CN108614971A - Encryption processing method and device, decryption processing method and device, and storage medium - Google Patents
Encryption processing method and device, decryption processing method and device, and storage medium Download PDFInfo
- Publication number
- CN108614971A CN108614971A CN201810326982.1A CN201810326982A CN108614971A CN 108614971 A CN108614971 A CN 108614971A CN 201810326982 A CN201810326982 A CN 201810326982A CN 108614971 A CN108614971 A CN 108614971A
- Authority
- CN
- China
- Prior art keywords
- depth data
- structured light
- speckle pattern
- light sensor
- processing method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Image Processing (AREA)
Abstract
Description
技术领域technical field
本申请涉及移动终端技术领域,尤其涉及一种加密处理及解密处理方法和装置。The present application relates to the technical field of mobile terminals, in particular to an encryption processing and decryption processing method and device.
背景技术Background technique
随着科技的发展,基于生物特征的身份识别技术日益成熟并在实际应用中展现出极大的优越性。目前,可以通过电子设备上的图像传感器采集人脸的成像数据,然后基于成像数据进行身份验证。With the development of science and technology, identification technology based on biometrics has become increasingly mature and has shown great advantages in practical applications. Currently, imaging data of a human face can be collected by an image sensor on an electronic device, and then identity verification is performed based on the imaging data.
由于电子设备终端的安全性比较低,容易受到病毒或者恶意软件的攻击,在身份验证时采集的人脸的成像数据有可能会被恶意软件获取,造成人脸成像数据泄漏。如果恶意软件利用获取的数据通过身份验证,会给用户造成意想不到的经济损失。可见,现有的基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低。Due to the relatively low security of electronic equipment terminals, they are vulnerable to attacks by viruses or malware, and the imaging data of the face collected during identity verification may be obtained by malware, resulting in the leakage of face imaging data. If malicious software uses the obtained data to pass identity verification, it will cause unexpected economic losses to users. It can be seen that in the existing face-based identity verification methods, the security of face imaging data is relatively low.
发明内容Contents of the invention
本申请旨在至少在一定程度上解决相关技术中的技术问题之一。This application aims to solve one of the technical problems in the related art at least to a certain extent.
为此,本申请提出一种解密处理方法,以实现可信应用程序从专用硬件读取的深度数据是经过加密的,并利用对结构光传感器的衍射光学元件进行标定得到的目标散斑图案进行解密,由于目标散斑图案是对衍射光学元件进行标定得到,即使除可信应用程序和专用硬件以外的软件或硬件读取到深度数据,也无法进行解密,可以有效防止深度数据泄漏,从而提高了深度数据的安全性。To this end, this application proposes a decryption processing method to realize that the depth data read by a trusted application program from dedicated hardware is encrypted, and the target speckle pattern obtained by calibrating the diffractive optical element of the structured light sensor is used to perform encryption. Decryption, since the target speckle pattern is obtained by calibrating the diffractive optical element, even if the depth data is read by software or hardware other than trusted applications and dedicated hardware, it cannot be decrypted, which can effectively prevent the leakage of depth data, thereby improving In-depth data security.
本申请提出一种加密处理方法。This application proposes an encryption processing method.
本申请提出一种解密处理装置。This application proposes a decryption processing device.
本申请提出一种微处理器。The present application proposes a microprocessor.
本申请提出一种移动终端。This application proposes a mobile terminal.
本申请实施例提出了一种解密处理方法,所述方法由可信应用程序执行,所述可信应用程序运行于可信执行环境中,包括:An embodiment of the present application proposes a decryption processing method, the method is executed by a trusted application, and the trusted application runs in a trusted execution environment, including:
通过所述可信执行环境的专用硬件,控制结构光传感器进行成像;Control the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment;
从所述专用硬件,获取经过加密的深度数据;所述深度数据是所述结构光传感器成像得到的;Obtain encrypted depth data from the dedicated hardware; the depth data is obtained by imaging the structured light sensor;
根据预存的目标散斑图案,对所述经过加密的深度数据进行解密,以得到所述深度数据;其中,所述目标散斑图案是对结构光传感器的衍射光学元件进行标定得到的。The encrypted depth data is decrypted according to the pre-stored target speckle pattern to obtain the depth data; wherein the target speckle pattern is obtained by calibrating the diffractive optical element of the structured light sensor.
本申请实施例的解密处理方法,由可信应用程序执行,可信应用程序运行于可信执行环境中,通过可信执行环境的专用硬件,控制结构光传感器进行成像,从专用硬件,获取经过加密的结构光传感器成像得到的深度数据,根据预存的目标散斑图案,对经过加密的深度数据进行解密,以得到深度数据;其中,目标散斑图案是对结构光传感器的衍射光学元件进行标定得到的。本实施例中,由于可信应用程序从专用硬件获取的深度数据是经过加密的,并且用于解密的目标散斑图案是对衍射光学元件进行标定得到的,具有唯一性以及散斑图案本身的随机性,因此即使除可信应用程序和专用硬件以外的软件或硬件读取到了深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。在前述身份验证过程中,由于采用了在可信环境下通过专用硬件获取身份验证所需的成像数据,保证了身份验证数据来源的安全性,进一步提高了安全性和可靠性。The decryption processing method of the embodiment of the present application is executed by a trusted application program, which runs in a trusted execution environment, controls the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment, and obtains the image passing through the dedicated hardware. Decrypt the encrypted depth data obtained by imaging the structured light sensor according to the pre-stored target speckle pattern to obtain the depth data; the target speckle pattern is used to calibrate the diffractive optical element of the structured light sensor owned. In this embodiment, since the depth data acquired by the trusted application program from the dedicated hardware is encrypted, and the target speckle pattern used for decryption is obtained by calibrating the diffractive optical element, it has uniqueness and the uniqueness of the speckle pattern itself. Randomness, so even if software or hardware other than trusted applications and dedicated hardware read the deep data, it cannot be decrypted, which can effectively prevent deep data leakage, thereby improving the security of deep data and solving existing problems. In the face-based identity verification method in the technology, the security of face imaging data is relatively low. In the aforementioned identity verification process, since the imaging data required for identity verification is obtained through dedicated hardware in a trusted environment, the security of the source of identity verification data is guaranteed, and the safety and reliability are further improved.
本申请实施例提出了一种加密处理方法,所述方法由可信执行环境的专用硬件执行,包括:An embodiment of the present application proposes an encryption processing method, the method is executed by dedicated hardware in a trusted execution environment, including:
当所述可信执行环境下运行的可信应用程序指示所述结构光传感器成像时,控制所述结构光传感器进行成像,并获取所述结构光传感器成像得到的深度数据;When the trusted application running under the trusted execution environment instructs the structured light sensor to perform imaging, control the structured light sensor to perform imaging, and acquire depth data obtained by imaging the structured light sensor;
采用预存的目标散斑图案,对所述深度数据进行加密,以得到经过加密的深度数据,并将所述经过加密的深度数据发送至所述可信应用程序。Encrypting the depth data by using a pre-stored target speckle pattern to obtain encrypted depth data, and sending the encrypted depth data to the trusted application.
本申请实施例的加密处理方法,当可信执行环境下运行的可信应用程序指示结构光传感器成像时,控制结构光传感器进行成像,并获取结构光传感器成像得到的深度数据,采用预存的目标散斑图案,对深度数据进行加密,以得到经过加密的深度数据,并将经过加密的深度数据发送至可信应用程序。本实施例中,利用目标散斑图案对获取的结构光传感器成像得到的深度数据进行了加密,由于散斑图案本身的随机性,因此即使除可信应用程序和专用硬件以外的软件或硬件读取到了深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。In the encryption processing method of the embodiment of the present application, when the trusted application program running in the trusted execution environment instructs the structured light sensor to perform imaging, the structured light sensor is controlled to perform imaging, and the depth data obtained by the structured light sensor imaging is obtained, and the pre-stored target is used. The speckle pattern encrypts the depth data to obtain encrypted depth data and sends the encrypted depth data to a trusted application. In this embodiment, the target speckle pattern is used to encrypt the depth data acquired by the structured light sensor imaging. Due to the randomness of the speckle pattern itself, even software or hardware other than trusted applications and dedicated hardware read The depth data cannot be decrypted even if it is obtained, which can effectively prevent the leakage of the depth data, thereby improving the security of the depth data, and solving the problem of face imaging data security in the existing technology of identity verification based on the face lower problem.
本申请实施例提出了一种解密处理装置,所述装置具有可信执行环境,所述装置包括:An embodiment of the present application proposes a decryption processing device, the device has a trusted execution environment, and the device includes:
控制模块,用于通过所述可信执行环境的专用硬件,控制结构光传感器进行成像;A control module, configured to control the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment;
获取模块,用于从所述专用硬件,获取经过加密的深度数据;所述深度数据是所述结构光传感器成像得到的;An acquisition module, configured to acquire encrypted depth data from the dedicated hardware; the depth data is obtained by imaging the structured light sensor;
解密模块,用于根据预存的目标散斑图案,对所述经过加密的深度数据进行解密,以得到所述深度数据。The decryption module is configured to decrypt the encrypted depth data according to the prestored target speckle pattern to obtain the depth data.
