CN104331672A - Method and device for performing confidential treatment on pictures upon bracelet - Google Patents
Method and device for performing confidential treatment on pictures upon bracelet Download PDFInfo
- Publication number
- CN104331672A CN104331672A CN201410682949.4A CN201410682949A CN104331672A CN 104331672 A CN104331672 A CN 104331672A CN 201410682949 A CN201410682949 A CN 201410682949A CN 104331672 A CN104331672 A CN 104331672A
- Authority
- CN
- China
- Prior art keywords
- bracelet
- picture
- mobile terminal
- module
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012545 processing Methods 0.000 claims description 40
- 238000001514 detection method Methods 0.000 claims description 15
- 238000012795 verification Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 description 17
- 238000013478 data encryption standard Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The disclosure relates to a method and a device for performing confidential treatment on pictures upon a bracelet, and is used for protecting the privacy of a user. The method comprises the following steps: detecting whether the bracelet is within a preset range when the pictures are acquired at a mobile terminal, wherein the bracelet has a binding relationship with the mobile terminal; if the bracelet is within the preset range, encrypting and storing the pictures. According to the technical scheme of the disclosure, the user can conveniently and rapidly perform the confidential treatment on the pictures on the mobile terminal, and therefore other people are prevented from randomly browsing and transmitting the pictures on the mobile terminal when illegally obtaining the mobile terminal, the picture privacy of the user is conveniently and rapidly protected, and better experience is brought to the user.
Description
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for performing security processing on a picture based on a bracelet.
Background
With the development of the intellectualization of the mobile terminal, a user can shoot photos at any time and any place through the mobile terminal, and the user can upload the shot photos to the internet at any time in a user-defined setting mode, so that other people can browse the photos. For a user, a private photo may not be conveniently published to another person, or the user does not want to directly store the private photo on the mobile terminal, and once the mobile terminal is lost, another person holding the mobile terminal can easily browse the photo stored on the mobile terminal by a legal user.
Disclosure of Invention
In order to overcome the problems in the related art, embodiments of the present disclosure provide a method and an apparatus for security processing of a picture based on a bracelet, so as to protect a picture that a user does not want to disclose through the bracelet.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for security processing of a picture based on a bracelet, including:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
In an embodiment, the method may further comprise:
if the bracelet is within the preset range, decrypting the encrypted picture;
and displaying the decrypted picture.
In an embodiment, the method may further comprise:
receiving the secret key from the bracelet;
decrypting the encrypted picture through the secret key; or,
verifying the bracelet;
and after the verification is passed, decrypting the encrypted picture by using a secret key stored on the mobile terminal.
In an embodiment, the encrypting and storing the picture may include:
encrypting the obtained picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and storing the encrypted picture in a preset naming mode.
In an embodiment, the method may further comprise:
before the bracelet and the mobile terminal are in a binding relationship, authenticating user identity information, and after the bracelet and the mobile terminal are authenticated, binding the bracelet and the mobile terminal;
and distributing the secret key for the bracelet.
In an embodiment, the method may further comprise:
authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
and when the bracelet is detected to be within a preset range, the bracelet and the mobile terminal are unbound according to the unbinding operation of the user.
Authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
and when the bracelet is detected to be within a preset range, the bracelet and the mobile terminal are unbound according to the unbinding operation of the user.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for performing security processing on a picture based on a bracelet, including:
the mobile terminal comprises a detection module and a processing module, wherein the detection module is used for detecting whether a bracelet is in a preset range or not when the mobile terminal acquires a picture, and the bracelet already establishes a binding relationship with the mobile terminal;
and the encryption storage module is used for encrypting and storing the picture if the detection module detects that the bracelet is in the preset range.
In an embodiment, the apparatus may further comprise:
the first decryption module is used for decrypting the encrypted picture if the detection module detects that the bracelet is within the preset range;
and the display module is used for displaying the picture decrypted by the decryption module.
