Unlock instant, AI-driven research and patent intelligence for your innovation.

A photo encryption method and mobile terminal

A technology of a mobile terminal and an encryption method, which is applied in the field of communication, can solve the problems of poor mobile terminal user experience, poor privacy protection effect, cumbersome operation steps, etc., and achieve reduction of encryption steps, strong encryption reliability, and strong user experience Effect

Active Publication Date: 2019-11-15
VIVO MOBILE COMM CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method for encrypting photos and a mobile terminal to solve the problems of large security loopholes, poor privacy protection effect, cumbersome operation steps and poor user experience of mobile terminals in the prior art when protecting the privacy of photos The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A photo encryption method and mobile terminal
  • A photo encryption method and mobile terminal
  • A photo encryption method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027] refer to figure 1 , showing a flow chart of a photo encryption method according to an embodiment of the present invention, applied to a mobile terminal, the method may specifically include the following steps:

[0028] Step 101, acquiring image data of a photo taken by a mobile terminal user.

[0029] Wherein, after the mobile terminal user finishes taking the photo, the embodiment of the present invention will collect the image data of the photo.

[0030] Step 102, according to the encryption method selected by the mobile terminal user, obtain the first identity authentication data of the mobile terminal user.

[0031] Wherein, different types of identity authentication data of the mobile terminal user may be obtained according to different encryption methods selected by the mobile terminal user, where the identity authentication data may be data capable of uniquely authenticating the identity of the mobile terminal user.

[0032] Step 103, combining the image data a...

no. 2 example

[0038] refer to figure 2 , showing a flow chart of a photo encryption method according to another embodiment of the present invention, applied to a mobile terminal, the method may specifically include the following steps:

[0039] Step 201, detecting whether the user of the mobile terminal has selected an image encryption operation.

[0040] Among them, in order to realize the flexible selection of photo encryption and improve the controllability of encryption, a "privacy preservation" button or a similar prompt button can be set on the photo preview interface of a mobile terminal (such as a mobile phone), so that the mobile terminal user can During the photo taking process, if you need to encrypt the photos to be taken, you can click the "Privacy Save" button on the photo preview interface to realize the selection of image encryption operations. In this way, the selection of the image encryption operation can be detected to determine whether to perform the encryption operat...

no. 3 example

[0068] refer to image 3 , shows a block diagram of a mobile terminal according to an embodiment of the present invention. image 3 The illustrated mobile terminal 300 includes:

[0069] An image data acquisition module 301 is configured to acquire image data of photos taken by mobile terminal users.

[0070] An authentication data acquisition module 302, configured to acquire the first identity authentication data of the mobile terminal user according to the encryption method selected by the mobile terminal user.

[0071] The combination module 303 is configured to combine the image data acquired by the image data acquisition module and the first identity authentication data acquired by the authentication data acquisition module 302 to obtain combined data.

[0072] The generation module 304 is configured to generate and save a two-dimensional code corresponding to the photo according to the combination data obtained by the combination module 303 .

[0073] refer to Figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an encryption method of a photo and a mobile terminal. The method comprises the following steps: acquiring image data of the photo shot by a mobile terminal user; acquiring the first identity authentication data of the mobile terminal user according to the encryption mode selected by the mobile terminal user; combining the image data with the first identity authentication data to obtain the combined data; generating a two-dimensional code corresponding to the photo according to the combined data, and saving the two-dimensional code. Through the combination of the image data of the to be encrypted photo and the identity authentication data of the current mobile terminal user, the security of the saved photo is guaranteed; and meanwhile, the migration for the to be encrypted photo is unnecessary, the encryption step of the photo is reduced; the encryption operation is directly acted on the to be encrypted photo, the encryption reliability of the photo is stronger, the privacy of the mobile terminal user is well guaranteed, and the experience feeling of the mobile terminal user is strong.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a photo encryption method and a mobile terminal. Background technique [0002] As the camera functions of mobile terminals (such as mobile phones) are continuously enriched and powerful, people are more and more fond of using mobile terminals to take pictures. Among them, there are many photos stored in everyone's mobile phone, but in view of personal privacy, some mobile terminal users only hope that they can view them, and do not want others to see them. [0003] However, current mobile phones all directly save the photos as visible pictures after the photos are taken. Then, if mobile terminal users want to protect their private photos, most of the methods they use are uploading these photos to some application programs with encryption function, or directly copying these photos from the mobile phone and transferring them to other mobile terminal users Think safe place....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725G06F21/60G06F21/62G06F21/78
CPCG06F21/602G06F21/6209G06F21/78H04M1/72439
Inventor 柯力
Owner VIVO MOBILE COMM CO LTD