Unlock instant, AI-driven research and patent intelligence for your innovation.

Living body portrait photo encryption method, living body portrait photo decryption method and living body portrait photo encryption and decryption system

An encryption method and photo technology, applied in the field of information security, can solve the problems of personal information being leaked, fraudulently used, attacked, tampered with, etc., to achieve the effect of improving the security protection system, protecting security, and strengthening protection.

Inactive Publication Date: 2019-03-15
AEROSPACE INFORMATION
View PDF12 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a live portrait photo encryption and decryption method and an encryption and decryption system, which can solve the problems of personal information being leaked and fraudulently used by encrypting the biological information of living portraits collected on the Internet. Establish secure communication channels to solve problems such as personal information being attacked and tampered with, verify the security of encrypted information through server-side decryption controls, build a comprehensive security protection system, strengthen the construction of Internet + public security government service platforms, and protect citizens' personal information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Living body portrait photo encryption method, living body portrait photo decryption method and living body portrait photo encryption and decryption system
  • Living body portrait photo encryption method, living body portrait photo decryption method and living body portrait photo encryption and decryption system
  • Living body portrait photo encryption method, living body portrait photo decryption method and living body portrait photo encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.

[0048] figure 1 A flow chart showing the steps of the method for encrypting a living portrait photo according to the present invention.

[0049] In this embodiment, the live portrait photo encryption method according to the present invention may include:

[0050] Step 101, generating a random number sequence as a random key;

[0051] In one example, a random SM4 key is generated using encryption controls as a subsequent random key.

[0052] Step 102, using the random key to encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a living body portrait photo encryption method, a living body portrait photo decryption method and a living body portrait photo encryption and decryption system. The methods and the system can comprise: acquiring a portrait photo by utilizing a client of the system, encrypting photo data by calling a multistage encryption control to form a service message and sending the service message to a server side, and decrypting the service message by the server side by virtue of a multistage decryption packet, so that the photo data is obtained. The methods and the system whichare disclosed by the invention guarantee secure communication of encrypted data by building a multistage encryption service, avoid security risks such as leakage of acquired information and attack andtampering on a transmission process, effectively protect privacy security of personal information and communication security from the Internet to police intranet, provide a secure channel for an Internet Plus public security government service and promote real name authentication and real name verification services of Internet Plus.

Description

technical field [0001] The invention relates to the field of information security, and more specifically, to a living portrait photo encryption and decryption method and an encryption and decryption system. Background technique [0002] With the advent of the Internet era and the rapid development of Internet +, information security issues such as system security vulnerabilities, viruses, Trojan horses, and information leakage from the Internet have become increasingly prominent. At present, in the field of social security, there are more and more scenarios for providing services based on citizen identity verification, and problems such as harassing advertisements and rampant fraud caused by citizen information leakage have become the top priority. [0003] Citizen identity verification services need to collect biometric information through the Internet, and the collected information is transmitted to the public security intranet for identification and authentication. Access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04L29/06
CPCH04L9/0643H04L9/0822H04L9/0869H04L9/3213H04L9/3247H04L9/3268H04L63/0428H04L63/0815
Inventor 张建光代合鹏李银波毛翔宇孟祥翠王鑫袁新武田浩张明寒马云飞李松昭
Owner AEROSPACE INFORMATION