In one embodiment, the first decryption module may include:
the receiving submodule is used for receiving the secret key from the bracelet;
the first decryption submodule is used for decrypting the encrypted picture through the secret key received by the receiving submodule; and/or the presence of a gas in the gas,
the verification submodule is used for verifying the bracelet;
and the second decryption submodule is used for decrypting the encrypted picture through the secret key stored in the mobile terminal after the verification of the verification submodule is passed.
In one embodiment, the encryption storage module may include:
the encryption submodule is used for encrypting the acquired picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and the storage submodule is used for storing the picture encrypted by the encryption submodule in a preset naming mode.
In an embodiment, the apparatus may further comprise:
the first authentication module is configured to authenticate user identity information before the bracelet and the mobile terminal establish a binding relationship;
the binding module is configured to bind the bracelet with the mobile terminal after the first authentication module passes the authentication;
a key distribution module configured to distribute the key by the bracelet.
In an embodiment, the apparatus may further comprise:
the first unbinding module is configured to unbind the bracelet selected by the user from the mobile terminal after the first authentication module authenticates the identity information of the user; and/or the presence of a gas in the gas,
the second unbinding module is configured to unbind the bracelet from the mobile terminal according to the unbinding operation of the user when the detection module detects that the bracelet is within a preset range.
In an embodiment, the apparatus may further comprise:
a sending module configured to send the key to a cloud server;
the downloading module is configured to download the secret key from the cloud server after the bracelet is unbound with the mobile terminal;
and the second decryption module is configured to decrypt the encrypted picture by the secret key obtained by downloading through the downloading module and a preset encryption algorithm.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for performing security processing on a picture based on a bracelet, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: when the mobile terminal acquires the picture, the picture is encrypted and stored in a preset range through the detection bracelet, so that the user can carry out confidential processing on the picture on the mobile terminal conveniently and quickly, the picture on the mobile terminal is prevented from being browsed and transmitted randomly when the other people illegally acquire the mobile terminal, the picture privacy of the user is protected conveniently and quickly, and better experience is brought to the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flow diagram illustrating a method for secure bracelet-based processing of pictures, according to an example embodiment.
FIG. 2 is a flow diagram illustrating a method for secure bracelet-based processing of pictures in accordance with an exemplary embodiment.
Fig. 3 is a flowchart illustrating a method for security processing of a picture based on a bracelet according to an exemplary embodiment.
Fig. 4 is a block diagram illustrating an apparatus for security handling of pictures based on a bracelet according to an example embodiment.
Fig. 5 is a block diagram illustrating another apparatus for security handling of pictures based on a bracelet according to an example embodiment.
Fig. 6 is a block diagram illustrating an apparatus adapted for secure bracelet-based picture processing according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a method for security processing of a picture based on a bracelet, according to an exemplary embodiment, the method for security processing of a picture based on a bracelet can be applied to a mobile terminal such as a smart phone or a tablet computer, etc., where a picture is stored, and can be implemented by installing an application on the mobile terminal or installing software on the tablet computer, and can also be implemented by a web page on a browser, as shown in fig. 1, the method for security processing of a picture based on a bracelet includes the following steps S101-S102:
in step S101, when the mobile terminal obtains a picture, it is detected whether the bracelet is within a preset range, where the bracelet has established a binding relationship with the mobile terminal.
In one embodiment, the mobile terminal can acquire the picture by taking a picture or downloading the picture, the personal information on the bracelet can be bound with the mobile terminal, in another embodiment, a Media Access Control (MAC) Address on the bracelet can be bound with the mobile terminal, and the bracelet and the mobile terminal are bound, so that the bracelet and the mobile terminal can perform one-to-one encryption processing, and the picture on the mobile terminal can be prevented from being browsed and transmitted randomly when other people illegally acquire the mobile terminal. In addition, under the permission condition, one mobile terminal can be bound with a plurality of bracelets, and one bracelet can also be bound with a plurality of mobile terminals.
In step S102, if the bracelet is within the preset range, the picture is encrypted and stored.
