Nothing Special   »   [go: up one dir, main page]

CN104331672A - Method and device for performing confidential treatment on pictures upon bracelet - Google Patents

Method and device for performing confidential treatment on pictures upon bracelet Download PDF

Info

Publication number
CN104331672A
CN104331672A CN201410682949.4A CN201410682949A CN104331672A CN 104331672 A CN104331672 A CN 104331672A CN 201410682949 A CN201410682949 A CN 201410682949A CN 104331672 A CN104331672 A CN 104331672A
Authority
CN
China
Prior art keywords
bracelet
picture
mobile terminal
module
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410682949.4A
Other languages
Chinese (zh)
Inventor
马坤
林锦滨
史大龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410682949.4A priority Critical patent/CN104331672A/en
Publication of CN104331672A publication Critical patent/CN104331672A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to a method and a device for performing confidential treatment on pictures upon a bracelet, and is used for protecting the privacy of a user. The method comprises the following steps: detecting whether the bracelet is within a preset range when the pictures are acquired at a mobile terminal, wherein the bracelet has a binding relationship with the mobile terminal; if the bracelet is within the preset range, encrypting and storing the pictures. According to the technical scheme of the disclosure, the user can conveniently and rapidly perform the confidential treatment on the pictures on the mobile terminal, and therefore other people are prevented from randomly browsing and transmitting the pictures on the mobile terminal when illegally obtaining the mobile terminal, the picture privacy of the user is conveniently and rapidly protected, and better experience is brought to the user.

