Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User data encryption and decryption method and device and electronic equipment

A technology for user data and encryption methods, applied in electrical components, digital video signal modification, image communication, etc., can solve the problems of reduced compression efficiency, reduced security, and high encryption complexity, to ensure security, avoid decryption resources, Avoid the effect of transmission insecurity

Active Publication Date: 2022-04-22
南京曹操云控网络科技有限公司 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the authenticity and real-time of operating users, verification methods such as pictures and text are difficult to meet high-security scenarios. The more reliable verification method is to verify by recording videos in real time. Depending on the usage scenario, it may be necessary to record corresponding videos. As a credential for identity authentication, since the recorded data needs to be sent to the server for interpretation, security issues during data transmission are more prominent. In order to ensure safe transmission, video data needs to be encrypted, but unlike other types of data, video is usually There is a large amount of data, encryption is complex due to high complexity, and if it is encrypted first and then compressed, the compression efficiency will be reduced, and the use of a unified secret key for encryption will also reduce security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data encryption and decryption method and device and electronic equipment
  • User data encryption and decryption method and device and electronic equipment
  • User data encryption and decryption method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] See figure 1 , figure 1 It is a schematic flowchart of a user data encryption method provided by an embodiment of the present invention, including:

[0069] S11. Receive the input first video data to be encrypted, wherein the first video data is uncompressed data; in this embodiment, the input first video data to be encrypted is the video used for face recognition For example, the user records video data in real time on a dedicated device as the first video data.

[0070] S12. Select an image with specific characteristics from the first video data to generate key image data, and determine the encryption key according to the key image data and gray scale; since the video is used for face recognition Therefore, an image with specific features is an image with a human face, and one frame is randomly selected from multiple frames of the video and human face images as the image for generating the key image data.

[0071] The encryption key of the user data encryption meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user data encryption and decryption method and device and electronic equipment, and the encryption method comprises the steps: receiving input to-be-encrypted first video data which is uncompressed data; selecting a frame of image with specific characteristics from the first video data to generate secret key image data, and determining an encryption secret key according to the secret key image data and a gray scale level; compressing the to-be-encrypted first video data to obtain second video data, and symmetrically encrypting the second video data according to the encryption key to obtain encrypted data; inserting the image with the specific feature into the encrypted data according to a preset rule to form a ciphertext so as to form a message request frame according to the ciphertext; and sending the ciphertext in response to the received response message. According to the method provided by the invention, the security of data transmission is ensured, in addition, the feature information of the video can be judged without decrypting the data, and the waste of decryption resources caused by transmission errors is avoided.

Description

technical field [0001] The invention belongs to the field of video data encryption, and in particular relates to a user data encryption and decryption method, device and electronic equipment. Background technique [0002] Advances in science and technology have prompted changes in people's lifestyles. The development of smart phones, 5G communication technology, cloud computing, and big data has promoted the development of mobile Internet, and has also given birth to e-commerce, mobile payment, and traditional industries to mobile office and mobile government affairs. Mobile banking, various lifestyle and entertainment apps have brought great convenience to people's lives, but at the same time, online identity authentication has become a bottleneck for many businesses. [0003] In order to ensure the authenticity and real-time of operating users, verification methods such as pictures and text are difficult to meet high-security scenarios. The more reliable verification metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/2347H04N19/20
CPCH04N21/2347H04N19/20
Inventor 查利娟王永华谭臻
Owner 南京曹操云控网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products