指纹与加密指纹不匹配,或解密压力值不位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则判定解密指纹与解密压力值校验失败,不进行文件解密。
由此,实现了对拍摄文件的解密。
在本实施例中,若用户需要解密拍摄文件,输入解密指令,则移动终端根据解密指令获取解密指纹和解密指纹对应的解密压力值;然后,根据加密信息校验解密指纹和解密压力值,若在加密信息中查找到与解密指纹匹配的有效指纹,且与解密指纹匹配的有效指纹与加密指纹匹配,且解密压力值位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密拍摄文件。本实施例在解密拍摄文件时,实现了对指纹和压力值的双重校验,仅在指纹和压力值均通过校验的情况下解密文件,保障了文件的安全性。并且,本实施例中,拍摄文件的加密和解密,必须是用户的同一指纹,且解密压力值与加密压力值均位于同一有效压力值区间,增强了加密拍摄的安全性。
可选的,参照图6,本发明加密拍摄装置第一实施例提供一种加密拍摄装置,所述加密拍摄装置包括:
校验模块10,设置为接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值。
本实施例在打开摄像头、进入拍摄模式后,通过用户输入压力控制移动终端进入加密拍摄模式,在加密拍摄模式下自动对拍摄得到的文件进行 加密处理,操作简单便捷,简化了加密拍摄文件的步骤。
本实施例以用户使用移动终端的摄像头进行拍摄举例说明。加密拍摄装置可部署在移动终端中。
具体的,作为一种实施方式,用户打开移动终端的拍摄装置或是通过第三方应用软件调用拍摄装置,进入拍摄模式后,校验模块10检测用户输入的加密拍摄指令。本实施例中拍摄装置为可进行拍照、摄影的装置,例如摄像头等。
需要说明的是,用户可通过多种方式输入加密拍摄指令,例如,在拍摄模式下,移动终端的显示界面中显示有加密拍摄的控制按钮,用户选中加密拍摄的控制按钮后,提示用户输入加密压力值,用户可在移动终端上配置的压力传感装置上按压输入压力,或是在移动终端压力感应屏上预设的区域中按压输入压力,校验模块10检测到用户输入的压力后,判定检测到用户输入的加密拍摄指令,并获取用户输入的压力值作为加密拍摄指令的加密压力值。
为了更加快捷的进入加密拍摄模式,校验模块10可以不提供加密拍摄的控制按钮,在拍摄装置启动后,若用户在压力传感装置上按压输入压力,或是在压力感应屏上预设的区域中按压输入压力,则校验模块10判定检测到用户输入的加密拍摄指令,并获取用户输入的压力值作为加密拍摄指令的加密压力值。
在检测到用户输入加密拍摄指令后,校验模块10获取加密拍摄指令中携带的加密压力值。
然后,校验模块10根据预先配置的加密信息校验加密压力值。其中,预先配置的加密信息可以是固定的有效压力值,也可以是有效压力值区间,用户可提前设置此有效压力值。
本实施例以加密信息为有效压力值区间进行举例说明。作为一种实施方式,用户在进行加密信息的设置时,输入一有效压力值,并设置对应的压力值浮动范围,则移动终端根据用户输入的有效压力值和压力值浮动范围计算得到有效压力值区间,并配置加密信息。
若加密压力值位于有效压力值区间内,则校验模块10判定加密压力值通过校验;若加密压力值不位于有效压力值区间内,则校验模块10判定加密压力值未通过校验。
例如,用户在设置加密信息时,输入的压力值为10N,对应的浮动区间为2N,则移动终端计算得到有效压力值为[8N,12N],也即8N至12N范围内的压力值有效。则若用户输入的加密压力值小于8N,或大于12N,则校验模块10判定加密压力值未通过校验;否则,校验模块10判定用户输入的加密压力值通过校验。
由此,校验模块10得到加密压力值的校验结果。
拍摄模块20,设置为若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件。
在得到加密压力值的校验结果后,若加密压力值通过校验,则拍摄模块20判定加密拍摄指令通过校验,控制移动终端进入加密拍摄模式。