Description

Method and device for carrying out confidential processing on picture based on bracelet
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for performing security processing on a picture based on a bracelet.
Background
With the development of the intellectualization of the mobile terminal, a user can shoot photos at any time and any place through the mobile terminal, and the user can upload the shot photos to the internet at any time in a user-defined setting mode, so that other people can browse the photos. For a user, a private photo may not be conveniently published to another person, or the user does not want to directly store the private photo on the mobile terminal, and once the mobile terminal is lost, another person holding the mobile terminal can easily browse the photo stored on the mobile terminal by a legal user.
Disclosure of Invention
In order to overcome the problems in the related art, embodiments of the present disclosure provide a method and an apparatus for security processing of a picture based on a bracelet, so as to protect a picture that a user does not want to disclose through the bracelet.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for security processing of a picture based on a bracelet, including:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
In an embodiment, the method may further comprise:
if the bracelet is within the preset range, decrypting the encrypted picture;
and displaying the decrypted picture.
In an embodiment, the method may further comprise:
receiving the secret key from the bracelet;
decrypting the encrypted picture through the secret key; or,
verifying the bracelet;
and after the verification is passed, decrypting the encrypted picture by using a secret key stored on the mobile terminal.
In an embodiment, the encrypting and storing the picture may include:
encrypting the obtained picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and storing the encrypted picture in a preset naming mode.
In an embodiment, the method may further comprise:
before the bracelet and the mobile terminal are in a binding relationship, authenticating user identity information, and after the bracelet and the mobile terminal are authenticated, binding the bracelet and the mobile terminal;
and distributing the secret key for the bracelet.
In an embodiment, the method may further comprise:
authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
and when the bracelet is detected to be within a preset range, the bracelet and the mobile terminal are unbound according to the unbinding operation of the user.
Authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
and when the bracelet is detected to be within a preset range, the bracelet and the mobile terminal are unbound according to the unbinding operation of the user.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for performing security processing on a picture based on a bracelet, including:
the mobile terminal comprises a detection module and a processing module, wherein the detection module is used for detecting whether a bracelet is in a preset range or not when the mobile terminal acquires a picture, and the bracelet already establishes a binding relationship with the mobile terminal;
and the encryption storage module is used for encrypting and storing the picture if the detection module detects that the bracelet is in the preset range.
In an embodiment, the apparatus may further comprise:
the first decryption module is used for decrypting the encrypted picture if the detection module detects that the bracelet is within the preset range;
and the display module is used for displaying the picture decrypted by the decryption module.
In one embodiment, the first decryption module may include:
the receiving submodule is used for receiving the secret key from the bracelet;
the first decryption submodule is used for decrypting the encrypted picture through the secret key received by the receiving submodule; and/or the presence of a gas in the gas,
the verification submodule is used for verifying the bracelet;
and the second decryption submodule is used for decrypting the encrypted picture through the secret key stored in the mobile terminal after the verification of the verification submodule is passed.
In one embodiment, the encryption storage module may include:
the encryption submodule is used for encrypting the acquired picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and the storage submodule is used for storing the picture encrypted by the encryption submodule in a preset naming mode.
In an embodiment, the apparatus may further comprise:
the first authentication module is configured to authenticate user identity information before the bracelet and the mobile terminal establish a binding relationship;
the binding module is configured to bind the bracelet with the mobile terminal after the first authentication module passes the authentication;
a key distribution module configured to distribute the key by the bracelet.
In an embodiment, the apparatus may further comprise:
the first unbinding module is configured to unbind the bracelet selected by the user from the mobile terminal after the first authentication module authenticates the identity information of the user; and/or the presence of a gas in the gas,
the second unbinding module is configured to unbind the bracelet from the mobile terminal according to the unbinding operation of the user when the detection module detects that the bracelet is within a preset range.
In an embodiment, the apparatus may further comprise:
a sending module configured to send the key to a cloud server;
the downloading module is configured to download the secret key from the cloud server after the bracelet is unbound with the mobile terminal;