本申请实施例的解密处理装置,具有可信执行环境,通过可信执行环境的专用硬件,控制结构光传感器进行成像,从专用硬件,获取经过加密的结构光传感器成像得到的深度数据,根据预存的目标散斑图案,对经过加密的深度数据进行解密,以得到深度数据;其中,目标散斑图案是对结构光传感器的衍射光学元件进行标定得到的。本实施例中,由于可信应用程序从专用硬件获取的深度数据是经过加密的,并且用于解密的目标散斑图案是对衍射光学元件进行标定得到的,具有唯一性以及散斑图案本身的随机性,因此即使除可信应用程序和专用硬件以外的软件或硬件读取到了深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。在前述身份验证过程中,由于采用了在可信环境下通过专用硬件获取身份验证所需的成像数据,保证了身份验证数据来源的安全性,进一步提高了安全性和可靠性。The decryption processing device in the embodiment of the present application has a trusted execution environment, controls the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment, and obtains the encrypted depth data obtained by imaging the structured light sensor from the dedicated hardware, according to the pre-stored Decrypt the encrypted depth data to obtain the depth data; wherein, the target speckle pattern is obtained by calibrating the diffractive optical element of the structured light sensor. In this embodiment, since the depth data acquired by the trusted application program from the dedicated hardware is encrypted, and the target speckle pattern used for decryption is obtained by calibrating the diffractive optical element, it has uniqueness and the uniqueness of the speckle pattern itself. Randomness, so even if software or hardware other than trusted applications and dedicated hardware read the deep data, it cannot be decrypted, which can effectively prevent deep data leakage, thereby improving the security of deep data and solving existing problems. In the face-based identity verification method in the technology, the security of face imaging data is relatively low. In the aforementioned identity verification process, since the imaging data required for identity verification is obtained through dedicated hardware in a trusted environment, the security of the source of identity verification data is guaranteed, and the safety and reliability are further improved.
本申请实施例提出一种微处理器,所述微处理器为可信执行环境的专用硬件,所述微处理器包括:An embodiment of the present application proposes a microprocessor, the microprocessor is dedicated hardware for a trusted execution environment, and the microprocessor includes:
控制模块,用于当所述可信执行环境下运行的可信应用程序指示所述结构光传感器成像时,控制所述结构光传感器进行成像,并获取所述结构光传感器成像得到的深度数据;A control module, configured to control the structured light sensor to perform imaging when the trusted application running under the trusted execution environment instructs the structured light sensor to perform imaging, and acquire depth data obtained by imaging the structured light sensor;
加密模块,用于采用预存的目标散斑图案,对所述深度数据进行加密,以得到经过加密的深度数据,并将所述经过加密的深度数据发送至所述可信应用程序。An encryption module, configured to encrypt the depth data by using a pre-stored target speckle pattern to obtain encrypted depth data, and send the encrypted depth data to the trusted application.
本申请实施例的微处理器,该微处理器为可信执行环境的专用硬件,当可信执行环境下运行的可信应用程序指示结构光传感器成像时,控制结构光传感器进行成像,并获取结构光传感器成像得到的深度数据,采用预存的目标散斑图案,对深度数据进行加密,以得到经过加密的深度数据,并将经过加密的深度数据发送至可信应用程序。本实施例中,利用目标散斑图案对获取的结构光传感器成像得到的深度数据进行了加密,由于散斑图案本身的随机性,因此即使除可信应用程序和专用硬件以外的软件或硬件读取到了深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。The microprocessor of the embodiment of the present application, the microprocessor is dedicated hardware of the trusted execution environment, when the trusted application program running in the trusted execution environment instructs the structured light sensor to perform imaging, it controls the structured light sensor to perform imaging, and obtains The depth data obtained by the imaging of the structured light sensor is encrypted by using the pre-stored target speckle pattern to obtain encrypted depth data, and the encrypted depth data is sent to a trusted application. In this embodiment, the target speckle pattern is used to encrypt the depth data acquired by the structured light sensor imaging. Due to the randomness of the speckle pattern itself, even software or hardware other than trusted applications and dedicated hardware read The depth data cannot be decrypted even if it is obtained, which can effectively prevent the leakage of the depth data, thereby improving the security of the depth data, and solving the problem of face imaging data security in the existing technology of identity verification based on the face lower problem.
本申请实施例提出了一种移动终端,包括:结构光传感器、存储器、微处理芯片MCU、处理器及存储在所述存储器上并可在所述处理器的可信执行环境下运行的可信应用程序;The embodiment of the present application proposes a mobile terminal, including: a structured light sensor, a memory, a micro-processing chip MCU, a processor, and a trusted application;
所述MCU,为所述可信执行环境的专用硬件,与所述结构光传感器和所述处理器连接,用于执行上述实施例所述的加密处理方法;The MCU is dedicated hardware of the trusted execution environment, connected to the structured light sensor and the processor, and used to execute the encryption processing method described in the above embodiment;
所述处理器执行所述可信应用程序时,实现如上述实施例所述的解密处理方法。When the processor executes the trusted application program, the decryption processing method as described in the foregoing embodiments is implemented.
本申请实施例提出了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如上述实施例所述的解密处理方法,或者实现如上述实施例所述的加密处理方法。The embodiment of the present application proposes a computer-readable storage medium on which a computer program is stored. When the program is executed by a processor, the decryption processing method as described in the above-mentioned embodiment is realized, or the encryption as described in the above-mentioned embodiment is realized. Approach.
本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。Additional aspects and advantages of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application.
附图说明Description of drawings
本申请上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present application will become apparent and easy to understand from the following description of the embodiments in conjunction with the accompanying drawings, wherein:
图1为本申请实施例提供的一种解密处理方法的流程示意图;FIG. 1 is a schematic flow diagram of a decryption processing method provided in an embodiment of the present application;
图2为本申请实施例提供的一种电子设备的结构示意图;FIG. 2 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
图3为本申请实施例提供的另一种解密处理方法的流程示意图;FIG. 3 is a schematic flowchart of another decryption processing method provided by the embodiment of the present application;
图4为本申请实施例提供的又一种解密处理方法的流程示意图;FIG. 4 is a schematic flowchart of another decryption processing method provided by the embodiment of the present application;
图5为本申请实施例提供的一种加密处理方法的流程示意图;FIG. 5 is a schematic flowchart of an encryption processing method provided in an embodiment of the present application;
图6为本申请实施例提供的另一种加密处理方法的流程示意图;FIG. 6 is a schematic flowchart of another encryption processing method provided in the embodiment of the present application;
图7为本申请实施例提供的一种解密处理装置的结构示意图;FIG. 7 is a schematic structural diagram of a decryption processing device provided in an embodiment of the present application;
图8为本申请实施例提供的一种微处理器的结构示意图;FIG. 8 is a schematic structural diagram of a microprocessor provided in an embodiment of the present application;
图9为本申请实施例提供的一种移动终端的结构示意图。FIG. 9 is a schematic structural diagram of a mobile terminal provided by an embodiment of the present application.
具体实施方式Detailed ways
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本申请,而不能理解为对本申请的限制。Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.
下面参考附图描述本申请实施例的加密处理及解密处理方法和装置。The encryption processing and decryption processing methods and devices according to the embodiments of the present application are described below with reference to the accompanying drawings.
目前,电子设备终端的安全性比较低,容易受到病毒或者恶意软件的攻击,在身份验证时采集的人脸的成像数据有可能会被恶意软件获取,造成人脸成像数据泄漏。如果恶意软件利用获取的数据通过身份验证,会给用户造成意想不到的经济损失。可见,现有的基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低。At present, the security of electronic device terminals is relatively low, and they are vulnerable to attacks by viruses or malware. The face imaging data collected during identity verification may be obtained by malware, resulting in the leakage of face imaging data. If malicious software uses the obtained data to pass identity verification, it will cause unexpected economic losses to users. It can be seen that in the existing face-based identity verification methods, the security of face imaging data is relatively low.
针对这一问题,本申请实施例提出一种解密处理方法,以实现可信应用程序从专用硬件读取的深度数据是经过加密的,并利用对结构光传感器的衍射光学元件进行标定得到的目标散斑图案进行解密,由于目标散斑图案是对衍射光学元件进行标定得到,即使除可信应用程序和专用硬件以外的软件或硬件读取到深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。在前述身份验证过程中,由于采用了在可信环境下通过专用硬件获取身份验证所需的成像数据,保证了身份验证数据来源的安全性,进一步提高了安全性和可靠性。In response to this problem, the embodiment of this application proposes a decryption processing method to realize that the depth data read by the trusted application program from the dedicated hardware is encrypted, and the target obtained by calibrating the diffractive optical element of the structured light sensor is used. Since the target speckle pattern is obtained by calibrating the diffractive optical element, even if software or hardware other than trusted applications and dedicated hardware read the depth data, it cannot be decrypted, which can effectively prevent depth Data leakage, thereby improving the security of the depth data, and solving the problem of relatively low security of the face imaging data in the face-based identity verification method in the prior art. In the aforementioned identity verification process, since the imaging data required for identity verification is obtained through dedicated hardware in a trusted environment, the security of the source of identity verification data is guaranteed, and the safety and reliability are further improved.
