CN112632577A - Screen capturing method, device, equipment and storage medium - Google Patents

Screen capturing method, device, equipment and storage medium Download PDF

Info

Publication number
CN112632577A
CN112632577A CN202011554259.2A CN202011554259A CN112632577A CN 112632577 A CN112632577 A CN 112632577A CN 202011554259 A CN202011554259 A CN 202011554259A CN 112632577 A CN112632577 A CN 112632577A
Authority
CN
China
Prior art keywords
key
picture
user
feature information
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011554259.2A
Other languages
Chinese (zh)
Inventor
李春江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202011554259.2A priority Critical patent/CN112632577A/en
Publication of CN112632577A publication Critical patent/CN112632577A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/174Facial expression recognition

Abstract

The application provides a screen capture method, a device, equipment and a storage medium, wherein the method comprises the following steps: detecting a screen capture event triggered by a preset screen capture key in a current interface, and acquiring a face image of a user through a camera; detecting a preset expression action of a user, and capturing a screen of a current interface to obtain a screen capture picture; generating a first secret key according to the face image; and encrypting the screenshot picture by adopting a first key, and storing the obtained picture ciphertext. According to the method and the device, the screenshot picture is encrypted according to the face picture, so that the security of the screenshot picture can be ensured, the user identity can be verified, and the security of data in the screenshot picture is improved. The face image and the preset expression action can be further adopted, or the unique identifier of the APP is combined for encryption, so that the picture ciphertext is more difficult to crack, the expression action can be used for detecting the living body of a user, the situation that the data are cheated by adopting a photo is avoided, the unique identifier of the APP is adopted, the picture ciphertext can be only decrypted in the APP, and the safety of the data in the screenshot picture is improved.

Description

Screen capturing method, device, equipment and storage medium
Technical Field
The application belongs to the technical field of block chains, and particularly relates to a screen capturing method, device, equipment and storage medium.
Background
At present, when a mobile terminal such as a mobile phone and a tablet computer is used for handling banking and insurance businesses, a lot of personal privacy information of a client, such as a bank account number and a password of the user, needs to be filled in frequently. However, many people in real life have difficulty in remembering their accounts and passwords, and particularly, the difficulty in remembering the accounts of users is high.
In the related art, a user can log in an own personal account by using an own user name and a password to check own personal privacy information. However, this method is greatly affected by the network, and the user cannot log in his own personal account to view the account while offline. Therefore, many users adopt a screen capture mode to store screen capture pictures of personal privacy information so as to be convenient to view. In order to improve the security of the personal privacy information, the screenshot picture needs to be encrypted. In the related art, the screen capture is usually performed by using a three-finger sliding screen or a volume key plus a power key, and the like, and the screen capture picture is not encrypted by using the mode, so that the security of personal privacy information in the screen capture picture is not high. Another related technique uses a text password to encrypt the screenshot picture, so that the user needs to remember the text password, which is inconvenient and not safe enough. Still another related art uses fingerprint identification's mode screenshot and encrypts the picture, but fingerprint identification can't verify user's identity for the security is also not high.
Disclosure of Invention
The application provides a screen capture method, a screen capture device, equipment and a storage medium, and the screen capture picture is encrypted according to a human face image, so that the security of the screen capture picture can be ensured, the user identity authentication can be realized, and the security of data in the screen capture picture is improved.
An embodiment of a first aspect of the present application provides a screen capture method, including:
detecting a screen capturing event triggered by a preset screen capturing key in a current interface, and acquiring a face image of a user through a camera;
detecting that the user makes a preset expression action, and capturing a screen of the current interface to obtain a screen capture picture of the current interface;
generating a first key according to the face image of the user;
and encrypting the screen capture picture by adopting the first key, and storing a picture ciphertext corresponding to the screen capture picture.
In some embodiments of the present application, the generating a first key according to the facial image of the user includes:
extracting face feature information of the user from the face image of the user;
generating a second key through a preset encryption algorithm, and encrypting the face feature information by adopting the second key to obtain a ciphertext of the face feature information;
and determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture.
In some embodiments of the present application, the generating a first key according to the facial image of the user includes:
obtaining an expression identifier corresponding to the preset expression action;
extracting face feature information of the user from the face image of the user;
generating a second key through a preset encryption algorithm, and encrypting the facial feature information and the expression identifier by adopting the second key;
and determining the character string obtained by encryption as a first key for encrypting the screen capture picture.