In an embodiment, the encrypted picture may be marked by modifying a suffix of a file name of the picture, for example, the file name of the original picture is "IMG _2001. JPG", and the picture file may be identified as the encrypted picture by the user by modifying the suffix of the file name of the original picture, for example, the modified suffix is "IMG _2001. ring"; in another embodiment, the encrypted picture may also be opened by adding a mark to the file name, for example, the marked "IMG _2001_ enc.jpg", in such a way that even if others know that the picture file is in the JPG format, the encrypted picture is not really opened.
In the embodiment, when the mobile terminal acquires the picture, the picture is encrypted and stored by detecting the bracelet within the preset range, so that the picture on the mobile terminal can be processed in a confidential mode conveniently and quickly by a user, the picture on the mobile terminal is prevented from being browsed and transmitted randomly when the picture is acquired illegally by other people, the picture privacy of the user is protected conveniently and quickly, and better experience is brought to the user.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include steps S103 and S104:
in step S103, if the bracelet is within the preset range, decrypting the encrypted picture;
in step S104, the decrypted picture is displayed.
In one embodiment, a key from a bracelet is received;
decrypting the encrypted picture through the secret key; or,
verifying the bracelet;
and after the verification is passed, decrypting the encrypted picture by using the secret key stored on the mobile terminal.
In one embodiment, step S102 may include steps A1-A2:
in step a1, encrypting the obtained picture by using a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises an encryption algorithm.
In step a2, the encrypted picture is stored in a preset naming manner.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include step S105 and step S106:
in step S105, establishing a communication connection with the bracelet in a wireless communication manner;
in step S106, after the communication connection is established for the first time, the identity information of the bracelet is recognized and the identity information and the mobile terminal are bound.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include step S107 and step S108:
in step S107, before the bracelet and the mobile terminal establish a binding relationship, the user identity information is authenticated, and after the authentication is passed, the bracelet and the mobile terminal are bound.
In step S108, a key is allocated to the bracelet.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include step S109 or step S110:
in step S109, the user identity information is authenticated, and after the authentication is passed, the bracelet selected by the user is unbound to the mobile terminal.
In step S110, the user identity information is authenticated, and after the authentication is passed, the bracelet selected by the user is unbound to the mobile terminal.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include steps S111 to S113:
in step S111, the secret key is sent to the cloud server;
in step S112, after the bracelet is unbound to the mobile terminal, downloading the key from the cloud server;
in step S113, the encrypted picture is decrypted by using the key and a predetermined encryption algorithm.
Please refer to the following embodiments for details of how to perform security processing on pictures by using the bracelet.
Therefore, according to the method provided by the embodiment of the disclosure, when the picture is acquired by the mobile terminal, the picture is encrypted and stored by detecting the bracelet within the preset range, so that the picture on the mobile terminal can be processed in a secret manner conveniently and quickly by a user, the picture on the mobile terminal is prevented from being browsed and transmitted randomly when the picture is acquired illegally by other people, the picture privacy of the user is protected conveniently and quickly, and better experience is brought to the user.
The technical solutions provided by the embodiments of the present disclosure are described below with specific embodiments.
FIG. 2 is a flow diagram illustrating a method for secure bracelet-based processing of pictures in accordance with an exemplary embodiment; in this embodiment, by using the above method provided by the embodiment of the present disclosure, an example is described by taking how to implement the binding between the bracelet and the mobile terminal and encrypt the picture on the mobile terminal through the bracelet, as shown in fig. 2, the following operations are performed:
in step S201, before the bracelet and the mobile terminal establish a binding relationship, the user identity information is authenticated, and after the authentication is passed, the bracelet and the mobile terminal are bound.
In step S202, a key is allocated to the bracelet.
In an embodiment, a user uses a bracelet for the first time, or the user changes a new bracelet, at this time, the identity information of the user needs to be authenticated first, after the authentication is passed, the mobile terminal is bound with the bracelet, so that it is ensured that the user is a legal user, the bracelet and the mobile terminal are in one-to-one correspondence, and after the user changes the new bracelet after the bracelet is lost, an illegal third person uses the bracelet which is lost or abandoned by the user to perform illegal encryption or decryption on the picture on the mobile terminal of the user. When binding, can bind the identity information that the bracelet carried with mobile terminal, wherein, the identity information of bracelet can be the number of the similar equipment number of bracelet, also can be the identity information of the similar MAC address of bracelet.