图1为本申请实施例提供的一种解密处理方法的流程示意图。FIG. 1 is a schematic flowchart of a decryption processing method provided by an embodiment of the present application.
该解密处理方法可应用于电子设备,作为一种可能的实现方式,该电子设备的结构可参见图2,图2为本申请实施例提供的一种电子设备的结构示意图。The decryption processing method can be applied to an electronic device. As a possible implementation manner, the structure of the electronic device can be referred to in FIG. 2 , which is a schematic structural diagram of an electronic device provided in an embodiment of the present application.
需要说明的是,本领域技术人员可以知晓,图1对应方法不仅适用于图2所示的电子设备,图2所示电子设备仅作为一种示意性描述,图1对应方法还可以用于其他具有可信执行环境,以及可信执行环境专用硬件的电子设备,本实施例中对此不作限定。It should be noted that those skilled in the art can know that the corresponding method in Figure 1 is not only applicable to the electronic device shown in Figure 2, the electronic device shown in Figure 2 is only used as a schematic description, and the corresponding method in Figure 1 can also be used for other An electronic device having a trusted execution environment and dedicated hardware for the trusted execution environment is not limited in this embodiment.
如图2所示,该电子设备包括:激光摄像头、泛光灯、可见光摄像头、镭射灯以及微处理器(Microcontroller Unit,简称MCU)。其中,MCU包括脉冲宽度调制(Pulse WidthModulation,简称PWM)、深度引擎、总线接口以及随机存取存储器RAM。As shown in FIG. 2 , the electronic device includes: a laser camera, a floodlight, a visible light camera, a laser light, and a microprocessor (Microcontroller Unit, MCU for short). Wherein, the MCU includes a pulse width modulation (Pulse Width Modulation, PWM for short), a depth engine, a bus interface and a random access memory RAM.
另外,电子设备还包括处理器,该处理器具有可信执行环境,MCU为可信执行环境专用硬件,执行图1所示方法的可信应用程序运行于该可信执行环境下;处理器还可以具有普通执行环境,该普通执行环境与可信执行环境相互隔离。In addition, the electronic device also includes a processor, the processor has a trusted execution environment, the MCU is dedicated hardware for the trusted execution environment, and the trusted application program that executes the method shown in Figure 1 runs under the trusted execution environment; the processor also There may be a general execution environment that is isolated from the trusted execution environment.
其中,PWM用于调制泛光灯以使发出红外光,以及调制镭射灯以发出结构光;激光摄像头,用于采集成像对象的结构光图像或可见光图像;深度引擎,用于根据结构光图像,计算获得成像对象对应的深度数据;总线接口,用于将深度数据发送至处理器,并由处理器上运行的可信应用程序利用深度数据执行相应的操作。其中,总线接口包括:移动产业处理器接口(Mobile Industry Processor Interface简称MIPI)、I2C同步串行总线接口、串行外设接口(Serial Peripheral Interface,简称SPI)。Among them, PWM is used to modulate the floodlight to emit infrared light, and modulate the laser light to emit structured light; the laser camera is used to collect the structured light image or visible light image of the imaging object; the depth engine is used to, according to the structured light image, The depth data corresponding to the imaging object is obtained through calculation; the bus interface is used to send the depth data to the processor, and the trusted application program running on the processor uses the depth data to perform corresponding operations. Wherein, the bus interface includes: Mobile Industry Processor Interface (MIPI for short), I2C synchronous serial bus interface, and Serial Peripheral Interface (SPI for short).
如图1所示,该解密处理方法包括:As shown in Figure 1, the decryption processing method includes:
步骤101,通过可信执行环境的专用硬件,控制结构光传感器进行成像。Step 101, control the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment.
该解密处理方法可由可信应用程序执行,可信应用程序运行于可信执行环境中。The decryption processing method can be executed by a trusted application program, and the trusted application program runs in a trusted execution environment.
本实施例中,可信应用程序可以理解为安全级别较高的应用程序,例如电子支付程序、解锁程序等等。In this embodiment, the trusted application program may be understood as an application program with a higher security level, such as an electronic payment program, an unlocking program, and the like.
可信执行环境是电子设备(包含智能手机、平板电脑等)主处理器上的一个安全区域,相对普通执行环境,其可以保证加载到该环境内部的代码和数据的安全性、机密性以及完整性。可信执行环境提供一个隔离的执行环境,提供的安全特征包含:隔离执行、可信应用程序的完整性、可信数据的机密性、安全存储等。总之,可信执行环境提供的执行空间比常见的移动操作系统,如ISO、Android等,提供更高级别的安全性。A trusted execution environment is a secure area on the main processor of an electronic device (including smartphones, tablets, etc.), which can guarantee the security, confidentiality, and integrity of codes and data loaded into the environment compared with ordinary execution environments. sex. The trusted execution environment provides an isolated execution environment, and the security features provided include: isolated execution, integrity of trusted applications, confidentiality of trusted data, secure storage, etc. In summary, the execution space provided by TEE provides a higher level of security than common mobile operating systems, such as ISO, Android, etc.
本实施例中,可信应用程序运行于可信执行环境中,从运行环境上提高了数据的安全性。In this embodiment, the trusted application program runs in the trusted execution environment, which improves data security from the running environment.
当可信应用程序执行时,如进行电子支付、电子设备解锁时,可通过可信执行环境的专用硬件,控制结构光传感器进行成像。其中,专用硬件可以为MCU。When the trusted application program is executed, such as electronic payment and electronic device unlocking, the structured light sensor can be controlled to perform imaging through the dedicated hardware of the trusted execution environment. Wherein, the dedicated hardware may be an MCU.
本实施例中,结构光传感器包括激光摄像头和镭射灯,可通过MCU中的PWM调制电子设备上的镭射光灯发出结构光,投射到成像对象。结构光受到成像对象的阻碍,被成像对象反射,激光摄像头捕获结构光传感器接收成像对应反射的结构光进行成像,得到结构光图像。In this embodiment, the structured light sensor includes a laser camera and a laser light, and the laser light on the electronic device can be modulated by PWM in the MCU to emit structured light and project it to the imaging object. The structured light is hindered by the imaging object and reflected by the imaging object. The laser camera captures the structured light sensor to receive and image the reflected structured light to obtain a structured light image.
步骤102,从专用硬件,获取经过加密的深度数据;深度数据是结构光传感器成像得到的。Step 102, obtain encrypted depth data from dedicated hardware; the depth data is obtained by imaging the structured light sensor.
本实施例中,MCU可获取结构光传感器成像得到的结构光图像,MCU中的深度引擎可解调结构光图像中变形位置像素对应的相位信息,将相位信息转化为高度信息,根据高度信息确定成像对象对应的深度数据,并对深度数据进行加密,可信应用程序从MCU获取加密后的深度数据。In this embodiment, the MCU can acquire the structured light image imaged by the structured light sensor, and the depth engine in the MCU can demodulate the phase information corresponding to the deformed position pixel in the structured light image, convert the phase information into height information, and determine The depth data corresponding to the imaging object is encrypted, and the trusted application program obtains the encrypted depth data from the MCU.
步骤103,根据预存的目标散斑图案,对经过加密的深度数据进行解密,以得到深度数据;其中,目标散斑图案是对结构光传感器的衍射光学元件进行标定得到的。Step 103, decrypt the encrypted depth data according to the pre-stored target speckle pattern to obtain the depth data; wherein, the target speckle pattern is obtained by calibrating the diffractive optical element of the structured light sensor.
本实施例中,用于解密的目标散斑图案是对结构光传感器的衍射光学元件进行标定得到的。In this embodiment, the target speckle pattern used for decryption is obtained by calibrating the diffractive optical element of the structured light sensor.
散斑图案具有高度的随机性,并且会随着距离的不同而变换图案,可对衍射元件进行标定,得到散斑图案,例如,在距离激光摄像头的0~4米的范围内,任意取一个参考平面,可得到该位置对应的散斑图案。可以理解的是,当标定的位置不同时,可以得到不同的散斑图案,因此散斑图案具有多样性、唯一性,且散斑图案本身具有高度的随机性。The speckle pattern has a high degree of randomness, and will change the pattern with different distances. The diffraction element can be calibrated to obtain the speckle pattern. For example, within the range of 0 to 4 meters from the laser camera, any one Referring to the plane, the speckle pattern corresponding to the position can be obtained. It can be understood that when the calibrated positions are different, different speckle patterns can be obtained, so the speckle patterns are diverse and unique, and the speckle patterns themselves have a high degree of randomness.