在加密拍摄模式下,拍摄模块20根据用户输入的拍摄指令进行照片的拍摄和/或视频的录制,得到的照片和/或视频即为当前加密拍摄模式下得到的拍摄文件。
具体的,作为一种实施方式,可以配置移动终端的拍摄装置在加密拍摄模式下仅能进行一次拍摄,也即在加密拍摄模式下,用户仅能拍摄一张照片或是录制一段视频。
在根据加密信息对拍摄文件进行加密后,拍摄模块20就控制自动退出加密拍摄模式。
作为另一种实施方式,配置移动终端的拍摄装置在加密拍摄模式下可以进行多次拍摄,也即在加密拍摄模式下,用户可以拍摄多张照片和/或录制多段视频,加密模块30对拍摄文件进行加密。
在收到退出加密拍摄模式的控制指令时,拍摄模块20控制退出加密拍摄模式。
加密模块30,设置为根据所述加密信息对所述拍摄文件进行加密,并保存加密后的拍摄文件。
在得到拍摄文件后,加密模块30根据加密信息加密拍摄文件,作为一种实施方式,可以将加密信息对应的字符串作为秘钥,加密拍摄文件。然后,加密模块30保存加密后的拍摄文件。
由此,实现了拍摄文件的加密。
当用户需要查看或是调用被加密的拍摄文件时,需输入解密指令对拍摄文件进行解密。
具体的,作为一种实施方式,根据基于拍摄文件输入的解密指令,获取解密压力值;根据加密信息校验解密压力值,若解密压力值通过校验,则解密拍摄文件。
在校验解密压力值时,若解密压力值等于有效压力值,或是解密压力值位于有效压力值区间内,则判定解密压力值通过校验,解密指令有效。
由于用户在使用移动终端时,手指输入的压力大小通常是稳定、波动不大的,因此,基于压力值对拍摄文件进行加密得到的加密文件,解密过程也比较方便。
可选的,为了使用户更加清晰输入的压力值,提升控制效果,则可以在用户输入加密拍摄指令或解密指令时,在移动终端的屏幕上对应实时显示用户输入的加密压力值或解密压力值。
在本实施例中,接收输入的加密拍摄指令后,校验模块10获取加密拍摄指令携带的加密压力值,根据预先配置的加密信息校验加密压力值;若加密压力值通过校验,则拍摄模块20控制拍摄装置进行拍摄,得到拍摄文件;然后,加密模块30根据加密信息对拍摄文件进行加密,并保存加密后的拍摄文件,实现了对拍摄文件的加密。在本实施例中,用户仅需要输入压力即可以控制对拍摄得到的照片或视频等文件自动加密,无需用户手动输入密码,解决拍摄文件的加密过程较为繁琐的技术问题,极大地简化了加密拍摄文件的步骤。
可选的,参照图6,本发明加密拍摄装置第二实施例提供一种加密拍摄装置,所述加密信息包括有效指纹和有效压力值区间,所述校验模块10 还设置为,
接收输入的加密拍摄指令,获取加密指纹及所述加密指纹对应的加密压力值;若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
本实施例中,预先配置的加密信息包括预先录入的有效指纹和此有效指纹对应的有效压力值区间。
具体的,作为一种实施方式,用户在设置加密信息时,可以基于指纹识别装置输入有效指纹,基于压力传感装置输入有效压力值。加密拍摄装置根据用户输入的有效压力值和预设的允许浮动范围,配置此有效指纹对应的有效压力值区间。由此,得到加密信息,加密信息包括有效指纹和有效指纹对应的有效压力值区间。
可选的,为例简化用户输入加密信息的步骤,可以将指纹识别装置和压力传感装置部署在同一识别器中,获取用户在在录入有效指纹时,按压的压力值,配置得到此有效指纹对应的有效压力值区间。也即,加密信息包括有效指纹,和录入此有效指纹时对应输入的有效压力值区间。
拍摄模式下,用户可以通过识别器输入加密指纹,同时按压识别器输入加密压力,输入加密拍摄指令。本实施例使得用户通过一个简单的按压动作即可实现加密拍摄指令的输入,操作简单方便。
则校验模块10在收到用户输入的加密拍摄指令时,获取加密拍摄指令携带的加密指纹,和用户输入此加密指纹时对应输入的加密压力值。
然后,校验模块10根据加密信息分别校验加密指纹和加密压力值。
若加密指纹与有效指纹匹配,且加密压力值位于有效压力值区间内,则校验模块10判定加密指纹及加密压力值通过校验,然后,拍摄模块20控制拍摄装置在加密拍摄模式下进行拍摄,得到拍摄文件。