In step S203, encrypting the obtained picture by using a preset encryption algorithm and a key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm.
In an embodiment, the key bound to the bracelet may be stored on the mobile terminal or on the bracelet, and if the key is stored on the bracelet, after the bracelet establishes a communication connection with the mobile terminal and the user needs to encrypt the selected picture using the key, the user needs to obtain the key from the bracelet. In another embodiment, if the key is stored in the mobile terminal, after the bracelet establishes a communication connection with the mobile terminal and the user needs to encrypt the selected picture by using the key, the corresponding key may be directly obtained from the mobile terminal.
In an embodiment, the encryption algorithm may include, but is not limited to: data Encryption Standard (DES), 3DES (triple DES), RC2, RC4, International Data Encryption Algorithm (IDEA), and asymmetric Encryption Algorithm RSA. In an embodiment, the encryption information may include the above listed encryption methods, for example, if the encryption algorithm selected by the user is a DES algorithm, the DES algorithm is added to the encryption information when encrypting the selected picture (for example, 20 pictures to be encrypted are selected from 100 pictures), and when decrypting the picture, the DES algorithm in the encryption information is acquired, so that the encrypted picture can be decrypted by using the DES method. In an embodiment, the encrypted information may be stored in the picture file by means of an encryption header, and the encrypted picture file may include the encryption header and an encryption body, where the encryption body is the encrypted picture file.
In step S204, the encrypted picture is stored in a preset naming manner.
In an embodiment, the encrypted picture may be marked by modifying a suffix of a file name of the picture, for example, the file name of the original picture is "IMG _2001. JPG", and the picture file may be identified as the encrypted picture by the user by modifying the suffix of the file name of the original picture, for example, the modified suffix is "IMG _2001. ring"; in another embodiment, the picture may also be marked by adding a mark on the file name, for example, by adding "_ enc" after the file name "IMG _ 2001", which indicates that the picture has been subjected to encryption processing, and "IMG _2001_ enc.jpg"; by the mode, even if other people know that the picture file is in the JPG format, the encrypted picture cannot be really opened.
In this embodiment, steps S201 and S202 are not steps that must be executed before step S203, and steps S201 and S202 may not be executed as long as the bracelet is bound to the mobile terminal once. The embodiment of the present disclosure is only exemplified by how to implement the binding between the bracelet and the mobile terminal in step S201, and does not form a limitation to the embodiment.
In the embodiment, the bracelet and the mobile terminal are in one-to-one correspondence, so that a user can conveniently and quickly carry out confidential processing on the picture on the mobile terminal, the picture on the mobile terminal is prevented from being randomly browsed and transmitted when other people illegally acquire the mobile terminal, the picture privacy of the user is conveniently and quickly protected, and better experience is brought to the user; the encrypted pictures are stored in a set mode, so that a user can conveniently identify which pictures are encrypted and which pictures are not encrypted.
FIG. 3 is a flowchart illustrating a method for security handling of pictures based on a bracelet according to an example embodiment two; in this embodiment, the above method provided by the embodiment of the present disclosure is used to exemplarily decrypt the encrypted picture and unbind the bracelet and the mobile terminal, and as shown in fig. 3, the following operations are performed:
in step S301, an encrypted picture file is obtained, and a key used for encrypting the picture is obtained.
In an embodiment, corresponding to step S203 in the first embodiment, the encryption algorithm may be obtained from the encryption information stored in the picture file. The secret key can be acquired from the bracelet or the mobile terminal; in one embodiment, the secret key is stored on the bracelet, and when the user wears the bracelet and holds the mobile terminal, the mobile terminal acquires the secret key from the bracelet end, and through the secret key acquisition mode, the encrypted picture can be decrypted only when the user wears the bracelet and holds the mobile terminal, so that the picture privacy of the user can be fully protected; in another embodiment, the secret key is stored on the mobile terminal, and after the bracelet is verified, the secret key is directly acquired from the mobile terminal, so that the communication frequency between the bracelet and the mobile terminal can be reduced and the efficiency of decrypting the picture is improved.