由于普通的衍射元件对光束进行衍射后得到多数衍射光,但每束衍射光光强差别大,对人眼伤害的风险也大。即便是对衍射光进行二次衍射,得到的光束的均匀性也较低。因此,利用普通衍射元件衍射的光束对被测物进行投射的效果较差。Since the ordinary diffraction element diffracts the light beam to obtain most of the diffracted light, but the intensity of each diffracted light varies greatly, and the risk of damage to human eyes is also large. Even if the diffracted light is diffracted twice, the uniformity of the obtained beam is low. Therefore, the projection effect of the light beam diffracted by the common diffraction element on the measured object is relatively poor.
本实施例中采用准直分束元件,该元件不仅具有对非准直光束进行准直的作用,还具有分光的作用,即经反射镜反射的非准直光经过准直分束元件后往不同的角度出射多束准直光束,且出射的多束准直光束的截面面积近似相等,能量通量近似相等,进而使得利用该光束衍射后的散点光进行投射的效果更好。同时,出射光分散至每一束光,进一步降低了伤害人眼的风险,且散斑结构光相对于其他排布均匀的结构光来说,达到同样的采集效果时,散斑结构光消耗的电量更低。In this embodiment, a collimating beam-splitting element is used, which not only has the function of collimating the uncollimated beam, but also has the function of splitting light, that is, the uncollimated light reflected by the mirror passes through the collimating beam-splitting element and then Multiple collimated beams are emitted from different angles, and the cross-sectional areas of the emitted multiple collimated beams are approximately equal, and the energy flux is approximately equal, so that the projection effect of the scattered light after the diffraction of the beam is better. At the same time, the outgoing light is dispersed to each beam, which further reduces the risk of harming the human eye. Compared with other evenly arranged structured light, when the speckle structured light achieves the same collection effect, the speckle structured light consumes less Lower power.
由于对结构光传感器的衍射光学元件进行标定得到的散斑图案,不仅具有高度随机性,而且每个标定位置的散斑图案具有唯一性,即使除可信应用程序和专用硬件以外的软件或硬件读取到深度数据,也无法进行解密,因此用目标散斑图案进行解密,可以有效地防止深度数据泄漏,提高了深度数据的安全性。Since the speckle pattern obtained by calibrating the diffractive optical element of the structured light sensor is not only highly random, but also unique at each calibration position, even software or hardware other than trusted applications and dedicated hardware The depth data cannot be decrypted even if it is read, so decrypting with the target speckle pattern can effectively prevent the leakage of the depth data and improve the security of the depth data.
在上述实施例的基础上,图3为本申请实施例提供的另一种解密处理方法的流程示意图。如图3所示,步骤103可包括:On the basis of the foregoing embodiments, FIG. 3 is a schematic flowchart of another decryption processing method provided by the embodiment of the present application. As shown in Figure 3, step 103 may include:
步骤301,将目标散斑图案中各像素点的取值作为一维序列中对应元素的取值。Step 301, taking the value of each pixel in the target speckle pattern as the value of the corresponding element in the one-dimensional sequence.
由于不同的目标散斑图案中各像素点的取值不同,可以将目标散斑图案作为密钥。本实施例中,可根据目标散斑图案中各像素点取值,生成二维矩阵,其中,二维矩阵的行和列分别对应目标散斑图案中像素点的行和列。然后,以行或列为单位,将二维矩阵中的元素,采用预设顺序依次进行拼接,得到一维序列。Since the value of each pixel in different target speckle patterns is different, the target speckle pattern can be used as a key. In this embodiment, a two-dimensional matrix may be generated according to the value of each pixel in the target speckle pattern, wherein the rows and columns of the two-dimensional matrix correspond to the rows and columns of the pixels in the target speckle pattern respectively. Then, in units of rows or columns, the elements in the two-dimensional matrix are sequentially spliced in a preset order to obtain a one-dimensional sequence.
作为一个示例,以行为单位,在从左至右依次得到第一行的元素后,从第一行的最后一个元素后面,将第二行从左至右的元素依次拼接。在拼接完第一行和第二行的元素后,将第三行从左至右的元素依次拼接在第二行的最后一个元素之后,直至拼接完所有二维矩阵中的元素,得到一维序列。As an example, in units of rows, after obtaining the elements of the first row from left to right, the elements of the second row are sequentially spliced from left to right after the last element of the first row. After splicing the elements of the first row and the second row, the elements of the third row from left to right are spliced after the last element of the second row until all the elements in the two-dimensional matrix are spliced to obtain a one-dimensional sequence.
作为另一个示例,以列为单位,从上至下依次得到第一列元素后,在第一列的最后一个元素之后,将第二列从上至下的元素依次拼接在第一列的最后一个元素之后,直至拼接完所有二维矩阵中的元素,得到一维序列。As another example, in units of columns, after getting the elements of the first column from top to bottom, after the last element of the first column, splice the elements of the second column from top to bottom at the end of the first column After one element, until all the elements in the two-dimensional matrix are concatenated, a one-dimensional sequence is obtained.
步骤302,将一维序列作为密钥,对经过加密的深度数据进行解密,得到解密后的深度数据。Step 302, using the one-dimensional sequence as a key to decrypt the encrypted depth data to obtain the decrypted depth data.
本实施实例中,由于一维序列中的元素是目标散斑图案中各像素点取值,将一维序列作为密钥,也就是用目标散斑图案中各像素点取值作为密钥,对经过加密的深度数据进行解密,可以得到解密的深度数据。In this implementation example, since the elements in the one-dimensional sequence are the values of each pixel in the target speckle pattern, the one-dimensional sequence is used as the key, that is, the value of each pixel in the target speckle pattern is used as the key. After decrypting the encrypted depth data, the decrypted depth data can be obtained.
本申请实施例的解密处理方法,以目标散斑图案中各像素点取值,构成的一维序列作为密钥,对经过加密的深度数据进行解密,由于不同的散斑图案中各像素点取值不同,从而以目标散斑图案中各像素点取值,构成的一维序列作为密钥,即使经过加密的深度数据被窃取,也无法进行解密,可以有效防止深度数据泄漏,提高了深度数据的安全性。In the decryption processing method of the embodiment of the present application, the value of each pixel in the target speckle pattern is used as a key to decrypt the encrypted depth data. Since the value of each pixel in a different speckle pattern The values are different, so the value of each pixel in the target speckle pattern is used as a one-dimensional sequence as the key. Even if the encrypted depth data is stolen, it cannot be decrypted, which can effectively prevent the leakage of depth data and improve the depth data. security.
基于上述实施例,可信应用程序对加密的深度数据解密后,还可根据深度数据与预设人脸深度模型进行匹配,图4为本申请实施例提供的又一种解密处理方法的流程示意图,如图4所示,在图1的基础上,该解密处理方法在步骤103之后还包括:Based on the above embodiments, after the trusted application program decrypts the encrypted depth data, it can also match the depth data with the preset face depth model. FIG. 4 is a schematic flowchart of another decryption processing method provided by the embodiment of the present application , as shown in Figure 4, on the basis of Figure 1, the decryption processing method also includes after step 103:
步骤104,将根据深度数据构建的结构光深度模型,与预设人脸深度模型进行匹配。Step 104, matching the structured light depth model constructed according to the depth data with the preset face depth model.
具体地,可信应用程序可根据深度数据构建成像对象的结构光深度模型,并将结构光深度模型,与预设的人脸深度模型进行比对,当相似度超过预设阈值时,可以认为成像对象的结构光深度模型与预设人脸深度模型匹配。Specifically, the trusted application can construct the structured light depth model of the imaging object according to the depth data, and compare the structured light depth model with the preset face depth model. When the similarity exceeds the preset threshold, it can be considered The structured light depth model of the imaging object matches the preset face depth model.
可以理解的是,这里预设的人脸深度模型,是预先存储的利用结构光传感器对电子设备的机主的人脸进行成像得到结构光图像,利用结构光图像中的深度数据构建得到的人脸深度模型,以用于身份验证。It can be understood that the preset face depth model here is a pre-stored structured light image obtained by imaging the face of the owner of the electronic device using a structured light sensor, and constructing the human face by using the depth data in the structured light image. Face depth model for authentication.
步骤105,当结构光深度模型与预设人脸深度模型匹配时,确定身份验证通过。Step 105, when the structured light depth model matches the preset face depth model, it is determined that the identity verification is passed.
当成像对象的结构光深度模型与预设人脸深度模型匹配时,可以确定通过身份验证,允许用户进行后续操作,如解锁成功后,允许用户使用该电子设备。当结构光深度模型与预设人脸深度模型不匹配时,可以确定未通过身份验证,返回身份验证失败的信息。When the structured light depth model of the imaging object matches the preset face depth model, it can be determined that the identity verification is passed, and the user is allowed to perform subsequent operations, such as after the unlocking is successful, the user is allowed to use the electronic device. When the structured light depth model does not match the preset face depth model, it can be determined that the authentication has not been passed, and the authentication failure information is returned.