In some embodiments of the present application, the generating a first key according to the facial image of the user includes:
acquiring a unique identifier corresponding to an application program to which the current interface belongs;
extracting face feature information of the user from the face image of the user;
using the unique identifier as a second key;
encrypting the face feature information by adopting the second secret key through a preset encryption algorithm to obtain a ciphertext of the face feature information; determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture; or acquiring an expression identifier corresponding to the preset expression action; encrypting the facial feature information and the expression identifier by using the second key through the preset encryption algorithm; and determining the character string obtained by encryption as a first key for encrypting the screen capture picture.
In some embodiments of the present application, after storing the picture ciphertext corresponding to the screenshot picture, the method further includes:
when the viewing request of the screenshot picture is detected, acquiring a face image of the user through the camera, and detecting that the user makes the preset expression action;
acquiring a picture ciphertext and a second key corresponding to the screen capture picture;
and decrypting the picture ciphertext according to the second key and the face image to obtain the screenshot picture.
In some embodiments of the present application, the decrypting the picture ciphertext according to the second key and the face image to obtain the screenshot picture includes:
extracting face feature information of the user from the collected face image;
generating a first key for decrypting the picture ciphertext according to the second key and the face feature information;
and decrypting the picture ciphertext by adopting the first key through a preset encryption algorithm to obtain the screenshot picture.
In some embodiments of the present application, the generating a first key for decrypting the picture ciphertext according to the second key and the face feature information includes:
if the picture ciphertext is encrypted only according to the face feature information of the user, encrypting the face feature information by using the second key to obtain a first key;
if the picture ciphertext is encrypted according to the facial feature information of the user and a preset expression action, encrypting the facial feature information and an expression identifier corresponding to the preset expression action by using the second key to obtain a first key;
if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs and the face feature information of the user, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information through the unique identifier to obtain a first secret key;
if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs, the face feature information of the user and the preset expression action, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information and the expression identifier corresponding to the preset expression action through the unique identifier to obtain a first secret key.
An embodiment of a second aspect of the present application provides a screen capture device, including:
the face acquisition module is used for detecting a screen capture event triggered by a preset screen capture key in the current interface and acquiring a face image of a user through a camera;
the screen capturing module is used for detecting that the user makes a preset expression action, capturing the screen of the current interface and obtaining a screen capturing picture of the current interface;
the key generation module is used for generating a first key according to the face image of the user;
and the encryption module is used for encrypting the screen capture picture by adopting the first key and storing a picture ciphertext corresponding to the screen capture picture.
Embodiments of the third aspect of the present application provide a computer device comprising a memory and a processor, the memory having stored therein computer-readable instructions, which, when executed by the processor, cause the processor to perform the steps of the method of the first aspect described above.
Embodiments of the fourth aspect of the present application provide a storage medium storing computer-readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the method of the first aspect described above.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
in the embodiment of the application, the screenshot picture is encrypted through the face feature information. The method and the device can ensure the safety of the screen capture picture, can realize the verification of the user identity through the face image, and further improve the safety of data in the screen capture picture. According to the scheme, the screenshot picture can be encrypted by adopting the face characteristic information and the preset expression action, so that the ciphertext of the first picture is more difficult to crack, the security of the screenshot picture can be ensured, the identity of the user can be verified by the face image, the preset expression action can be used for carrying out living body detection on the user requesting decryption, malicious molecules are prevented from cheating the data in the screenshot picture by adopting the picture of the user, and the security of the data in the screenshot picture is further improved. The unique identifier and the face feature information corresponding to the APP can be further encrypted, or the unique identifier, the face feature information and the preset expression action corresponding to the APP are encrypted, so that the security of the screenshot picture can be guaranteed, the identity of the user can be verified through the face image, the preset expression action can be used for performing living body detection on the user requesting decryption, malicious molecules are prevented from cheating the data in the screenshot picture by using the photo of the user, and the security of the data in the screenshot picture is further improved. And because the unique identifier corresponding to the APP is difficult to acquire from the outside, the encrypted screenshot picture can be decrypted only in the APP, and the security of data in the screenshot picture is further improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a screen capture method provided by an embodiment of the present application;
FIG. 2 is a schematic structural diagram of a screen capture device provided in an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating an exemplary configuration of a computer device according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a storage medium provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another.