In step S302, after determining that the bracelet is within the preset range, the encrypted picture is decrypted by using the key.
In an embodiment, corresponding to the description of step S203 in the first embodiment, if the encryption algorithm selected by the user is obtained through the encryption information and is DES encryption, when the selected picture is decrypted, the encrypted picture may be decrypted by using a DES method through the obtained key.
Step S303, displaying the decrypted picture.
In the embodiment, the picture is decrypted, so that the user can decrypt the encrypted picture when the user needs to browse the picture, and the privacy of the user is fully protected.
The above embodiments may also include an operation of unbinding the bracelet from the mobile terminal, specifically referring to the following steps:
authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
when detecting that the bracelet is in the preset range, unbinding the bracelet and the mobile terminal according to the unbinding operation of the user.
In an embodiment, if the original bracelet of the user has updated the bracelet because the product is updated, or the original bracelet has been replaced because the user is lost, under this kind of situation, in order to make the bracelet after the update continue to use and ensure the bracelet and mobile terminal one-to-one relation, thereby need forbid original bracelet, through unbundling identity information and mobile terminal on the original bracelet, and bind bracelet after will updating and mobile terminal again, avoided other people to encrypt or decrypt the processing through the picture on the mobile terminal of original bracelet.
As another embodiment, the above embodiments may further include the following steps:
sending the secret key to a cloud server;
after the bracelet is unbound with the mobile terminal, downloading the secret key from the cloud server;
and decrypting the encrypted picture through the secret key and a preset encryption algorithm. When the secret key is stored on the bracelet, the operation can ensure that the bracelet is lost or destroyed and then the secret key is acquired from the cloud server, and under the condition that the user knows the encryption algorithm, the normal decryption processing can be carried out on the encrypted picture, so that the user can normally browse the encrypted picture.
Fig. 4 is a block diagram illustrating an apparatus for security processing of a picture based on a bracelet according to an exemplary embodiment, where the apparatus for security processing of a picture based on a bracelet, as shown in fig. 4, includes:
the detection module 41 is configured to detect whether the bracelet is within a preset range when the mobile terminal acquires a picture, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and the encryption storage module 42 is configured to encrypt and store the picture if the detection module 41 detects that the bracelet is within the preset range.
As shown in fig. 5, the apparatus may further include:
the first decryption module 43 is configured to decrypt the encrypted picture if the detection module 41 detects that the bracelet is within the preset range;
a display module 44 configured to display the picture decrypted by the first decryption module 43.
In one embodiment, the decryption module 43 may include:
a receiving submodule (not shown) configured to receive a key from the bracelet;
a first decryption submodule (not shown in the figure) configured to decrypt the encrypted picture by using the key received by the receiving submodule; and/or the presence of a gas in the gas,
a verification sub-module (not shown) configured to verify the bracelet;
and the second decryption submodule (not shown in the figure) is configured to decrypt the encrypted picture through the secret key stored in the mobile terminal after the verification of the verification submodule is passed.
In one embodiment, the encryption storage module 42 may include:
an encryption submodule (not shown in the figure) configured to encrypt the obtained picture by using a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption head and encrypted content, and the encryption head comprises an encryption algorithm;
and the storage submodule (not shown in the figure) is configured to store the picture encrypted by the encryption submodule in a preset naming mode.
In one embodiment, the apparatus may further comprise:
the first authentication module 45 is configured to authenticate the user identity information before the bracelet and the mobile terminal establish a binding relationship;
a binding module 46 configured to bind the bracelet with the mobile terminal after the first authentication module 45 authenticates the user identity information;
a key distribution module 47 configured to distribute the key by the bracelet.
In one embodiment, the apparatus may further comprise:
the first unbinding module 48 is configured to unbind the bracelet selected by the user from the mobile terminal after the first authentication module 45 authenticates the user identity information; and/or the presence of a gas in the gas,
and a second unbinding module 49 configured to unbind the bracelet from the mobile terminal according to an unbinding operation of the user when the detection module 41 detects that the bracelet is within the preset range.