本申请实施例的解密处理方法,通过利用目标散斑图案对加密的深度数据进行解密,并将根据深度数据构建的结构光深度模型与预设人脸深度模型进行匹配,以进行身份验证,由于深度数据是预先加密的,且用于解密的目标散斑图案具有高度随机性,无法被其他软件或硬件解密,从而可以提高身份验证的安全性和可靠性。在身份验证过程中,由于采用了在可信环境下通过专用硬件获取身份验证所需的深度数据,保证了身份验证数据来源的安全性,进一步提高了身份验证的安全性和可靠性。在前述身份验证过程中,由于采用了在可信环境下通过专用硬件获取身份验证所需的成像数据,保证了身份验证数据来源的安全性,进一步提高了安全性和可靠性。In the decryption processing method of the embodiment of the present application, the encrypted depth data is decrypted by using the target speckle pattern, and the structured light depth model constructed according to the depth data is matched with the preset face depth model to perform identity verification. The depth data is pre-encrypted, and the target speckle pattern used for decryption is highly random and cannot be decrypted by other software or hardware, which can improve the security and reliability of authentication. In the identity verification process, since the in-depth data required for identity verification is obtained through dedicated hardware in a trusted environment, the security of the source of identity verification data is guaranteed, and the security and reliability of identity verification are further improved. In the aforementioned identity verification process, since the imaging data required for identity verification is obtained through dedicated hardware in a trusted environment, the security of the source of identity verification data is guaranteed, and the safety and reliability are further improved.
本申请实施例还提出一种加密处理方法,该方法由可信执行环境的专用硬件执行。其中,专用硬件可以为图2中的MCU,图5为本申请实施例提供的一种加密处理方法的流程示意图。The embodiment of the present application also proposes an encryption processing method, which is executed by dedicated hardware in a trusted execution environment. Wherein, the dedicated hardware may be the MCU in FIG. 2 , and FIG. 5 is a schematic flowchart of an encryption processing method provided in an embodiment of the present application.
如图5所示,该加密处理方法包括:As shown in Figure 5, the encryption processing method includes:
步骤501,当可信执行环境下运行的可信应用程序指示结构光传感器成像时,控制结构光传感器进行成像,并获取结构光传感器成像得到的深度数据。Step 501, when the trusted application running under the trusted execution environment instructs the structured light sensor to perform imaging, control the structured light sensor to perform imaging, and acquire depth data obtained by the structured light sensor.
当可信执行环境下运行的可信应用程序指示结构光传感器成像时,如电子设备解锁、电子支付时,可向专用硬件发送结构光传感器成像的指令。专用硬件接收到指令后,可控制结构光传感器进行成像。When the trusted application program running in the trusted execution environment instructs the structured light sensor to perform imaging, such as when the electronic device is unlocked or electronic payment is made, it can send instructions for structured light sensor imaging to the dedicated hardware. After receiving the instructions, the dedicated hardware can control the structured light sensor for imaging.
本实施例中,结构光传感器可包括镭射灯和激光摄像头。专用硬件MCU中的PWM可以调制镭射灯发出结构光,结构光照射至成像对象。结构光受到成像对象的阻碍被反射,激光摄像头可捕获被成像对象反射的结构光进行成像,得到结构光图像。In this embodiment, the structured light sensor may include a laser lamp and a laser camera. The PWM in the dedicated hardware MCU can modulate the laser light to emit structured light, and the structured light is irradiated to the imaging object. The structured light is reflected by the obstruction of the imaging object, and the laser camera can capture the structured light reflected by the imaging object for imaging to obtain a structured light image.
MCU从激光摄像头获取结构光图像,MCU中的深度引擎可根据结构光图像,计算获得成像对象对应的深度数据,具体而言,深度引擎解调结构光图像中变形位置像素对应的相位信息,将相位信息转化为高度信息,从而根据高度信息确定成像对象对应的深度数据。The MCU obtains the structured light image from the laser camera, and the depth engine in the MCU can calculate and obtain the depth data corresponding to the imaging object according to the structured light image. Specifically, the depth engine demodulates the phase information corresponding to the deformed position pixel in the structured light image, and converts The phase information is converted into height information, so as to determine the depth data corresponding to the imaging object according to the height information.
步骤502,采用预存的目标散斑图案,对深度数据进行加密,以得到经过加密的深度数据,并将经过加密的深度数据发送至可信应用程序。Step 502, using the pre-stored target speckle pattern to encrypt the depth data to obtain encrypted depth data, and send the encrypted depth data to a trusted application.
专用硬件采用预存的目标散斑图案,对深度数据进行加密,并将加密的数据发送至可信应用程序,由可信应用程序利用深度数据执行相应的操作。The dedicated hardware uses the pre-stored target speckle pattern to encrypt the depth data, and sends the encrypted data to a trusted application, and the trusted application uses the depth data to perform corresponding operations.
由于散斑图案具有高度的随机性,即使被其他恶意软件或者硬件获取,也无法解密得到深度数据,因此用目标散斑图案对深度数据进行加密,可以防止深度数据泄漏,提高深度数据的安全性。Since the speckle pattern is highly random, even if it is acquired by other malicious software or hardware, the depth data cannot be decrypted. Therefore, encrypting the depth data with the target speckle pattern can prevent the leakage of the depth data and improve the security of the depth data. .
进一步而言,在专用硬件采用预存的目标散斑图案,对深度数据进行加密之前,可对结构光传感器的衍射光学元件进行标定,得到目标散斑图案。Furthermore, before the dedicated hardware uses the pre-stored target speckle pattern to encrypt the depth data, the diffractive optical element of the structured light sensor can be calibrated to obtain the target speckle pattern.
散斑图案具有高度的随机性,并且会随着距离的不同而变换图案,可对衍射元件进行标定,得到散斑图案,例如,在距离激光摄像头的0~4米的范围内,任意取一个参考平面,可得到该位置对应的散斑图案。可以理解的是,当标定的位置不同时,可以得到不同的散斑图案,因此散斑图案具有多样性、唯一性,且散斑图案本身具有高度的随机性。The speckle pattern has a high degree of randomness, and will change the pattern with different distances. The diffraction element can be calibrated to obtain the speckle pattern. For example, within the range of 0 to 4 meters from the laser camera, any one Referring to the plane, the speckle pattern corresponding to the position can be obtained. It can be understood that when the calibrated positions are different, different speckle patterns can be obtained, so the speckle patterns are diverse and unique, and the speckle patterns themselves have a high degree of randomness.
由于普通的衍射元件对光束进行衍射后得到多数衍射光,但每束衍射光光强差别大,对人眼伤害的风险也大。即便是对衍射光进行二次衍射,得到的光束的均匀性也较低。因此,利用普通衍射元件衍射的光束对被测物进行投射的效果较差。Since the ordinary diffraction element diffracts the light beam to obtain most of the diffracted light, but the intensity of each diffracted light varies greatly, and the risk of damage to human eyes is also large. Even if the diffracted light is diffracted twice, the uniformity of the obtained beam is low. Therefore, the projection effect of the light beam diffracted by the common diffraction element on the measured object is relatively poor.
本实施例中采用准直分束元件,该元件不仅具有对非准直光束进行准直的作用,还具有分光的作用,即经反射镜反射的非准直光经过准直分束元件后往不同的角度出射多束准直光束,且出射的多束准直光束的截面面积近似相等,能量通量近似相等,进而使得利用该光束衍射后的散点光进行投射的效果更好。同时,出射光分散至每一束光,进一步降低了伤害人眼的风险,且散斑结构光相对于其他排布均匀的结构光来说,达到同样的采集效果时,散斑结构光消耗的电量更低。In this embodiment, a collimating beam-splitting element is used, which not only has the function of collimating the uncollimated beam, but also has the function of splitting light, that is, the uncollimated light reflected by the mirror passes through the collimating beam-splitting element and then Multiple collimated beams are emitted from different angles, and the cross-sectional areas of the emitted multiple collimated beams are approximately equal, and the energy flux is approximately equal, so that the projection effect of the scattered light after diffracted by the beam is better. At the same time, the outgoing light is dispersed to each beam, which further reduces the risk of harming the human eye. Compared with other evenly arranged structured light, when the speckle structured light achieves the same collection effect, the speckle structured light consumes less Lower power.
由于对结构光传感器的衍射光学元件进行标定得到的散斑图案,不仅具有高度随机性,而且每个标定位置的散斑图案具有唯一性,即使除可信应用程序和专用硬件以外的软件或硬件获取到深度数据,也无法进行解密,因此用目标散斑图案进行加密,可以有效地防止深度数据泄漏,提高深度数据的安全性。Since the speckle pattern obtained by calibrating the diffractive optical element of the structured light sensor is not only highly random, but also unique at each calibration position, even software or hardware other than trusted applications and dedicated hardware Obtained depth data cannot be decrypted, so encryption with the target speckle pattern can effectively prevent depth data leakage and improve the security of depth data.