and the second decryption module is configured to decrypt the encrypted picture by the secret key obtained by downloading through the downloading module and a preset encryption algorithm.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for performing security processing on a picture based on a bracelet, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: when the mobile terminal acquires the picture, the picture is encrypted and stored in a preset range through the detection bracelet, so that the user can carry out confidential processing on the picture on the mobile terminal conveniently and quickly, the picture on the mobile terminal is prevented from being browsed and transmitted randomly when the other people illegally acquire the mobile terminal, the picture privacy of the user is protected conveniently and quickly, and better experience is brought to the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flow diagram illustrating a method for secure bracelet-based processing of pictures, according to an example embodiment.
FIG. 2 is a flow diagram illustrating a method for secure bracelet-based processing of pictures in accordance with an exemplary embodiment.
Fig. 3 is a flowchart illustrating a method for security processing of a picture based on a bracelet according to an exemplary embodiment.
Fig. 4 is a block diagram illustrating an apparatus for security handling of pictures based on a bracelet according to an example embodiment.
Fig. 5 is a block diagram illustrating another apparatus for security handling of pictures based on a bracelet according to an example embodiment.
Fig. 6 is a block diagram illustrating an apparatus adapted for secure bracelet-based picture processing according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a method for security processing of a picture based on a bracelet, according to an exemplary embodiment, the method for security processing of a picture based on a bracelet can be applied to a mobile terminal such as a smart phone or a tablet computer, etc., where a picture is stored, and can be implemented by installing an application on the mobile terminal or installing software on the tablet computer, and can also be implemented by a web page on a browser, as shown in fig. 1, the method for security processing of a picture based on a bracelet includes the following steps S101-S102:
in step S101, when the mobile terminal obtains a picture, it is detected whether the bracelet is within a preset range, where the bracelet has established a binding relationship with the mobile terminal.
In one embodiment, the mobile terminal can acquire the picture by taking a picture or downloading the picture, the personal information on the bracelet can be bound with the mobile terminal, in another embodiment, a Media Access Control (MAC) Address on the bracelet can be bound with the mobile terminal, and the bracelet and the mobile terminal are bound, so that the bracelet and the mobile terminal can perform one-to-one encryption processing, and the picture on the mobile terminal can be prevented from being browsed and transmitted randomly when other people illegally acquire the mobile terminal. In addition, under the permission condition, one mobile terminal can be bound with a plurality of bracelets, and one bracelet can also be bound with a plurality of mobile terminals.
In step S102, if the bracelet is within the preset range, the picture is encrypted and stored.
In an embodiment, the encrypted picture may be marked by modifying a suffix of a file name of the picture, for example, the file name of the original picture is "IMG _2001. JPG", and the picture file may be identified as the encrypted picture by the user by modifying the suffix of the file name of the original picture, for example, the modified suffix is "IMG _2001. ring"; in another embodiment, the encrypted picture may also be opened by adding a mark to the file name, for example, the marked "IMG _2001_ enc.jpg", in such a way that even if others know that the picture file is in the JPG format, the encrypted picture is not really opened.
In the embodiment, when the mobile terminal acquires the picture, the picture is encrypted and stored by detecting the bracelet within the preset range, so that the picture on the mobile terminal can be processed in a confidential mode conveniently and quickly by a user, the picture on the mobile terminal is prevented from being browsed and transmitted randomly when the picture is acquired illegally by other people, the picture privacy of the user is protected conveniently and quickly, and better experience is brought to the user.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include steps S103 and S104:
in step S103, if the bracelet is within the preset range, decrypting the encrypted picture;
in step S104, the decrypted picture is displayed.
In one embodiment, a key from a bracelet is received;
decrypting the encrypted picture through the secret key; or,
verifying the bracelet;
and after the verification is passed, decrypting the encrypted picture by using the secret key stored on the mobile terminal.
In one embodiment, step S102 may include steps A1-A2:
in step a1, encrypting the obtained picture by using a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises an encryption algorithm.
In step a2, the encrypted picture is stored in a preset naming manner.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include step S105 and step S106:
in step S105, establishing a communication connection with the bracelet in a wireless communication manner;
in step S106, after the communication connection is established for the first time, the identity information of the bracelet is recognized and the identity information and the mobile terminal are bound.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include step S107 and step S108:
in step S107, before the bracelet and the mobile terminal establish a binding relationship, the user identity information is authenticated, and after the authentication is passed, the bracelet and the mobile terminal are bound.
In step S108, a key is allocated to the bracelet.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include step S109 or step S110:
in step S109, the user identity information is authenticated, and after the authentication is passed, the bracelet selected by the user is unbound to the mobile terminal.
In step S110, the user identity information is authenticated, and after the authentication is passed, the bracelet selected by the user is unbound to the mobile terminal.
In an embodiment, the method for performing security processing on a picture based on a bracelet may further include steps S111 to S113:
in step S111, the secret key is sent to the cloud server;
in step S112, after the bracelet is unbound to the mobile terminal, downloading the key from the cloud server;
in step S113, the encrypted picture is decrypted by using the key and a predetermined encryption algorithm.
Please refer to the following embodiments for details of how to perform security processing on pictures by using the bracelet.
Therefore, according to the method provided by the embodiment of the disclosure, when the picture is acquired by the mobile terminal, the picture is encrypted and stored by detecting the bracelet within the preset range, so that the picture on the mobile terminal can be processed in a secret manner conveniently and quickly by a user, the picture on the mobile terminal is prevented from being browsed and transmitted randomly when the picture is acquired illegally by other people, the picture privacy of the user is protected conveniently and quickly, and better experience is brought to the user.
The technical solutions provided by the embodiments of the present disclosure are described below with specific embodiments.
FIG. 2 is a flow diagram illustrating a method for secure bracelet-based processing of pictures in accordance with an exemplary embodiment; in this embodiment, by using the above method provided by the embodiment of the present disclosure, an example is described by taking how to implement the binding between the bracelet and the mobile terminal and encrypt the picture on the mobile terminal through the bracelet, as shown in fig. 2, the following operations are performed:
in step S201, before the bracelet and the mobile terminal establish a binding relationship, the user identity information is authenticated, and after the authentication is passed, the bracelet and the mobile terminal are bound.
In step S202, a key is allocated to the bracelet.
In an embodiment, a user uses a bracelet for the first time, or the user changes a new bracelet, at this time, the identity information of the user needs to be authenticated first, after the authentication is passed, the mobile terminal is bound with the bracelet, so that it is ensured that the user is a legal user, the bracelet and the mobile terminal are in one-to-one correspondence, and after the user changes the new bracelet after the bracelet is lost, an illegal third person uses the bracelet which is lost or abandoned by the user to perform illegal encryption or decryption on the picture on the mobile terminal of the user. When binding, can bind the identity information that the bracelet carried with mobile terminal, wherein, the identity information of bracelet can be the number of the similar equipment number of bracelet, also can be the identity information of the similar MAC address of bracelet.
In step S203, encrypting the obtained picture by using a preset encryption algorithm and a key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm.
In an embodiment, the key bound to the bracelet may be stored on the mobile terminal or on the bracelet, and if the key is stored on the bracelet, after the bracelet establishes a communication connection with the mobile terminal and the user needs to encrypt the selected picture using the key, the user needs to obtain the key from the bracelet. In another embodiment, if the key is stored in the mobile terminal, after the bracelet establishes a communication connection with the mobile terminal and the user needs to encrypt the selected picture by using the key, the corresponding key may be directly obtained from the mobile terminal.
In an embodiment, the encryption algorithm may include, but is not limited to: data Encryption Standard (DES), 3DES (triple DES), RC2, RC4, International Data Encryption Algorithm (IDEA), and asymmetric Encryption Algorithm RSA. In an embodiment, the encryption information may include the above listed encryption methods, for example, if the encryption algorithm selected by the user is a DES algorithm, the DES algorithm is added to the encryption information when encrypting the selected picture (for example, 20 pictures to be encrypted are selected from 100 pictures), and when decrypting the picture, the DES algorithm in the encryption information is acquired, so that the encrypted picture can be decrypted by using the DES method. In an embodiment, the encrypted information may be stored in the picture file by means of an encryption header, and the encrypted picture file may include the encryption header and an encryption body, where the encryption body is the encrypted picture file.
In step S204, the encrypted picture is stored in a preset naming manner.
In an embodiment, the encrypted picture may be marked by modifying a suffix of a file name of the picture, for example, the file name of the original picture is "IMG _2001. JPG", and the picture file may be identified as the encrypted picture by the user by modifying the suffix of the file name of the original picture, for example, the modified suffix is "IMG _2001. ring"; in another embodiment, the picture may also be marked by adding a mark on the file name, for example, by adding "_ enc" after the file name "IMG _ 2001", which indicates that the picture has been subjected to encryption processing, and "IMG _2001_ enc.jpg"; by the mode, even if other people know that the picture file is in the JPG format, the encrypted picture cannot be really opened.