然后,加密模块30根据所述加密信息对拍摄文件进行加密,例如,使用加密信息中的有效指纹和有效压力值区间对应的字符串作为秘钥,加密得到的拍摄文件。然后,保存加密后的拍摄文件。
若加密指纹与有效指纹不匹配,或加密压力值不位于有效压力值区间 内,则校验模块10判定加密指纹及加密压力值未通过校验,不会进入加密拍摄模式,保障了移动终端的拥有者的权利,避免了其他用户在未经拥有者允许的情况下进行加密拍摄所带来的困扰。
在本实施例中,加密信息包括有效指纹和有效压力值区间,在收到用户输入的加密拍摄指令后,校验模块10获取加密拍摄指令携带的加密指纹及加密指纹对应的加密压力值;若加密指纹与有效指纹匹配,且加密压力值位于有效压力值区间内,则判定加密指纹及加密压力值通过校验,拍摄模块20控制拍摄装置进行拍摄,加密模块30对得到的拍摄文件进行加密。本实施例在拍摄照片或视频时,通过指纹和感触压力进行一键加密,大大提高了加密拍摄的易用性。并且,由于加密指纹和加密压力可以同时输入,在不增加操作步骤的前提下,通过指纹和压力值的双重控制,提高了加密拍摄的安全性。
可选的,所述加密拍摄装置还包括:
解密模块40,设置为接收基于所述加密后的拍摄文件输入的解密指令,根据所述解密指令获取解密指纹和所述解密指纹对应的解密压力值;若所述解密指纹与所述有效指纹匹配,且所述解密压力值位于所述有效压力值区间内,则解密所述拍摄文件。
具体的,作为一种实施方式,在用户需要查看或调用被加密的拍摄文件时,首先需要对加密文件进行解密。用户可以在选中被加密的拍摄文件后,在识别器上按压录入指纹,输入解密指令。
解密模块40在接收到解密指令时,获取解密指令中携带的解密指纹,和录入解密指纹时按压产生的解密压力值。
然后,解密模块40根据加密信息分别校验解密指纹和解密压力值。
若解密指纹与有效指纹匹配,且解密压力值位于有效压力值区间内,则解密模块40判定解密指纹和解密压力值通过校验,解密拍摄文件。在解密时,解密模块40使用加密信息中的有效指纹和有效压力值区间对应的字符串作为秘钥,解密得到拍摄文件,显示加密的照片或视频。
若解密指纹与有效指纹不匹配,或解密压力值不位于有效压力值区间 内,则解密模块40判定解密指纹和解密压力值未通过校验,不解密拍摄文件。还可以提示用户无权查看此照片或视频,请用户再次输入指纹进行解密。
由此,实现了对拍摄文件的解密。
本实施例在解密拍摄文件时,实现了对指纹和压力值的双重校验,仅在指纹和压力值均通过校验的情况下解密文件,保障了文件的安全性。并且,由于加密指纹和加密压力可以同时输入,在不增加操作步骤的前提下,通过指纹和压力值的双重控制,提高了解密文件的安全性。
可选的,参照图6,本发明加密拍摄装置第三实施例提供一种加密拍摄装置,基于上述本发明加密拍摄装置第二实施例,所述加密信息包括多个有效指纹,和所述各有效指纹对应的有效压力值区间,所述校验模块10还设置为,
若在所述加密信息中查找到与所述加密指纹匹配的有效指纹,且所述加密压力值位于所述与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
本实施例中,用户可以录入多个指纹进行加密信息的配置。
具体的,作为一种实施方式,用户可以在识别器上分别进行按压,录入多个有效指纹,加密拍摄装置根据用户录入各有效指纹时输入的压力值,以及预先配置的浮动范围,分别配置各有效指纹对应的有效压力值区间。
然后,根据各有效指纹,及各有效指纹对应的有效压力值区间,生成加密信息。
在收到用户输入的加密拍摄指令,根据加密信息校验加密指纹和加密压力值后,校验模块10在加密信息中的各有效指纹中,查找与加密指纹匹配的有效指纹。
若在加密信息中成功查找到与加密指纹匹配的有效指纹,则校验模块10验证加密压力值,判断加密压力值是否位于此查找到的有效指纹对应的有效压力值区间内。
若加密压力值位于此查找到的有效指纹对应的有效压力值区间内,则校验模块10判定加密指纹与加密压力值均通过校验,然后,拍摄模块20控制拍摄装置在加密拍摄模式下进行拍摄,得到拍摄文件。
然后,加密模块30对拍摄文件进行加密处理,例如,使用加密信息中全部的有效指纹及对应的有效压力值区间对应的字符串作为秘钥,对拍摄文件进行加密。然后,保存得到的加密后的拍摄文件。