在上述实施例的基础上,图6为本申请实施例提供的另一种加密处理方法的流程示意图,如图6所示,步骤502可包括:On the basis of the above embodiments, FIG. 6 is a schematic flowchart of another encryption processing method provided in the embodiment of the present application. As shown in FIG. 6, step 502 may include:
步骤601,将目标散斑图案中各像素点的取值作为一维序列中对应元素的取值。Step 601, taking the value of each pixel in the target speckle pattern as the value of the corresponding element in the one-dimensional sequence.
由于不同的目标散斑图案中各像素点的取值不同,可以将目标散斑图案作为密钥。本实施例中,可根据目标散斑图案中各像素点取值,生成二维矩阵,其中,二维矩阵的行和列分别对应目标散斑图案中像素点的行和列。然后,以行或列为单位,将二维矩阵中的元素,采用预设顺序依次进行拼接,得到一维序列。Since the value of each pixel in different target speckle patterns is different, the target speckle pattern can be used as a key. In this embodiment, a two-dimensional matrix may be generated according to the value of each pixel in the target speckle pattern, wherein the rows and columns of the two-dimensional matrix correspond to the rows and columns of the pixels in the target speckle pattern respectively. Then, in units of rows or columns, the elements in the two-dimensional matrix are sequentially spliced in a preset order to obtain a one-dimensional sequence.
作为一个示例,以行为单位,在从左至右依次得到第一行的元素后,从第一行的最后一个元素后面,将第二行从左至右的元素依次拼接。在拼接完第一行和第二行的元素后,将第三行从左至右的元素依次拼接在第二行的最后一个元素之后,直至拼接完所有二维矩阵中的元素,得到一维序列。As an example, in units of rows, after obtaining the elements of the first row from left to right, the elements of the second row are sequentially spliced from left to right after the last element of the first row. After splicing the elements of the first row and the second row, the elements of the third row from left to right are spliced after the last element of the second row until all the elements in the two-dimensional matrix are spliced to obtain a one-dimensional sequence.
作为另一个示例,以列为单位,从上至下依次得到第一列元素后,在第一列的最后一个元素之后,将第二列从上至下的元素依次拼接在第一列的最后一个元素之后,直至拼接完所有二维矩阵中的元素,得到一维序列。As another example, in units of columns, after getting the elements of the first column from top to bottom, after the last element of the first column, splice the elements of the second column from top to bottom at the end of the first column After one element, until all the elements in the two-dimensional matrix are concatenated, a one-dimensional sequence is obtained.
步骤602,将一维序列作为密钥,对深度数据进行加密,得到经过加密的深度数据。Step 602, using the one-dimensional sequence as a key to encrypt the depth data to obtain encrypted depth data.
本实施实例中,由于一维序列中的元素是目标散斑图案中各像素点取值,将一维序列作为密钥,也就是用目标散斑图案中各像素点取值作为密钥,对经过加密的深度数据进行加密,可以得到加密的深度数据。In this implementation example, since the elements in the one-dimensional sequence are the values of each pixel in the target speckle pattern, the one-dimensional sequence is used as the key, that is, the value of each pixel in the target speckle pattern is used as the key. After encrypting the encrypted depth data, the encrypted depth data can be obtained.
本申请实施例的加密处理方法,以目标散斑图案中各像素点取值,构成的一维序列作为密钥,对经过加密的深度数据进行加密,由于不同的散斑图案中各像素点取值不同,从而以目标散斑图案中各像素点取值,构成的一维序列作为密钥,即使经过加密的深度数据被窃取,也无法进行解密,可以有效防止深度数据泄漏,提高了深度数据的安全性。In the encryption processing method of the embodiment of the present application, the value of each pixel in the target speckle pattern is used as a one-dimensional sequence as the key to encrypt the encrypted depth data. Since the value of each pixel in different speckle patterns The values are different, so the value of each pixel in the target speckle pattern is used as a one-dimensional sequence as the key. Even if the encrypted depth data is stolen, it cannot be decrypted, which can effectively prevent the leakage of depth data and improve the depth data. security.
本申请实施例还提出一种解密处理装置,该装置具有可信执行环境。图7为本申请实施例提供的一种解密处理装置的结构示意图。The embodiment of the present application also proposes a decryption processing device, which has a trusted execution environment. FIG. 7 is a schematic structural diagram of a decryption processing device provided by an embodiment of the present application.
如图7所示,该解密处理装置包括:控制模块710、获取模块720、解密模块730。As shown in FIG. 7 , the decryption processing device includes: a control module 710 , an acquisition module 720 , and a decryption module 730 .
控制模块710,用于通过可信执行环境的专用硬件,控制结构光传感器进行成像;The control module 710 is configured to control the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment;
获取模块720,用于从专用硬件,获取经过加密的深度数据;深度数据结构光传感器成像得到的;The obtaining module 720 is used to obtain encrypted depth data from dedicated hardware; the depth data is obtained by imaging with a light sensor;
解密模块730,用于根据预存的目标散斑图案,对经过加密的深度数据进行解密,以得到深度数据。The decryption module 730 is configured to decrypt the encrypted depth data according to the pre-stored target speckle pattern to obtain depth data.
在本实施例一种可能的实现方式中,解密模块730可包括:In a possible implementation of this embodiment, the decryption module 730 may include:
获取单元,用于将目标散斑图案中各像素点的取值作为一维序列中对应元素的取值;An acquisition unit, configured to use the value of each pixel in the target speckle pattern as the value of the corresponding element in the one-dimensional sequence;
解密单元,用于将一维序列作为密钥,对经过加密的深度数据进行解密,得到解密后的深度数据。The decryption unit is configured to use the one-dimensional sequence as a key to decrypt the encrypted depth data to obtain the decrypted depth data.
在本实施例一种可能的实现方式中,获取单元还用于:In a possible implementation manner of this embodiment, the acquiring unit is further configured to:
根据目标散斑图案中各像素点取值,生成二维矩阵;Generate a two-dimensional matrix according to the value of each pixel in the target speckle pattern;
以行或列为单位,将二维矩阵中的元素,采用预设顺序依次进行拼接,得到一维序列。In units of rows or columns, the elements in the two-dimensional matrix are sequentially spliced in a preset order to obtain a one-dimensional sequence.
在本实施例一种可能的实现方式中,该装置还可包括:In a possible implementation manner of this embodiment, the device may further include:
匹配模块,用于将根据深度数据构建的结构光深度模型,与预设人脸深度模型进行匹配;当结构光深度模型与预设人脸深度模型匹配时,确定身份验证通过。The matching module is configured to match the structured light depth model constructed according to the depth data with the preset face depth model; when the structured light depth model matches the preset face depth model, it is determined that the identity verification is passed.
上述解密处理装置中各个模块的划分仅用于举例说明,在其他实施例中,可将解密处理装置按照需要划分为不同的模块,以完成上述图像处理装置的全部或部分功能。The division of each module in the above-mentioned decryption processing device is only for illustration. In other embodiments, the decryption processing device can be divided into different modules according to needs, so as to complete all or part of the functions of the above-mentioned image processing device.
需要说明的是,前述对解密处理方法实施例的解释说明,也适用于该实施例的解密处理装置,故在此不再赘述。It should be noted that the foregoing explanations of the embodiment of the decryption processing method are also applicable to the decryption processing device of this embodiment, so details are not repeated here.
本申请实施例的解密处理装置,具有可信执行环境,通过可信执行环境的专用硬件,控制结构光传感器进行成像,从专用硬件,获取经过加密的结构光传感器成像得到的深度数据,根据预存的目标散斑图案,对经过加密的深度数据进行解密,以得到深度数据;其中,目标散斑图案是对结构光传感器的衍射光学元件进行标定得到的。本实施例中,由于可信应用程序从专用硬件获取的深度数据是经过加密的,并且用于解密的目标散斑图案是对衍射光学元件进行标定得到的,具有唯一性以及散斑图案本身的随机性,因此即使除可信应用程序和专用硬件以外的软件或硬件读取到了深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。The decryption processing device in the embodiment of the present application has a trusted execution environment, controls the structured light sensor to perform imaging through the dedicated hardware of the trusted execution environment, and obtains the encrypted depth data obtained by imaging the structured light sensor from the dedicated hardware, according to the pre-stored Decrypt the encrypted depth data to obtain the depth data; wherein, the target speckle pattern is obtained by calibrating the diffractive optical element of the structured light sensor. In this embodiment, since the depth data acquired by the trusted application program from the dedicated hardware is encrypted, and the target speckle pattern used for decryption is obtained by calibrating the diffractive optical element, it has uniqueness and the uniqueness of the speckle pattern itself. Randomness, so even if software or hardware other than trusted applications and dedicated hardware read the deep data, it cannot be decrypted, which can effectively prevent deep data leakage, thereby improving the security of deep data and solving existing problems. In the face-based identity verification method in the technology, the security of face imaging data is relatively low.