Some embodiments of the present application provide a screen capture method, in which an execution subject of the method is a mobile terminal, such as a mobile phone or a tablet computer. The mobile terminal is installed with a specific APP (Application), which may be an APP in the aspects of finance, credit or insurance, and these APPs usually contain personal privacy information such as a bank account number, a password, an identification number, etc. of the user. In the embodiment of the application, the specific APP comprises an interface for displaying personal privacy information of the user. When a user needs to capture the screen of the interface, as shown in fig. 1, the screen capture can be performed by the following steps, including:
step 101: and detecting a screen capture event triggered by a preset screen capture key in the current interface, and acquiring a face image of the user through a camera.
In the embodiment of the application, a preset screen capture button is arranged in an interface of the APP for displaying the personal privacy information of the user. When the user needs to perform screen capture storage on the personal privacy information in the interface, the user can click the preset screen capture button. When the mobile terminal detects a screen capture event triggered by a preset screen capture key, a camera of the mobile terminal is called, and a user is prompted to adjust the position of the mobile terminal so that the face of the user is located in a shooting area of the camera. When the face of the user is detected to be located in the shooting area of the camera, the face image of the user is collected through the camera.
Step 102: and when the fact that the user makes a preset expression action is detected, screen capturing is carried out on the current interface, and a screen capturing picture of the current interface is obtained.
In the process of acquiring the face image of the user through the operation in the step 101, prompt information for prompting the user to make a preset expression action is also displayed. The preset expression action is used for triggering screen capture operation, and the preset expression action can be blinking, smiling or beeping mouth and the like.
After seeing the prompt information displayed on the screen, the user can make preset expression actions according to the prompt information. When the camera detects that the user makes a preset expression action, the current interface is subjected to screen capture to obtain a screen capture picture of the current interface, and the screen capture picture may contain personal privacy information of the user. In order to ensure the security of the personal privacy information of the user, the embodiment of the application performs encryption protection on the screenshot picture in the following manner.
Step 103: and generating a first key according to the face image of the user.
In the embodiment of the application, after the face image of the user is obtained, the face feature information of the user is extracted from the face image, the face feature information may include features of the user, such as a face contour and facial features, and coordinates and pixel information of a plurality of face key points, and the face key points may include a plurality of pixel points located at the positions of the face contour, the facial features, the facial. And generating a second key through a preset encryption algorithm, and encrypting the face characteristic information of the user by adopting the second key through the preset encryption algorithm to obtain a ciphertext of the face characteristic information. And taking the ciphertext of the face feature information as a first key for encrypting the screenshot picture.
The first key used for encrypting the screenshot picture is generated by adopting the face feature information, so that the first key is difficult to crack, and the screenshot picture is encrypted by the first key subsequently, so that the security of the screenshot picture can be ensured, the user identity can be verified by the first key, and the security of data in the screenshot picture is further improved.
In other embodiments of the present application, the first key may also be generated according to the facial image of the user and the preset expressive motion. Specifically, the expression identifier corresponding to the preset expression action may be preset in the embodiment of the application, for example, the expression identifier corresponding to smile is set to 001, the expression identifier corresponding to blink is set to 002, and the expression identifier corresponding to beep-mouth is set to 003. A preset expression action can be randomly adopted each time the user triggers the screen capture. After the step 102 detects that the user makes a preset expression action, an expression identifier corresponding to the preset expression action is obtained. After the facial feature information of the user is extracted from the facial image in the mode, a second secret key is generated through a preset encryption algorithm, the facial feature information of the user and the expression identifier corresponding to the preset expression action are encrypted through the preset encryption algorithm by adopting the second secret key, and the character string obtained through encryption is used as the first secret key for encrypting the screenshot picture.
The method comprises the steps that face feature information and a preset expression action are adopted to generate a first key for encrypting a screenshot picture, so that the first key is more difficult to crack, the screenshot picture is subsequently encrypted through the first key, the security of the screenshot picture can be ensured, the identity of a user can be verified through the first key, the preset expression action can be used for carrying out living body detection on the user requesting decryption, malicious molecules are prevented from cheating data in the screenshot picture by the user through the picture of the user, and the security of the data in the screenshot picture is further improved.
In other embodiments of the present application, a unique identifier corresponding to an APP (application) to which the current interface belongs may also be obtained, and the unique identifier may be a serial number for uniquely identifying the APP. The unique identifier is used as the second key. And encrypting the face feature information by adopting the unique identifier through a preset encryption algorithm to obtain a first secret key for encrypting the screenshot picture. Or encrypting the facial feature information and the expression identifier corresponding to the preset expression action by adopting the unique identifier through a preset encryption algorithm to obtain a first key for encrypting the screenshot picture.