例如,用户可以分别录入10个手指的指纹作为有效指纹,则加密拍摄装置根据用户分别输入10个有效指纹时的按压压力,配置各有效指纹对应的有效压力值区间,将得到的各有效指纹,和各有效指纹对应的有效压力值区间作为加密信息。
当用户录入第1个指纹时,提示“最多可以录入10个指纹,是否继续录入”,若用户选择“否”则保存此有效指纹及对应的压力值,并停止录入;用户选择“是”则保存当前指纹及对应的压力值,录入第2个指纹,并继续提示“最多可以录入10个指纹。是否继续录入”,依次类推。在录入第10个指纹和对应压力的后,结束指纹录入过程。然后,加密拍摄装置根据各有效指纹对应的压力值,及预设的浮动范围,配置各有效指纹对应的有效压力值区间。然后,根据得到各有效指纹和对应的各有效压力值区间,配置得到加密信息。
则用户在输入加密拍摄指令时,可以通过10个手指中的任意一个手指按压识别器,录入加密指纹和对应的加密压力值。若校验模块10在加密信息中查找到与加密指纹匹配的有效指纹,且加密压力值位于此查找到的有效指纹对应的有效压力值区间内时,判定加密指纹和加密压力值有效,控制进入加密拍摄模式。
并且,在得到拍摄文件时,加密模块30使用包含10个有效指纹及其对应的有效压力值区间的加密信息,对拍摄文件进行加密。
若在加密信息中未查找到与加密指纹匹配的有效指纹,或加密压力值不位于与加密指纹匹配的有效指纹对应的有效压力值区间内,则校验模块10判定加密指纹与加密压力值校验失败,不进行加密拍摄。
在本实施例中,有效信息中包括多个有效指纹及对应的有效压力值区间,若在加密信息中查找到与加密指纹匹配的有效指纹,且加密压力值位于与加密指纹匹配的有效指纹对应的有效压力值区间内,则校验模块10判定加密指纹及加密压力值通过校验,需要对拍摄对象进行加密。本实施例通过配置加密信息中包括多个有效指纹及对应的有效压力值区间内,在用户输入的任意一组加密指纹及对应的加密压力值通过验证后均可以进入加密拍摄模式,指纹的可选择性选择更多,提升了对加密拍摄模式控制的灵活性。
可选的,参照图7,本发明加密拍摄装置第四实施例提供一种加密拍摄装置,基于上述本发明加密拍摄装置第三实施例,所述解密模块40,还设置为,
根据基于加密后的所述拍摄文件输入的解密指令,获取解密指纹和对应的解密压力值;若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在用户需要查看或调用被加密的拍摄文件时,首先需要对加密文件进行解密。
作为一种实施方式,用户可以在选中被加密的拍摄文件后,在识别器上按压录入指纹,输入解密指令。
解密模块40在接收到解密指令时,获取解密指令中携带的解密指纹,和录入解密指纹时按压产生的解密压力值。
然后,解密模块40根据加密信息校验解密指纹和解密压力值。
具体的,解密模块40在加密信息的多个有效指纹中,查找与加密指纹匹配的有效指纹。
若在加密信息中查找到与解密指纹匹配的有效指纹,则判断解密压力值是否位于此查找到的有效指纹的有效压力值区间内。
若解密压力值位于此查找到的有效指纹的有效压力值区间内,则判定 解密指纹和解密压力值通过校验,解密拍摄文件。
在解密时,使用加密信息中的各有效指纹和对应的有效压力值区间所对应的字符串作为秘钥,解密得到拍摄文件。
若在加密信息中未查找到与解密指纹匹配的有效指纹,或解密压力值不位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则判定解密指纹与解密压力值校验失败,不进行文件解密。
由此,实现了对拍摄文件的解密。
在本实施例中,若用户需要解密拍摄文件,输入解密指令,则解密模块40根据解密指令获取解密指纹和解密指纹对应的解密压力值;然后,根据加密信息校验解密指纹和解密压力值,若在加密信息中查找到与解密指纹匹配的有效指纹,且解密压力值位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密拍摄文件。本实施例在解密拍摄文件时,实现了对指纹和压力值的双重校验,仅在指纹和压力值均通过校验的情况下解密文件,保障了文件的安全性。并且,由于加密指纹和加密压力可以同时输入,在不增加操作步骤的前提下,通过指纹和压力值的双重控制,提高了解密文件的安全性。并且,由于加密信息中包含多个有效指纹及对应的有效压力值区间,因此,仅需要用户输入一组匹配的解密指纹及解密压力值即可实现对拍摄文件的解密,用户的可选择性更多。