在前述身份验证过程中,由于采用了在可信环境下通过专用硬件获取身份验证所需的成像数据,保证了身份验证数据来源的安全性,进一步提高了安全性和可靠性。In the aforementioned identity verification process, since the imaging data required for identity verification is obtained through dedicated hardware in a trusted environment, the security of the source of identity verification data is guaranteed, and the safety and reliability are further improved.
本申请实施例还提出一种微处理器,该微处理器为可信执行环境的专用硬件。图8为本申请实施例提供的一种微处理器的结构示意图。The embodiment of the present application also proposes a microprocessor, which is dedicated hardware for a trusted execution environment. FIG. 8 is a schematic structural diagram of a microprocessor provided in an embodiment of the present application.
如图8所示,该微处理器包括:控制模块810、加密模块820。As shown in FIG. 8 , the microprocessor includes: a control module 810 and an encryption module 820 .
控制模块810,用于当可信执行环境下运行的可信应用程序指示结构光传感器成像时,控制结构光传感器进行成像,并获取结构光传感器成像得到的深度数据;The control module 810 is configured to control the structured light sensor to perform imaging when the trusted application program running under the trusted execution environment instructs the structured light sensor to perform imaging, and obtain depth data obtained by imaging the structured light sensor;
加密模块820,用于采用预存的目标散斑图案,对深度数据进行加密,以得到经过加密的深度数据,并将经过加密的深度数据发送至可信应用程序。The encryption module 820 is configured to use the pre-stored target speckle pattern to encrypt the depth data to obtain encrypted depth data, and send the encrypted depth data to a trusted application.
在本实施例一种可能的实现方式中,加密模块820可包括:In a possible implementation of this embodiment, the encryption module 820 may include:
读取单元,用于将目标散斑图案中各像素点的取值作为一维序列中对应元素的取值;The reading unit is configured to use the value of each pixel in the target speckle pattern as the value of the corresponding element in the one-dimensional sequence;
加密单元,用于将一维序列作为密钥,对深度数据进行加密,得到经过加密的深度数据。The encryption unit is configured to use the one-dimensional sequence as a key to encrypt the depth data to obtain encrypted depth data.
在本实施例一种可能的实现方式中,读取单元还用于:In a possible implementation manner of this embodiment, the reading unit is also used for:
根据目标散斑图案中各像素点取值,生成二维矩阵;Generate a two-dimensional matrix according to the value of each pixel in the target speckle pattern;
以行或列为单位,将二维矩阵中的元素,采用预设顺序依次进行拼接,得到一维序列。In units of rows or columns, the elements in the two-dimensional matrix are sequentially spliced in a preset order to obtain a one-dimensional sequence.
在本实施例一种可能的实现方式中,该微处理单元还可包括:In a possible implementation manner of this embodiment, the microprocessing unit may further include:
标定模块,用于对结构光传感器的衍射光学元件进行标定,得到目标散斑图案。The calibration module is used to calibrate the diffractive optical element of the structured light sensor to obtain the target speckle pattern.
上述微处理器中各个模块的划分仅用于举例说明,在其他实施例中,可将微处理器按照需要划分为不同的模块,以完成上述微处理器的全部或部分功能。The division of each module in the above-mentioned microprocessor is only for illustration. In other embodiments, the microprocessor can be divided into different modules according to needs, so as to complete all or part of the functions of the above-mentioned microprocessor.
需要说明的是,前述对加密处理方法实施例的解释说明,也适用于该实施例的微处理器,故在此不再赘述。It should be noted that the foregoing explanations of the embodiment of the encryption processing method are also applicable to the microprocessor of this embodiment, so details are not repeated here.
本申请实施例的微处理器,该微处理器为可信执行环境的专用硬件,当可信执行环境下运行的可信应用程序指示结构光传感器成像时,控制结构光传感器进行成像,并获取结构光传感器成像得到的深度数据,采用预存的目标散斑图案,对深度数据进行加密,以得到经过加密的深度数据,并将经过加密的深度数据发送至可信应用程序。本实施例中,利用目标散斑图案对获取的结构光传感器成像得到的深度数据进行了加密,由于散斑图案本身的随机性,因此即使除可信应用程序和专用硬件以外的软件或硬件读取到了深度数据,也无法进行解密,可以有效地防止深度数据泄漏,从而提高了深度数据的安全性,解决了现有技术中基于人脸进行身份验证的方式中,人脸成像数据的安全性比较低的问题。The microprocessor of the embodiment of the present application, the microprocessor is dedicated hardware of the trusted execution environment, when the trusted application program running in the trusted execution environment instructs the structured light sensor to perform imaging, it controls the structured light sensor to perform imaging, and obtains The depth data obtained by the imaging of the structured light sensor is encrypted by using the pre-stored target speckle pattern to obtain encrypted depth data, and the encrypted depth data is sent to a trusted application. In this embodiment, the target speckle pattern is used to encrypt the depth data acquired by the structured light sensor imaging. Due to the randomness of the speckle pattern itself, even software or hardware other than trusted applications and dedicated hardware read The depth data cannot be decrypted even if it is obtained, which can effectively prevent the leakage of the depth data, thereby improving the security of the depth data, and solving the problem of face imaging data security in the existing technology of identity verification based on the face lower problem.
本申请实施例还提出一种移动终端。图9为本申请实施例提供的一种移动终端的结构示意图。The embodiment of the present application also proposes a mobile terminal. FIG. 9 is a schematic structural diagram of a mobile terminal provided by an embodiment of the present application.
本实施例中,移动终端包括但不限于手机、平板电脑等设备。In this embodiment, the mobile terminal includes but is not limited to devices such as mobile phones and tablet computers.
如图9所示,该移动终端包括:结构光传感器910、存储器920、MCU 930、处理器940以及存储在存储器920上并可在处理器940的可信执行环境下运行的可信应用程序(图9中未示出)。As shown in FIG. 9 , the mobile terminal includes: a structured light sensor 910, a memory 920, an MCU 930, a processor 940, and a trusted application program ( not shown in Figure 9).
其中,MCU 930为可信执行环境的专用硬件,与结构光传感器910和处理器940连接,用于实现上述实施例所述的加密处理方法。Wherein, the MCU 930 is dedicated hardware of a trusted execution environment, connected with the structured light sensor 910 and the processor 940, and used to implement the encryption processing method described in the above-mentioned embodiments.
处理器940执行可信应用程序时,实现前述实施例所述的解密处理方法。When the processor 940 executes the trusted application program, it implements the decryption processing method described in the foregoing embodiments.
在本实施例一种可能的实现方式中,移动终端还包括:红外传感器和可见光传感器。In a possible implementation manner of this embodiment, the mobile terminal further includes: an infrared sensor and a visible light sensor.
其中,红外传感器包括激光摄像头和泛光灯;结构光传感器包括:镭射灯,以及与红外传感器共用的激光摄像头;可见光传感器包括:可见光摄像头。Among them, the infrared sensor includes a laser camera and a floodlight; the structured light sensor includes: a laser light, and a laser camera shared with the infrared sensor; the visible light sensor includes: a visible light camera.
在本实施例一种可能的实现方式中,MCU 930包括:PWM、深度引擎、总线接口以及RAM;In a possible implementation of this embodiment, the MCU 930 includes: a PWM, a depth engine, a bus interface, and a RAM;
PWM,用于调制泛光灯以使发出红外光,以及调制镭射灯以发出结构光;PWM for modulating floodlights for infrared light and laser lights for structured light;
激光摄像头,用于采集成像对象的结构光图像;A laser camera for collecting structured light images of imaging objects;
深度引擎,用于根据结构光图像,计算获得成像对象对应的深度数据;以及a depth engine, configured to calculate and obtain depth data corresponding to the imaging object according to the structured light image; and
总线接口,用于将深度数据发送至处理器940,并由处理器940上运行的可信应用程序利用深度数据执行相应的操作。The bus interface is used to send the depth data to the processor 940, and the trusted application running on the processor 940 uses the depth data to perform corresponding operations.
本实施例中,PWM可调制泛光灯发出红外光,红外光照射至成像对象,并被成像对象反射,激光摄像头采集被反射的红外光进行成像得到红外图像,可见光摄像头可采集被成像对象反射的可见光进行成像得到可见光图像。In this embodiment, the PWM can modulate the floodlight to emit infrared light, the infrared light is irradiated to the imaging object, and is reflected by the imaging object, the laser camera collects the reflected infrared light for imaging to obtain an infrared image, and the visible light camera can collect Visible light imaging is performed to obtain visible light images.
本实施例中,总线接口可包括MIPI总线接口、I2C同步串行总线接口、SPI总线接口。In this embodiment, the bus interface may include a MIPI bus interface, an I2C synchronous serial bus interface, and an SPI bus interface.
本申请实施例还提出一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如前述实施例所述的解密处理方法,或者实现如上述实施例所述的加密处理方法。The embodiment of the present application also proposes a computer-readable storage medium, on which a computer program is stored. When the program is executed by a processor, the decryption processing method as described in the foregoing embodiments is realized, or the encryption method as described in the foregoing embodiments is realized. Approach.