In this embodiment, steps S201 and S202 are not steps that must be executed before step S203, and steps S201 and S202 may not be executed as long as the bracelet is bound to the mobile terminal once. The embodiment of the present disclosure is only exemplified by how to implement the binding between the bracelet and the mobile terminal in step S201, and does not form a limitation to the embodiment.
In the embodiment, the bracelet and the mobile terminal are in one-to-one correspondence, so that a user can conveniently and quickly carry out confidential processing on the picture on the mobile terminal, the picture on the mobile terminal is prevented from being randomly browsed and transmitted when other people illegally acquire the mobile terminal, the picture privacy of the user is conveniently and quickly protected, and better experience is brought to the user; the encrypted pictures are stored in a set mode, so that a user can conveniently identify which pictures are encrypted and which pictures are not encrypted.
FIG. 3 is a flowchart illustrating a method for security handling of pictures based on a bracelet according to an example embodiment two; in this embodiment, the above method provided by the embodiment of the present disclosure is used to exemplarily decrypt the encrypted picture and unbind the bracelet and the mobile terminal, and as shown in fig. 3, the following operations are performed:
in step S301, an encrypted picture file is obtained, and a key used for encrypting the picture is obtained.
In an embodiment, corresponding to step S203 in the first embodiment, the encryption algorithm may be obtained from the encryption information stored in the picture file. The secret key can be acquired from the bracelet or the mobile terminal; in one embodiment, the secret key is stored on the bracelet, and when the user wears the bracelet and holds the mobile terminal, the mobile terminal acquires the secret key from the bracelet end, and through the secret key acquisition mode, the encrypted picture can be decrypted only when the user wears the bracelet and holds the mobile terminal, so that the picture privacy of the user can be fully protected; in another embodiment, the secret key is stored on the mobile terminal, and after the bracelet is verified, the secret key is directly acquired from the mobile terminal, so that the communication frequency between the bracelet and the mobile terminal can be reduced and the efficiency of decrypting the picture is improved.
In step S302, after determining that the bracelet is within the preset range, the encrypted picture is decrypted by using the key.
In an embodiment, corresponding to the description of step S203 in the first embodiment, if the encryption algorithm selected by the user is obtained through the encryption information and is DES encryption, when the selected picture is decrypted, the encrypted picture may be decrypted by using a DES method through the obtained key.
Step S303, displaying the decrypted picture.
In the embodiment, the picture is decrypted, so that the user can decrypt the encrypted picture when the user needs to browse the picture, and the privacy of the user is fully protected.
The above embodiments may also include an operation of unbinding the bracelet from the mobile terminal, specifically referring to the following steps:
authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
when detecting that the bracelet is in the preset range, unbinding the bracelet and the mobile terminal according to the unbinding operation of the user.
In an embodiment, if the original bracelet of the user has updated the bracelet because the product is updated, or the original bracelet has been replaced because the user is lost, under this kind of situation, in order to make the bracelet after the update continue to use and ensure the bracelet and mobile terminal one-to-one relation, thereby need forbid original bracelet, through unbundling identity information and mobile terminal on the original bracelet, and bind bracelet after will updating and mobile terminal again, avoided other people to encrypt or decrypt the processing through the picture on the mobile terminal of original bracelet.
As another embodiment, the above embodiments may further include the following steps:
sending the secret key to a cloud server;
after the bracelet is unbound with the mobile terminal, downloading the secret key from the cloud server;
and decrypting the encrypted picture through the secret key and a preset encryption algorithm. When the secret key is stored on the bracelet, the operation can ensure that the bracelet is lost or destroyed and then the secret key is acquired from the cloud server, and under the condition that the user knows the encryption algorithm, the normal decryption processing can be carried out on the encrypted picture, so that the user can normally browse the encrypted picture.
Fig. 4 is a block diagram illustrating an apparatus for security processing of a picture based on a bracelet according to an exemplary embodiment, where the apparatus for security processing of a picture based on a bracelet, as shown in fig. 4, includes:
the detection module 41 is configured to detect whether the bracelet is within a preset range when the mobile terminal acquires a picture, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and the encryption storage module 42 is configured to encrypt and store the picture if the detection module 41 detects that the bracelet is within the preset range.
As shown in fig. 5, the apparatus may further include:
the first decryption module 43 is configured to decrypt the encrypted picture if the detection module 41 detects that the bracelet is within the preset range;
a display module 44 configured to display the picture decrypted by the first decryption module 43.
In one embodiment, the decryption module 43 may include:
a receiving submodule (not shown) configured to receive a key from the bracelet;
