A photo encryption method and mobile terminal
A technology of a mobile terminal and an encryption method, which is applied in the field of communication, can solve the problems of poor mobile terminal user experience, poor privacy protection effect, cumbersome operation steps, etc., and achieve reduction of encryption steps, strong encryption reliability, and strong user experience Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0027] refer to figure 1 , showing a flow chart of a photo encryption method according to an embodiment of the present invention, applied to a mobile terminal, the method may specifically include the following steps:
[0028] Step 101, acquiring image data of a photo taken by a mobile terminal user.
[0029] Wherein, after the mobile terminal user finishes taking the photo, the embodiment of the present invention will collect the image data of the photo.
[0030] Step 102, according to the encryption method selected by the mobile terminal user, obtain the first identity authentication data of the mobile terminal user.
[0031] Wherein, different types of identity authentication data of the mobile terminal user may be obtained according to different encryption methods selected by the mobile terminal user, where the identity authentication data may be data capable of uniquely authenticating the identity of the mobile terminal user.
[0032] Step 103, combining the image data a...
no. 2 example
[0038] refer to figure 2 , showing a flow chart of a photo encryption method according to another embodiment of the present invention, applied to a mobile terminal, the method may specifically include the following steps:
[0039] Step 201, detecting whether the user of the mobile terminal has selected an image encryption operation.
[0040] Among them, in order to realize the flexible selection of photo encryption and improve the controllability of encryption, a "privacy preservation" button or a similar prompt button can be set on the photo preview interface of a mobile terminal (such as a mobile phone), so that the mobile terminal user can During the photo taking process, if you need to encrypt the photos to be taken, you can click the "Privacy Save" button on the photo preview interface to realize the selection of image encryption operations. In this way, the selection of the image encryption operation can be detected to determine whether to perform the encryption operat...
no. 3 example
[0068] refer to image 3 , shows a block diagram of a mobile terminal according to an embodiment of the present invention. image 3 The illustrated mobile terminal 300 includes:
[0069] An image data acquisition module 301 is configured to acquire image data of photos taken by mobile terminal users.
[0070] An authentication data acquisition module 302, configured to acquire the first identity authentication data of the mobile terminal user according to the encryption method selected by the mobile terminal user.
[0071] The combination module 303 is configured to combine the image data acquired by the image data acquisition module and the first identity authentication data acquired by the authentication data acquisition module 302 to obtain combined data.
[0072] The generation module 304 is configured to generate and save a two-dimensional code corresponding to the photo according to the combination data obtained by the combination module 303 .
[0073] refer to Figu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