The face feature information is encrypted through the unique identifier corresponding to the APP to obtain a first key, or the face feature information and the preset expression action are encrypted through the unique identifier corresponding to the APP to obtain the first key. Subsequently, the screenshot picture is encrypted through the first key, so that the security of the screenshot picture can be ensured, the identity of the user can be verified through the first key, the user requesting decryption can be subjected to live body detection through the preset expression action, malicious molecules are prevented from cheating the data in the screenshot picture by using the photo of the user, and the security of the data in the screenshot picture is further improved. And because the unique identifier corresponding to the APP is difficult to acquire from the outside, the encrypted screenshot picture can be decrypted only in the APP, and the security of data in the screenshot picture is further improved.
Step 104: and encrypting the screenshot picture by adopting the first key, and storing a picture ciphertext corresponding to the screenshot picture.
And encrypting the screen capture picture by using a preset encryption algorithm through the first key generated in any one mode in the step 103 to obtain a picture ciphertext corresponding to the screen capture picture. And allocating a screen capturing identifier for the screen capturing operation, wherein the screen capturing identifier is used for uniquely identifying the screen capturing operation. And correspondingly storing the screen capture identification, the picture ciphertext, the second key and the expression identifier corresponding to the preset expression action.
And when a viewing request of the screenshot picture is detected, obtaining a picture ciphertext and a second key corresponding to the screenshot picture, and decrypting the picture ciphertext according to the second key to obtain the screenshot picture.
After the picture ciphertext is stored through the operation of the step 104, a viewing interface for viewing the screenshot picture is provided in the interface of the APP, and the viewing interface is associated with the screenshot identification. When the user clicking the viewing interface is detected, the associated screen capture identification is obtained from the viewing interface. And acquiring the correspondingly stored picture ciphertext, the second key and the expression identifier corresponding to the preset expression action according to the screen capture identifier.
When the user clicks the viewing interface, the camera of the mobile terminal is triggered and called, and prompt information used for prompting the user to adjust the mobile terminal so that the face of the user is located in a shooting area of the camera is displayed. When the camera detects that the face of the user is completely positioned in the shooting area, the camera collects the face image of the user. And displaying prompt information for prompting a user to make a preset expression action corresponding to the expression identifier according to the stored expression identifier of the preset expression action. And when the user sees the prompt message, a corresponding preset expression action is made according to the prompt message, and after the mobile terminal detects that the user makes the preset expression action through the camera, the mobile terminal can determine that the current user is a living user and not a photo of the user, so that the next decryption operation is performed. If the fact that the user makes the preset expression action according to the prompt is not detected, the picture of the user may be located in front of the camera at present instead of the user, and therefore subsequent decryption operation is not performed any more, and safety of data in the screen capture picture is guaranteed.
After the fact that the user makes a preset expression action is detected, face feature information of the user is extracted from the collected face image. If the first key for encrypting the screenshot picture is generated only according to the face feature information of the user, the stored second key is used for encrypting the face feature information to obtain the first key, and the picture ciphertext is decrypted by the first key through a preset encryption algorithm to obtain the screenshot picture.
If the first key for encrypting the screenshot picture is generated according to the facial feature information of the user and the expression identifier corresponding to the preset expression action, the stored second key is used for encrypting the facial feature information and the expression identifier corresponding to the preset expression action to obtain the first key, and the picture ciphertext is decrypted by adopting the first key through a preset encryption algorithm to obtain the screenshot picture.
If the first key for encrypting the screenshot picture is generated by encrypting the facial feature information of the user by using the unique identifier corresponding to the APP, or is generated by encrypting the facial feature information and the expression identifier corresponding to the preset expression action by using the unique identifier corresponding to the APP, the second key may not be stored when the picture ciphertext is stored in step 104, but the unique identifier is obtained from the APP when the picture ciphertext is decrypted in this step, the facial feature information is encrypted by using the unique identifier to obtain the first key, or the facial feature information and the expression identifier corresponding to the preset expression action are encrypted by using the unique identifier to obtain the first key. And decrypting the picture ciphertext by adopting a first key through a preset encryption algorithm to obtain the screen shot picture.
After the picture ciphertext is decrypted to obtain the screenshot picture in the manner described in any one of the embodiments, the screenshot picture is displayed so that the user can browse the data in the screenshot picture.