a first decryption submodule (not shown in the figure) configured to decrypt the encrypted picture by using the key received by the receiving submodule; and/or the presence of a gas in the gas,
a verification sub-module (not shown) configured to verify the bracelet;
and the second decryption submodule (not shown in the figure) is configured to decrypt the encrypted picture through the secret key stored in the mobile terminal after the verification of the verification submodule is passed.
In one embodiment, the encryption storage module 42 may include:
an encryption submodule (not shown in the figure) configured to encrypt the obtained picture by using a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption head and encrypted content, and the encryption head comprises an encryption algorithm;
and the storage submodule (not shown in the figure) is configured to store the picture encrypted by the encryption submodule in a preset naming mode.
In one embodiment, the apparatus may further comprise:
the first authentication module 45 is configured to authenticate the user identity information before the bracelet and the mobile terminal establish a binding relationship;
a binding module 46 configured to bind the bracelet with the mobile terminal after the first authentication module 45 authenticates the user identity information;
a key distribution module 47 configured to distribute the key by the bracelet.
In one embodiment, the apparatus may further comprise:
the first unbinding module 48 is configured to unbind the bracelet selected by the user from the mobile terminal after the first authentication module 45 authenticates the user identity information; and/or the presence of a gas in the gas,
and a second unbinding module 49 configured to unbind the bracelet from the mobile terminal according to an unbinding operation of the user when the detection module 41 detects that the bracelet is within the preset range.
In one embodiment, the apparatus may further comprise:
a sending module 50 configured to send the key to the cloud server;
the downloading module 51 is used for downloading the secret key from the cloud server after the bracelet is unbound with the mobile terminal;
and the second decryption module 52 is configured to decrypt the encrypted picture by using the key downloaded by the downloading module 51 and a preset encryption algorithm.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 6 is a block diagram illustrating an apparatus 600 adapted for secure bracelet-based picture processing according to an example embodiment. For example, the apparatus 600 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 6, apparatus 600 may include one or more of the following components: processing component 602, memory 604, power component 606, multimedia component 608, audio component 610, input/output (I/O) interface 612, sensor component 614, and communication component 616.
The processing component 602 generally controls overall operation of the device 600, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing elements 602 may include one or more processors 620 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 602 can include one or more modules that facilitate interaction between the processing component 602 and other components. For example, the processing component 602 can include a multimedia module to facilitate interaction between the multimedia component 606 and the processing component 602.
The memory 604 is configured to store various types of data to support operation at the device 600. Examples of such data include instructions for any application or method operating on device 600, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 604 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 606 provides power to the various components of device 600. Power components 606 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 600.
The multimedia component 608 includes a screen that provides an output interface between the device 600 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 608 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 600 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 610 is configured to output and/or input audio signals. For example, audio component 610 includes a Microphone (MIC) configured to receive external audio signals when apparatus 600 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 604 or transmitted via the communication component 616. In some embodiments, audio component 610 further includes a speaker for outputting audio signals.
The I/O interface 612 provides an interface between the processing component 602 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 614 includes one or more sensors for providing status assessment of various aspects of the apparatus 600. For example, the sensor component 614 may detect an open/closed state of the device 600, the relative positioning of components, such as a display and keypad of the apparatus 600, the sensor component 614 may also detect a change in position of the apparatus 600 or a component of the apparatus 600, the presence or absence of user contact with the apparatus 600, orientation or acceleration/deceleration of the apparatus 600, and a change in temperature of the apparatus 600. The sensor assembly 614 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 614 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 614 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 616 is configured to facilitate communications between the apparatus 600 and other devices in a wired or wireless manner. The apparatus 600 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 616 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 616 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 600 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 604 comprising instructions, executable by the processor 620 of the apparatus 600 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (15)