可选的,参照图7,本发明加密拍摄装置第五实施例提供一种加密拍摄方法,基于上述本发明加密拍摄装置第四实施例,所述解密模块40,还设置为,
若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于与所述解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
在用户需要查看或调用被加密的拍摄文件时,首先需要对加密文件进行解密。
作为一种实施方式,用户可以在选中被加密的拍摄文件后,在识别器 上按压录入指纹,输入解密指令。
解密模块40在接收到解密指令时,获取解密指令中携带的解密指纹,和录入解密指纹时按压产生的解密压力值。
然后,解密模块40根据加密信息校验解密指纹和解密压力值。
具体的,解密模块40在加密信息的多个有效指纹中,查找与加密指纹匹配的有效指纹。
若在加密信息中查找到与解密指纹匹配的有效指纹,则判断此查找到的有效指纹是否与用户在开启加密拍摄模式拍摄当前被加密的拍摄文件时,输入的加密指纹匹配。
若此查找到的有效指纹与加密指纹匹配,也即,当前的解密指纹就是在拍摄当前被加密的文件时,开启加密拍摄模式的加密指纹,则判断解密压力值是否位于此查找到的有效指纹的有效压力值区间内。
若解密压力值位于此查找到的有效指纹的有效压力值区间内,则判定解密指纹和解密压力值通过校验,解密拍摄文件。
在解密时,使用加密信息中的各有效指纹和对应的有效压力值区间所对应的字符串作为秘钥,解密得到拍摄文件。
若在加密信息中未查找到与解密指纹匹配的有效指纹,或与解密指纹匹配的有效指纹与加密指纹不匹配,或解密压力值不位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则判定解密指纹与解密压力值校验失败,不进行文件解密。
由此,实现了对拍摄文件的解密。
在本实施例中,若用户需要解密拍摄文件,输入解密指令,则解密模块40根据解密指令获取解密指纹和解密指纹对应的解密压力值;然后,根据加密信息校验解密指纹和解密压力值,若在加密信息中查找到与解密指纹匹配的有效指纹,且与解密指纹匹配的有效指纹与加密指纹匹配,且解密压力值位于与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密拍摄文件。本实施例在解密拍摄文件时,实现了对指纹和压力值的双重校验,仅在指纹和压力值均通过校验的情况下解密文件,保障了文件的 安全性。并且,本实施例中,拍摄文件的加密和解密,必须是用户的同一指纹,且解密压力值与加密压力值均位于同一有效压力值区间,增强了加密拍摄的安全性。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验加密压力值;
S2,若加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;
S3,根据加密信息对拍摄文件进行加密。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
以上仅为本发明的可选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
工业实用性
在本发明实施例中,接收输入的加密拍摄指令后,获取加密拍摄指令携带的加密压力值,根据预先配置的加密信息校验加密压力值;若加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;然后,根据加密信息对拍摄文件进行加密,并保存加密后的拍摄文件,实现了对拍摄文件的加密。在发明中,用户仅需要输入压力即可以控制对拍摄得到的照片或视频等文件自动加密,无需用户手动输入密码,解决拍摄文件的加密过程较为繁琐的技术问题,极大地简化了加密拍摄文件的步骤。