In the embodiment of the application, the screenshot picture is encrypted through the face feature information. The method and the device can ensure the safety of the screen capture picture, can realize the verification of the user identity through the face image, and further improve the safety of data in the screen capture picture. According to the scheme, the screenshot picture can be encrypted by adopting the face characteristic information and the preset expression action, so that the ciphertext of the first picture is more difficult to crack, the security of the screenshot picture can be ensured, the identity of the user can be verified by the face image, the preset expression action can be used for carrying out living body detection on the user requesting decryption, malicious molecules are prevented from cheating the data in the screenshot picture by adopting the picture of the user, and the security of the data in the screenshot picture is further improved. The unique identifier and the face feature information corresponding to the APP can be further encrypted, or the unique identifier, the face feature information and the preset expression action corresponding to the APP are encrypted, so that the security of the screenshot picture can be guaranteed, the identity of the user can be verified through the face image, the preset expression action can be used for performing living body detection on the user requesting decryption, malicious molecules are prevented from cheating the data in the screenshot picture by using the photo of the user, and the security of the data in the screenshot picture is further improved. And because the unique identifier corresponding to the APP is difficult to acquire from the outside, the encrypted screenshot picture can be decrypted only in the APP, and the security of data in the screenshot picture is further improved.
An embodiment of the present application provides a screen capture apparatus, which is configured to perform the screen capture method described in any of the foregoing embodiments, and as shown in fig. 2, the apparatus includes:
the face acquisition module 201 is configured to detect a screen capture event triggered by a preset screen capture button in a current interface, and acquire a face image of a user through a camera;
the screen capturing module 202 is configured to detect that a user makes a preset expression action, capture a screen of a current interface, and obtain a screen capture picture of the current interface;
the key generation module 203 is used for generating a first key according to the face image of the user;
the encryption module 204 is configured to encrypt the screenshot picture by using the first key, and store a picture ciphertext corresponding to the screenshot picture.
The key generation module 203 is used for extracting face feature information of the user from a face image of the user; generating a second key by a preset encryption algorithm, and encrypting the face characteristic information by adopting the second key to obtain a ciphertext of the face characteristic information; and determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture.
The key generation module 203 is configured to acquire an expression identifier corresponding to a preset expression action; extracting face feature information of a user from a face image of the user; generating a second key through a preset encryption algorithm, and encrypting the face feature information and the expression identifier by adopting the second key; and determining the character string obtained by encryption as a first key for encrypting the screen shot picture.
The key generation module 203 is configured to obtain a unique identifier corresponding to an application to which the current interface belongs; extracting face feature information of a user from a face image of the user; using the unique identifier as a second key; encrypting the face characteristic information by adopting a second secret key through a preset encryption algorithm to obtain a ciphertext of the face characteristic information; determining a ciphertext of the face feature information as a first key for encrypting the screenshot picture; or acquiring an expression identifier corresponding to a preset expression action; encrypting the face feature information and the pre-expression identifier by adopting a second secret key through a preset encryption algorithm; and determining the character string obtained by encryption as a first key for encrypting the screen shot picture.
The device also includes: the decryption module is used for acquiring a face image of a user through the camera when a viewing request of a screenshot picture is detected, and detecting that the user makes a preset expression action; acquiring a picture ciphertext and a second key corresponding to the screen capture picture; and decrypting the picture ciphertext according to the second key and the face image to obtain the screen capture picture.
The decryption module is used for extracting the face feature information of the user from the acquired face image; generating a first key for decrypting the picture ciphertext according to the second key and the face feature information; and decrypting the picture ciphertext by adopting the first key through a preset encryption algorithm to obtain the screenshot picture.
The decryption module is used for encrypting the face feature information by adopting the second key to obtain a first key if the picture ciphertext is encrypted only according to the face feature information of the user; if the picture ciphertext is encrypted according to the facial feature information of the user and a preset expression action, encrypting the facial feature information and an expression identifier corresponding to the preset expression action by using the second key to obtain a first key; if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs and the face feature information of the user, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information through the unique identifier to obtain a first secret key; if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs, the face feature information of the user and the preset expression action, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information and the expression identifier corresponding to the preset expression action through the unique identifier to obtain a first secret key.