In one embodiment, the apparatus may further comprise:
a sending module 50 configured to send the key to the cloud server;
the downloading module 51 is used for downloading the secret key from the cloud server after the bracelet is unbound with the mobile terminal;
and the second decryption module 52 is configured to decrypt the encrypted picture by using the key downloaded by the downloading module 51 and a preset encryption algorithm.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 6 is a block diagram illustrating an apparatus 600 adapted for secure bracelet-based picture processing according to an example embodiment. For example, the apparatus 600 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 6, apparatus 600 may include one or more of the following components: processing component 602, memory 604, power component 606, multimedia component 608, audio component 610, input/output (I/O) interface 612, sensor component 614, and communication component 616.
The processing component 602 generally controls overall operation of the device 600, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing elements 602 may include one or more processors 620 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 602 can include one or more modules that facilitate interaction between the processing component 602 and other components. For example, the processing component 602 can include a multimedia module to facilitate interaction between the multimedia component 606 and the processing component 602.
The memory 604 is configured to store various types of data to support operation at the device 600. Examples of such data include instructions for any application or method operating on device 600, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 604 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 606 provides power to the various components of device 600. Power components 606 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 600.
The multimedia component 608 includes a screen that provides an output interface between the device 600 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 608 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 600 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 610 is configured to output and/or input audio signals. For example, audio component 610 includes a Microphone (MIC) configured to receive external audio signals when apparatus 600 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 604 or transmitted via the communication component 616. In some embodiments, audio component 610 further includes a speaker for outputting audio signals.
The I/O interface 612 provides an interface between the processing component 602 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 614 includes one or more sensors for providing status assessment of various aspects of the apparatus 600. For example, the sensor component 614 may detect an open/closed state of the device 600, the relative positioning of components, such as a display and keypad of the apparatus 600, the sensor component 614 may also detect a change in position of the apparatus 600 or a component of the apparatus 600, the presence or absence of user contact with the apparatus 600, orientation or acceleration/deceleration of the apparatus 600, and a change in temperature of the apparatus 600. The sensor assembly 614 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 614 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 614 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 616 is configured to facilitate communications between the apparatus 600 and other devices in a wired or wireless manner. The apparatus 600 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 616 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 616 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 600 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 604 comprising instructions, executable by the processor 620 of the apparatus 600 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (15)
1. A method for carrying out secret processing on a picture based on a bracelet, which is characterized by comprising the following steps:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
2. The method of claim 1, wherein the method further comprises:
if the bracelet is within the preset range, decrypting the encrypted picture;
and displaying the decrypted picture.
3. The method of claim 1, wherein the method further comprises:
receiving the secret key from the bracelet;
decrypting the encrypted picture through the secret key; or,
verifying the bracelet;
and after the verification is passed, decrypting the encrypted picture by using a secret key stored on the mobile terminal.
4. The method of claim 1, wherein said encrypting and storing the picture comprises:
encrypting the obtained picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and storing the encrypted picture in a preset naming mode.
5. The method of claim 1, wherein the method further comprises:
before the bracelet and the mobile terminal are in a binding relationship, authenticating user identity information, and after the bracelet and the mobile terminal are authenticated, binding the bracelet and the mobile terminal;
and distributing the secret key for the bracelet.
6. The method of claim 1, wherein the method further comprises:
authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
and when the bracelet is detected to be within a preset range, the bracelet and the mobile terminal are unbound according to the unbinding operation of the user.
7. The method of any of claims 1-6, further comprising:
sending the secret key to a cloud server;
after the bracelet is unbound with the mobile terminal, downloading the secret key from the cloud server;
and decrypting the encrypted picture through the secret key and a preset encryption algorithm.
8. An apparatus for secure handling of pictures based on a bracelet, the apparatus comprising:
the mobile terminal comprises a detection module and a display module, wherein the detection module is configured to detect whether a bracelet is in a preset range or not when the mobile terminal acquires a picture, and the bracelet already establishes a binding relationship with the mobile terminal;
and the encryption storage module is configured to encrypt and store the picture if the detection module detects that the bracelet is in the preset range.