Claims (10)

  1. 一种加密拍摄方法,所述加密拍摄方法包括以下步骤:
    接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值;
    若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;
    根据所述加密信息对所述拍摄文件进行加密。
  2. 如权利要求1所述的加密拍摄方法,其中,所述加密信息包括有效指纹和有效压力值区间,所述接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值的步骤包括:
    接收输入的加密拍摄指令,获取加密指纹及所述加密指纹对应的加密压力值;
    若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验,转入执行步骤:控制拍摄装置进行拍摄,得到拍摄文件。
  3. 如权利要求2所述的加密拍摄方法,其中,所述加密信息包括多个有效指纹,和所述各有效指纹对应的有效压力值区间,所述若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验的步骤包括:
    若在所述加密信息中查找到与所述加密指纹匹配的有效指纹,且所述加密压力值位于所述与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
  4. 如权利要求3所述的加密拍摄方法,其中,所述根据所述加密信息对所述拍摄文件进行加密的步骤之后,还包括:
    根据基于加密后的所述拍摄文件输入的解密指令,获取解密指纹和对应的解密压力值;
    若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
  5. 如权利要求4所述的加密拍摄方法,其中,所述若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件的步骤包括:
    若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述与解密指纹匹配的有效指纹与所述加密指纹匹配,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
  6. 一种加密拍摄装置,所述加密拍摄装置包括:
    校验模块,设置为接收输入的加密拍摄指令并获取加密压力值,根据预先配置的加密信息校验所述加密压力值;
    拍摄模块,设置为若所述加密压力值通过校验,则控制拍摄装置进行拍摄,得到拍摄文件;
    加密模块,设置为根据所述加密信息对所述拍摄文件进行加密。
  7. 如权利要求6所述的加密拍摄装置,其中,所述加密信息包括有效指纹和有效压力值区间,所述校验模块还设置为,
    接收输入的加密拍摄指令,获取加密指纹及所述加密指纹对应的加密压力值;若所述加密指纹与所述有效指纹匹配,且所述加密压力值位于所述有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
  8. 如权利要求7所述的加密拍摄装置,其中,所述加密信息包括多个有效指纹,和所述各有效指纹对应的有效压力值区间,所述校验模块还 设置为,
    若在所述加密信息中查找到与所述加密指纹匹配的有效指纹,且所述加密压力值位于所述与加密指纹匹配的有效指纹对应的有效压力值区间内,则判定所述加密指纹及所述加密压力值通过校验。
  9. 如权利要求8所述的加密拍摄装置,其中,所述加密拍摄装置还包括:
    解密模块,设置为根据基于加密后的所述拍摄文件输入的解密指令,获取解密指纹和对应的解密压力值;若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
  10. 如权利要求9所述的加密拍摄装置,其中,所述解密模块还设置为,
    若在所述加密信息中查找到与所述解密指纹匹配的有效指纹,且所述与解密指纹匹配的有效指纹与所述加密指纹匹配,且所述解密压力值位于所述与解密指纹匹配的有效指纹对应的有效压力值区间内,则解密所述拍摄文件。
PCT/CN2016/108887 2016-07-21 2016-12-07 加密拍摄方法和装置 WO2018014489A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610581272.4A CN107644167A (zh) 2016-07-21 2016-07-21 加密拍摄方法和装置
CN201610581272.4 2016-07-21