1. A method for carrying out secret processing on a picture based on a bracelet, which is characterized by comprising the following steps:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
2. The method of claim 1, wherein the method further comprises:
if the bracelet is within the preset range, decrypting the encrypted picture;
and displaying the decrypted picture.
3. The method of claim 1, wherein the method further comprises:
receiving the secret key from the bracelet;
decrypting the encrypted picture through the secret key; or,
verifying the bracelet;
and after the verification is passed, decrypting the encrypted picture by using a secret key stored on the mobile terminal.
4. The method of claim 1, wherein said encrypting and storing the picture comprises:
encrypting the obtained picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and storing the encrypted picture in a preset naming mode.
5. The method of claim 1, wherein the method further comprises:
before the bracelet and the mobile terminal are in a binding relationship, authenticating user identity information, and after the bracelet and the mobile terminal are authenticated, binding the bracelet and the mobile terminal;
and distributing the secret key for the bracelet.
6. The method of claim 1, wherein the method further comprises:
authenticating the identity information of the user, and unbinding the bracelet selected by the user from the mobile terminal after the authentication is passed; or,
and when the bracelet is detected to be within a preset range, the bracelet and the mobile terminal are unbound according to the unbinding operation of the user.
7. The method of any of claims 1-6, further comprising:
sending the secret key to a cloud server;
after the bracelet is unbound with the mobile terminal, downloading the secret key from the cloud server;
and decrypting the encrypted picture through the secret key and a preset encryption algorithm.
8. An apparatus for secure handling of pictures based on a bracelet, the apparatus comprising:
the mobile terminal comprises a detection module and a display module, wherein the detection module is configured to detect whether a bracelet is in a preset range or not when the mobile terminal acquires a picture, and the bracelet already establishes a binding relationship with the mobile terminal;
and the encryption storage module is configured to encrypt and store the picture if the detection module detects that the bracelet is in the preset range.
9. The apparatus of claim 8, wherein the apparatus further comprises:
the first decryption module is configured to decrypt the encrypted picture if the detection module detects that the bracelet is within the preset range;
and the display module is configured to display the picture decrypted by the decryption module.
10. The apparatus of claim 9, wherein the first decryption module comprises:
a receiving submodule configured to receive the key from the bracelet;
a first decryption submodule configured to decrypt the encrypted picture by using the key received by the receiving submodule; and/or the presence of a gas in the gas,
a verification sub-module configured to verify the bracelet;
and the second decryption submodule is configured to decrypt the encrypted picture through the secret key stored in the mobile terminal after the verification of the verification submodule is passed.
11. The apparatus of claim 8, wherein the encryption storage module comprises:
the encryption submodule is configured to encrypt the acquired picture by adopting a preset encryption algorithm and a secret key to obtain an encrypted file; the encrypted file comprises an encryption header and encrypted content, and the encryption header comprises the encryption algorithm;
and the storage sub-module is configured to store the picture encrypted by the encryption sub-module in a preset naming mode.
12. The apparatus of claim 8, wherein the apparatus further comprises:
the first authentication module is configured to authenticate user identity information before the bracelet and the mobile terminal establish a binding relationship;
the binding module is configured to bind the bracelet with the mobile terminal after the first authentication module passes the authentication;
a key distribution module configured to distribute the key by the bracelet.
13. The apparatus of claim 12, wherein the apparatus further comprises:
the first unbinding module is configured to unbind the bracelet selected by the user from the mobile terminal after the first authentication module authenticates the identity information of the user; and/or the presence of a gas in the gas,
the second unbinding module is configured to unbind the bracelet from the mobile terminal according to the unbinding operation of the user when the detection module detects that the bracelet is within a preset range.
14. The apparatus of any of claims 8-13, wherein the apparatus further comprises:
a sending module configured to send the key to a cloud server;
the downloading module is configured to download the secret key from the cloud server after the bracelet is unbound with the mobile terminal;
and the second decryption module is configured to decrypt the encrypted picture by the secret key obtained by downloading through the downloading module and a preset encryption algorithm.
15. An apparatus for secure handling of pictures based on a bracelet, the apparatus comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a mobile terminal acquires a picture, detecting whether a bracelet is in a preset range, wherein the bracelet already establishes a binding relationship with the mobile terminal;
and if the bracelet is in the preset range, encrypting and storing the picture.
CN201410682949.4A 2014-11-24 2014-11-24 Method and device for performing confidential treatment on pictures upon bracelet Pending CN104331672A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410682949.4A CN104331672A (en) 2014-11-24 2014-11-24 Method and device for performing confidential treatment on pictures upon bracelet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410682949.4A CN104331672A (en) 2014-11-24 2014-11-24 Method and device for performing confidential treatment on pictures upon bracelet