9. The apparatus of claim 8, wherein the apparatus further comprises:
the first decryption module is configured to decrypt the encrypted picture if the detection module detects that the bracelet is within the preset range;
and the display module is configured to display the picture decrypted by the decryption module.
10. The apparatus of claim 9, wherein the first decryption module comprises:
a receiving submodule configured to receive the key from the bracelet;
a first decryption submodule configured to decrypt the encrypted picture by using the key received by the receiving submodule; and/or the presence of a gas in the gas,
a verification sub-module configured to verify the bracelet;
and the second decryption submodule is configured to decrypt the encrypted picture through the secret key stored in the mobile terminal after the verification of the verification submodule is passed.
11. The apparatus of claim 8, wherein the encryption storage module comprises:
the encryption submodule is configured to encrypt the acquired picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and the storage sub-module is configured to store the picture encrypted by the encryption sub-module in a preset naming mode.
12. The apparatus of claim 8, wherein the apparatus further comprises:
the first authentication module is configured to authenticate user identity information before the bracelet and the mobile terminal establish a binding relationship;
the binding module is configured to bind the bracelet with the mobile terminal after the first authentication module passes the authentication;
a key distribution module configured to distribute the key by the bracelet.
13. The apparatus of claim 12, wherein the apparatus further comprises:
the first unbinding module is configured to unbind the bracelet selected by the user from the mobile terminal after the first authentication module authenticates the identity information of the user; and/or the presence of a gas in the gas,
the second unbinding module is configured to unbind the bracelet from the mobile terminal according to the unbinding operation of the user when the detection module detects that the bracelet is within a preset range.
14. The apparatus of any of claims 8-13, wherein the apparatus further comprises:
a sending module configured to send the key to a cloud server;
the downloading module is configured to download the secret key from the cloud server after the bracelet is unbound with the mobile terminal;
and the second decryption module is configured to decrypt the encrypted picture by the secret key obtained by downloading through the downloading module and a preset encryption algorithm.
15. An apparatus for secure handling of pictures based on a bracelet, the apparatus comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410682949.4A CN104331672A (en) | 2014-11-24 | 2014-11-24 | Method and device for performing confidential treatment on pictures upon bracelet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410682949.4A CN104331672A (en) | 2014-11-24 | 2014-11-24 | Method and device for performing confidential treatment on pictures upon bracelet |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104331672A true CN104331672A (en) | 2015-02-04 |
Family
ID=52406394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410682949.4A Pending CN104331672A (en) | 2014-11-24 | 2014-11-24 | Method and device for performing confidential treatment on pictures upon bracelet |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104331672A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069364A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Picture display method and mobile terminal |
CN105912942A (en) * | 2016-06-13 | 2016-08-31 | 惠州Tcl移动通信有限公司 | Mobile terminal image encryption and decryption processing method and system based on NFC |
CN106407825A (en) * | 2016-10-13 | 2017-02-15 | 深圳市魔样科技有限公司 | Bracelet and terminal-based U disk encryption method and system |
CN106952209A (en) * | 2017-05-04 | 2017-07-14 | 国网天津市电力公司 | A kind of Classified Control Clerk safe bracelet |
CN106971114A (en) * | 2017-03-31 | 2017-07-21 | 联想(北京)有限公司 | A kind of method and device of image security |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101625773A (en) * | 2008-07-10 | 2010-01-13 | 刘迅 | Method for implementing remote-control and passive keyless systems based on Bluetooth technology |
CN103326867A (en) * | 2013-07-15 | 2013-09-25 | 上海果壳电子有限公司 | Intelligent ring with ability of short distance identity authentication |
CN103560890A (en) * | 2013-11-18 | 2014-02-05 | 黄燕平 | Networked transaction system and method based on mobile terminal |