Publications (1)

Publication Number Publication Date
WO2018014489A1 true WO2018014489A1 (zh) 2018-01-25

Family

ID=60991715

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/108887 WO2018014489A1 (zh) 2016-07-21 2016-12-07 加密拍摄方法和装置

Country Status (2)

Country Link
CN (1) CN107644167A (zh)
WO (1) WO2018014489A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253933A (zh) * 2013-06-26 2014-12-31 华为技术有限公司 拍摄的方法及设备
CN104915606A (zh) * 2015-05-29 2015-09-16 努比亚技术有限公司 文件加密解密方法及装置
CN105100481A (zh) * 2015-07-30 2015-11-25 努比亚技术有限公司 拍摄方法、装置及移动终端
CN105118019A (zh) * 2015-09-11 2015-12-02 广东欧珀移动通信有限公司 一种图片处理方法及用户终端
CN105303086A (zh) * 2015-10-31 2016-02-03 深圳市金立通信设备有限公司 一种应用启动方法及终端
CN105678114A (zh) * 2014-11-17 2016-06-15 深圳桑菲消费通信有限公司 一种照片的预览方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699847A (zh) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 指纹加密方法及装置,加密拍摄方法及装置
CN104951684A (zh) * 2015-06-18 2015-09-30 广东欧珀移动通信有限公司 一种指纹加密、解密的方法及终端
CN105373737B (zh) * 2015-10-10 2018-09-04 广东欧珀移动通信有限公司 一种应用加密方法及移动终端
CN105306822A (zh) * 2015-10-23 2016-02-03 上海卓易科技股份有限公司 一种基于指纹识别技术的加密拍照的方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253933A (zh) * 2013-06-26 2014-12-31 华为技术有限公司 拍摄的方法及设备
CN105678114A (zh) * 2014-11-17 2016-06-15 深圳桑菲消费通信有限公司 一种照片的预览方法及装置
CN104915606A (zh) * 2015-05-29 2015-09-16 努比亚技术有限公司 文件加密解密方法及装置
CN105100481A (zh) * 2015-07-30 2015-11-25 努比亚技术有限公司 拍摄方法、装置及移动终端
CN105118019A (zh) * 2015-09-11 2015-12-02 广东欧珀移动通信有限公司 一种图片处理方法及用户终端
CN105303086A (zh) * 2015-10-31 2016-02-03 深圳市金立通信设备有限公司 一种应用启动方法及终端

Also Published As

Publication number Publication date
CN107644167A (zh) 2018-01-30

Similar Documents

Publication Publication Date Title
WO2017032263A1 (zh) 身份认证方法及装置
US10038555B2 (en) Biometric authentication system
WO2017032029A1 (zh) 一种应用程序加密方法及用户终端
CN104125055A (zh) 加密、解密方法及电子设备
CN110334503A (zh) 利用一个设备解锁另一个设备的方法
CN105184561A (zh) 安全支付的方法及装置
JP2017191374A (ja) 生体判定装置、端末装置、生体判定装置の制御方法、制御プログラム
TW201324377A (zh) 基於臉部特徵值對圖片分類的電子裝置及方法
KR102124445B1 (ko) 애플리케이션의 로그인 패스워드를 입력하기 위한 방법, 디바이스 및 단말기
US20220262166A1 (en) Information processing apparatus and method and non-transitory computer readable medium storing information processing program
WO2019196296A1 (zh) 图像控制、相机应用的拍摄控制方法、装置、电子设备
CN104966009A (zh) 一种信息处理方法及电子设备
KR101052294B1 (ko) 콘텐츠 보안 장치 및 콘텐츠 보안 방법
CN105095787A (zh) 一种信息处理方法及装置
KR20140124289A (ko) 감시 카메라의 제어 방법
TWI519994B (zh) 結合生理特徵之影像加解密方法及其影像擷取裝置
US8042191B2 (en) Image capture apparatus
CN106331490B (zh) 拍照处理方法、装置及移动终端
WO2018014489A1 (zh) 加密拍摄方法和装置
CN105975283A (zh) 操作系统的启动方法及装置
CN105512541A (zh) 一种屏幕解锁方法、数据加密、解密方法及相关装置
CN106797386B (zh) 安全验证方法、装置、终端设备及服务器
CN105912942A (zh) 基于nfc的移动终端图片加密与解密处理方法及系统
CN106503573A (zh) 密码设置方法及装置
JP2011223638A (ja) 撮像装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16909416

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16909416

Country of ref document: EP

Kind code of ref document: A1