Publications (1)

Publication Number Publication Date
CN104331672A true CN104331672A (en) 2015-02-04

Family

ID=52406394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410682949.4A Pending CN104331672A (en) 2014-11-24 2014-11-24 Method and device for performing confidential treatment on pictures upon bracelet

Country Status (1)

Country Link
CN (1) CN104331672A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069364A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Picture display method and mobile terminal
CN105912942A (en) * 2016-06-13 2016-08-31 惠州Tcl移动通信有限公司 Mobile terminal image encryption and decryption processing method and system based on NFC
CN106407825A (en) * 2016-10-13 2017-02-15 深圳市魔样科技有限公司 Bracelet and terminal-based U disk encryption method and system
CN106952209A (en) * 2017-05-04 2017-07-14 国网天津市电力公司 A kind of Classified Control Clerk safe bracelet
CN106971114A (en) * 2017-03-31 2017-07-21 联想(北京)有限公司 A kind of method and device of image security

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101625773A (en) * 2008-07-10 2010-01-13 刘迅 Method for implementing remote-control and passive keyless systems based on Bluetooth technology
CN103326867A (en) * 2013-07-15 2013-09-25 上海果壳电子有限公司 Intelligent ring with ability of short distance identity authentication
CN103560890A (en) * 2013-11-18 2014-02-05 黄燕平 Networked transaction system and method based on mobile terminal
WO2014042742A1 (en) * 2012-09-17 2014-03-20 Intel Corporation Personal area mapping
US20140281565A1 (en) * 2013-03-15 2014-09-18 Tyfone, Inc. Configurable personal digital identity device responsive to user interaction
CN104125068A (en) * 2014-07-04 2014-10-29 天津大学 Portable ring-shaped electronic device for information security, and control method
CN104158666A (en) * 2014-08-28 2014-11-19 电子科技大学 Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101625773A (en) * 2008-07-10 2010-01-13 刘迅 Method for implementing remote-control and passive keyless systems based on Bluetooth technology
WO2014042742A1 (en) * 2012-09-17 2014-03-20 Intel Corporation Personal area mapping
US20140281565A1 (en) * 2013-03-15 2014-09-18 Tyfone, Inc. Configurable personal digital identity device responsive to user interaction
CN103326867A (en) * 2013-07-15 2013-09-25 上海果壳电子有限公司 Intelligent ring with ability of short distance identity authentication
CN103560890A (en) * 2013-11-18 2014-02-05 黄燕平 Networked transaction system and method based on mobile terminal
CN104125068A (en) * 2014-07-04 2014-10-29 天津大学 Portable ring-shaped electronic device for information security, and control method
CN104158666A (en) * 2014-08-28 2014-11-19 电子科技大学 Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069364A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Picture display method and mobile terminal
CN105069364B (en) * 2015-06-30 2017-11-17 广东欧珀移动通信有限公司 A kind of picture display method and mobile terminal
CN105912942A (en) * 2016-06-13 2016-08-31 惠州Tcl移动通信有限公司 Mobile terminal image encryption and decryption processing method and system based on NFC
CN106407825A (en) * 2016-10-13 2017-02-15 深圳市魔样科技有限公司 Bracelet and terminal-based U disk encryption method and system
CN106407825B (en) * 2016-10-13 2019-10-29 深圳市魔样科技有限公司 USB flash disk encryption method and system based on bracelet and terminal
CN106971114A (en) * 2017-03-31 2017-07-21 联想(北京)有限公司 A kind of method and device of image security
CN106952209A (en) * 2017-05-04 2017-07-14 国网天津市电力公司 A kind of Classified Control Clerk safe bracelet

Similar Documents

Publication Publication Date Title
CN104869612B (en) Access the method and device of network
EP3001640B1 (en) Secure information exchange methods and wearable device
KR101733072B1 (en) Method and apparatus for processing surveillance video, program and recording medium
CN109146470B (en) Method and device for generating payment code
WO2017045313A1 (en) Short message reading method and device
CN104955031A (en) Information transmission method and device
CN104852911A (en) Safety verification method, device and system
CN105744595B (en) Access method, apparatus, system and the storage medium of WLAN
CN107766701B (en) Electronic equipment, dynamic library file protection method and device
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
JP6163610B2 (en) Forgery prevention verification method, apparatus, program, and recording medium
CN113343212A (en) Device registration method and apparatus, electronic device, and storage medium
CN104331672A (en) Method and device for performing confidential treatment on pictures upon bracelet
CN109246110B (en) Data sharing method and device and computer readable storage medium
CN105681365B (en) Method and apparatus for file transmission
CN105681261A (en) Security authentication method and apparatus
CN104852800A (en) Data transmission method and device
CN111917728A (en) Password verification method and device
CN105282162A (en) Processing method and device for account management business
CN115277117A (en) File viewing method and device, electronic equipment and storage medium
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN106611112A (en) Application program safe processing method, device and equipment
CN114221764A (en) Public key updating method, device and equipment based on block chain
CN114218510A (en) Service page display method, device and equipment
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150204

RJ01 Rejection of invention patent application after publication