在本说明书的描述中,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本申请的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。In the description of this specification, the terms "first" and "second" are used for description purposes only, and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Thus, the features defined as "first" and "second" may explicitly or implicitly include at least one of these features. In the description of the present application, "plurality" means at least two, such as two, three, etc., unless otherwise specifically defined.
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现定制逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本申请的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本申请的实施例所属技术领域的技术人员所理解。Any process or method descriptions in flowcharts or otherwise described herein may be understood to represent a module, segment or portion of code comprising one or more executable instructions for implementing custom logical functions or steps of a process , and the scope of preferred embodiments of the present application includes additional implementations in which functions may be performed out of the order shown or discussed, including in substantially simultaneous fashion or in reverse order depending on the functions involved, which shall It should be understood by those skilled in the art to which the embodiments of the present application belong.
在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。The logic and/or steps represented in the flowcharts or otherwise described herein, for example, can be considered as a sequenced listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium, For use with instruction execution systems, devices, or devices (such as computer-based systems, systems including processors, or other systems that can fetch instructions from instruction execution systems, devices, or devices and execute instructions), or in conjunction with these instruction execution systems, devices or equipment used. For the purposes of this specification, a "computer-readable medium" may be any device that can contain, store, communicate, propagate or transmit a program for use in or in conjunction with an instruction execution system, device or device. More specific examples (non-exhaustive list) of computer-readable media include the following: electrical connection with one or more wires (electronic device), portable computer disk case (magnetic device), random access memory (RAM), Read Only Memory (ROM), Erasable and Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Compact Disc Read Only Memory (CDROM). In addition, the computer-readable medium may even be paper or other suitable medium on which the program can be printed, since the program can be read, for example, by optically scanning the paper or other medium, followed by editing, interpretation or other suitable processing if necessary. The program is processed electronically and stored in computer memory.
应当理解,本申请的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。如,如果用硬件来实现和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that each part of the present application may be realized by hardware, software, firmware or a combination thereof. In the embodiments described above, various steps or methods may be implemented by software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware as in another embodiment, it can be implemented by any one or a combination of the following techniques known in the art: a discrete Logic circuits, ASICs with suitable combinational logic gates, Programmable Gate Arrays (PGA), Field Programmable Gate Arrays (FPGA), etc.
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。Those of ordinary skill in the art can understand that all or part of the steps carried by the methods of the above embodiments can be completed by instructing related hardware through a program, and the program can be stored in a computer-readable storage medium. During execution, one or a combination of the steps of the method embodiments is included.
此外,在本申请各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing module, each unit may exist separately physically, or two or more units may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. If the integrated modules are realized in the form of software function modules and sold or used as independent products, they can also be stored in a computer-readable storage medium.
上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本申请的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本申请的限制,本领域的普通技术人员在本申请的范围内可以对上述实施例进行变化、修改、替换和变型。The storage medium mentioned above may be a read-only memory, a magnetic disk or an optical disk, and the like. Although the embodiments of the present application have been shown and described above, it can be understood that the above embodiments are exemplary and should not be construed as limitations on the present application, and those skilled in the art can make the above-mentioned The embodiments are subject to changes, modifications, substitutions and variations.
Claims (14)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810326982.1A CN108614971A (en) | 2018-04-12 | 2018-04-12 | Encryption processing method and device, decryption processing method and device, and storage medium |
PCT/CN2019/080470 WO2019196684A1 (en) | 2018-04-12 | 2019-03-29 | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810326982.1A CN108614971A (en) | 2018-04-12 | 2018-04-12 | Encryption processing method and device, decryption processing method and device, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108614971A true CN108614971A (en) | 2018-10-02 |
Family
ID=63659882
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810326982.1A Pending CN108614971A (en) | 2018-04-12 | 2018-04-12 | Encryption processing method and device, decryption processing method and device, and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108614971A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108712400A (en) * | 2018-04-28 | 2018-10-26 | Oppo广东移动通信有限公司 | Data transmission method and device, computer readable storage medium and electronic equipment |
WO2019196684A1 (en) * | 2018-04-12 | 2019-10-17 | Oppo广东移动通信有限公司 | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal |
CN112287727A (en) * | 2019-07-24 | 2021-01-29 | 云从科技集团股份有限公司 | Structured light equipment, detection module and electronic terminal |
WO2021135638A1 (en) * | 2019-12-31 | 2021-07-08 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for detecting whether image is tampered with, and electronic device |
CN114117514A (en) * | 2021-10-29 | 2022-03-01 | 香港理工大学深圳研究院 | A method and system for encrypted face recognition based on optical speckle |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101529888A (en) * | 2006-10-31 | 2009-09-09 | 富士通株式会社 | Image encryption/decryption device, method, and program |
CN103093492A (en) * | 2013-01-21 | 2013-05-08 | 中国科学院上海光学精密机械研究所 | Three dimensional information optics cryptosystem and method |
CN107277053A (en) * | 2017-07-31 | 2017-10-20 | 广东欧珀移动通信有限公司 | Identity verification method, device and mobile terminal |
CN107483428A (en) * | 2017-08-09 | 2017-12-15 | 广东欧珀移动通信有限公司 | Authentication method, device and terminal equipment |
-
2018
- 2018-04-12 CN CN201810326982.1A patent/CN108614971A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101529888A (en) * | 2006-10-31 | 2009-09-09 | 富士通株式会社 | Image encryption/decryption device, method, and program |
CN103093492A (en) * | 2013-01-21 | 2013-05-08 | 中国科学院上海光学精密机械研究所 | Three dimensional information optics cryptosystem and method |
CN107277053A (en) * | 2017-07-31 | 2017-10-20 | 广东欧珀移动通信有限公司 | Identity verification method, device and mobile terminal |
CN107483428A (en) * | 2017-08-09 | 2017-12-15 | 广东欧珀移动通信有限公司 | Authentication method, device and terminal equipment |
Non-Patent Citations (1)
Title |
---|
贺锋涛等: "基于激光散斑子区域扫描的图像加密", 《激光与红外》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019196684A1 (en) * | 2018-04-12 | 2019-10-17 | Oppo广东移动通信有限公司 | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal |
CN108712400A (en) * | 2018-04-28 | 2018-10-26 | Oppo广东移动通信有限公司 | Data transmission method and device, computer readable storage medium and electronic equipment |
CN112287727A (en) * | 2019-07-24 | 2021-01-29 | 云从科技集团股份有限公司 | Structured light equipment, detection module and electronic terminal |
WO2021135638A1 (en) * | 2019-12-31 | 2021-07-08 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for detecting whether image is tampered with, and electronic device |
CN114117514A (en) * | 2021-10-29 | 2022-03-01 | 香港理工大学深圳研究院 | A method and system for encrypted face recognition based on optical speckle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108614971A (en) | Encryption processing method and device, decryption processing method and device, and storage medium | |
CN108804895B (en) | Image processing method, apparatus, computer-readable storage medium and electronic device | |
US9755830B2 (en) | Dynamic seed and key generation from biometric indicia | |
CN108764052B (en) | Image processing method, apparatus, computer-readable storage medium and electronic device | |
US11275927B2 (en) | Method and device for processing image, computer readable storage medium and electronic device | |
US11256903B2 (en) | Image processing method, image processing device, computer readable storage medium and electronic device | |
CN108549867B (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
WO2019196684A1 (en) | Data transmission method and apparatus, computer readable storage medium, electronic device, and mobile terminal | |
CN110036391B (en) | Optical feedback for visual identification authentication | |
CN108668078A (en) | Image processing method, device, computer-readable storage medium, and electronic device | |
US20080231418A1 (en) | Integrated Physical Unclonable Function (Puf) with Combined Sensor and Display | |
CN107277053A (en) | Identity verification method, device and mobile terminal | |
CN105227324B (en) | A kind of method and device of cloud platform authenticating user identification | |
EP3662411A1 (en) | Biometric authentication techniques | |
CN108805024A (en) | Image processing method, image processing device, computer-readable storage medium and electronic equipment | |
CN109213610B (en) | Data processing method and device, computer readable storage medium and electronic equipment | |
CN108921903B (en) | Camera calibration method, apparatus, computer-readable storage medium and electronic device | |
US20200380244A1 (en) | Face identification method and apparatus, mobile terminal and storage medium | |
CN108985255B (en) | Data processing method and device, computer readable storage medium and electronic equipment | |
CN108711054A (en) | Image processing method, device, computer-readable storage medium, and electronic device | |
WO2018148103A1 (en) | Password security | |
CN108830141A (en) | Image processing method, device, computer-readable storage medium, and electronic device | |
WO2019196669A1 (en) | Laser-based security verification method and apparatus, and terminal device | |
WO2020010832A1 (en) | Data acquisition method, mobile terminal, electronic device, production line calibration system, readable storage medium and computer device | |
EP3608814B1 (en) | Verification process in a terminal, corresponding terminal and corresponding computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181002 |
|
RJ01 | Rejection of invention patent application after publication |