WO2014042742A1 (en) * | 2012-09-17 | 2014-03-20 | Intel Corporation | Personal area mapping |
US20140281565A1 (en) * | 2013-03-15 | 2014-09-18 | Tyfone, Inc. | Configurable personal digital identity device responsive to user interaction |
CN104125068A (en) * | 2014-07-04 | 2014-10-29 | 天津大学 | Portable ring-shaped electronic device for information security, and control method |
CN104158666A (en) * | 2014-08-28 | 2014-11-19 | 电子科技大学 | Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal |
-
2014
- 2014-11-24 CN CN201410682949.4A patent/CN104331672A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101625773A (en) * | 2008-07-10 | 2010-01-13 | 刘迅 | Method for implementing remote-control and passive keyless systems based on Bluetooth technology |
WO2014042742A1 (en) * | 2012-09-17 | 2014-03-20 | Intel Corporation | Personal area mapping |
US20140281565A1 (en) * | 2013-03-15 | 2014-09-18 | Tyfone, Inc. | Configurable personal digital identity device responsive to user interaction |
CN103326867A (en) * | 2013-07-15 | 2013-09-25 | 上海果壳电子有限公司 | Intelligent ring with ability of short distance identity authentication |
CN103560890A (en) * | 2013-11-18 | 2014-02-05 | 黄燕平 | Networked transaction system and method based on mobile terminal |
CN104125068A (en) * | 2014-07-04 | 2014-10-29 | 天津大学 | Portable ring-shaped electronic device for information security, and control method |
CN104158666A (en) * | 2014-08-28 | 2014-11-19 | 电子科技大学 | Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069364A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Picture display method and mobile terminal |
CN105069364B (en) * | 2015-06-30 | 2017-11-17 | 广东欧珀移动通信有限公司 | A kind of picture display method and mobile terminal |
CN105912942A (en) * | 2016-06-13 | 2016-08-31 | 惠州Tcl移动通信有限公司 | Mobile terminal image encryption and decryption processing method and system based on NFC |
CN106407825A (en) * | 2016-10-13 | 2017-02-15 | 深圳市魔样科技有限公司 | Bracelet and terminal-based U disk encryption method and system |
CN106407825B (en) * | 2016-10-13 | 2019-10-29 | 深圳市魔样科技有限公司 | USB flash disk encryption method and system based on bracelet and terminal |
CN106971114A (en) * | 2017-03-31 | 2017-07-21 | 联想(北京)有限公司 | A kind of method and device of image security |
CN106952209A (en) * | 2017-05-04 | 2017-07-14 | 国网天津市电力公司 | A kind of Classified Control Clerk safe bracelet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104869612B (en) | Access the method and device of network | |
EP3001640B1 (en) | Secure information exchange methods and wearable device | |
KR101733072B1 (en) | Method and apparatus for processing surveillance video, program and recording medium | |
CN109146470B (en) | Method and device for generating payment code | |
WO2017045313A1 (en) | Short message reading method and device | |
CN104955031A (en) | Information transmission method and device | |
CN104852911A (en) | Safety verification method, device and system | |
CN105744595B (en) | Access method, apparatus, system and the storage medium of WLAN | |
CN107766701B (en) | Electronic equipment, dynamic library file protection method and device | |
CN106060098B (en) | Processing method, processing unit and the processing system of identifying code | |
JP6163610B2 (en) | Forgery prevention verification method, apparatus, program, and recording medium | |
CN113343212A (en) | Device registration method and apparatus, electronic device, and storage medium | |
CN104331672A (en) | Method and device for performing confidential treatment on pictures upon bracelet | |
CN109246110B (en) | Data sharing method and device and computer readable storage medium | |
CN105681365B (en) | Method and apparatus for file transmission | |
CN105681261A (en) | Security authentication method and apparatus | |
CN104852800A (en) | Data transmission method and device | |
CN111917728A (en) | Password verification method and device | |
CN105282162A (en) | Processing method and device for account management business | |
CN115277117A (en) | File viewing method and device, electronic equipment and storage medium | |
CN113055169B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN106611112A (en) | Application program safe processing method, device and equipment | |
CN114221764A (en) | Public key updating method, device and equipment based on block chain | |
CN114218510A (en) | Service page display method, device and equipment | |
CN107302519B (en) | Identity authentication method and device for terminal equipment, terminal equipment and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150204 |
|
RJ01 | Rejection of invention patent application after publication |