The embodiment of the application provides computer equipment for executing the screen capturing method in any one of the above embodiments. As shown in fig. 3, the computer device includes a processor, a non-volatile storage medium, a memory, and a network interface connected through a system bus. The non-volatile storage medium of the computer device stores an operating system, a database and computer readable instructions, the database can store control information sequences, and the computer readable instructions can enable a processor to realize a screen capture method when being executed by the processor. The processor of the computer device is used for providing calculation and control capability and supporting the operation of the whole computer device. The memory of the computer device may have stored therein computer readable instructions that, when executed by the processor, may cause the processor to perform a screen capture method. The network interface of the computer device is used for connecting and communicating with the terminal. Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The computer device comprises a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program: detecting a screen capturing event triggered by a preset screen capturing key in a current interface, and acquiring a face image of a user through a camera; detecting that a user makes a preset expression action, and capturing a screen of a current interface to obtain a screen capture picture of the current interface; generating a first key according to a face image of a user; and encrypting the screenshot picture by adopting the first key, and storing a picture ciphertext corresponding to the screenshot picture.
The processor, when executing the computer program, may further perform the steps of: extracting face feature information of a user from a face image of the user; generating a second key by a preset encryption algorithm, and encrypting the face characteristic information by adopting the second key to obtain a ciphertext of the face characteristic information; and determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture.
The processor, when executing the computer program, may further perform the steps of: obtaining an expression identifier corresponding to a preset expression action; extracting face feature information of a user from a face image of the user; generating a second key through a preset encryption algorithm, and encrypting the face feature information and the expression identifier by adopting the second key; and determining the character string obtained by encryption as a first key for encrypting the screen shot picture.
The processor, when executing the computer program, may further perform the steps of: acquiring a unique identifier corresponding to an application program to which a current interface belongs; extracting face feature information of a user from a face image of the user; using the unique identifier as a second key; encrypting the face characteristic information by adopting a second secret key through a preset encryption algorithm to obtain a ciphertext of the face characteristic information; determining a ciphertext of the face feature information as a first key for encrypting the screenshot picture; or acquiring an expression identifier corresponding to a preset expression action; encrypting the face feature information and the pre-expression identifier by adopting a second secret key through a preset encryption algorithm; and determining the character string obtained by encryption as a first key for encrypting the screen shot picture.
The processor, when executing the computer program, may further perform the steps of: when a viewing request of a screenshot picture is detected, acquiring a face image of a user through a camera, and detecting that the user makes a preset expression action; acquiring a picture ciphertext and a second key corresponding to the screen capture picture; and decrypting the picture ciphertext according to the second key and the face image to obtain the screen capture picture.
The processor, when executing the computer program, may further perform the steps of: extracting face feature information of the user from the collected face image; generating a first key for decrypting the picture ciphertext according to the second key and the face feature information; and decrypting the picture ciphertext by adopting the first key through a preset encryption algorithm to obtain the screenshot picture.
The processor, when executing the computer program, may further perform the steps of: if the picture ciphertext is encrypted only according to the face feature information of the user, encrypting the face feature information by using the second key to obtain a first key; if the picture ciphertext is encrypted according to the facial feature information of the user and a preset expression action, encrypting the facial feature information and an expression identifier corresponding to the preset expression action by using the second key to obtain a first key; if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs and the face feature information of the user, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information through the unique identifier to obtain a first secret key; if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs, the face feature information of the user and the preset expression action, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information and the expression identifier corresponding to the preset expression action through the unique identifier to obtain a first secret key.
Embodiments of the present application also provide a storage medium storing computer-readable instructions, as shown in fig. 4, which when executed by one or more processors, cause the one or more processors to perform the following steps: detecting a screen capturing event triggered by a preset screen capturing key in a current interface, and acquiring a face image of a user through a camera; detecting that a user makes a preset expression action, and capturing a screen of a current interface to obtain a screen capture picture of the current interface; generating a first key according to a face image of a user; and encrypting the screenshot picture by adopting the first key, and storing a picture ciphertext corresponding to the screenshot picture.
The processor may further perform the steps of: extracting face feature information of a user from a face image of the user; generating a second key by a preset encryption algorithm, and encrypting the face characteristic information by adopting the second key to obtain a ciphertext of the face characteristic information; and determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture.
The processor may further perform the steps of: obtaining an expression identifier corresponding to a preset expression action; extracting face feature information of a user from a face image of the user; generating a second key through a preset encryption algorithm, and encrypting the face feature information and the expression identifier by adopting the second key; and determining the character string obtained by encryption as a first key for encrypting the screen shot picture.
The processor may further perform the steps of: acquiring a unique identifier corresponding to an application program to which a current interface belongs; extracting face feature information of a user from a face image of the user; using the unique identifier as a second key; encrypting the face characteristic information by adopting a second secret key through a preset encryption algorithm to obtain a ciphertext of the face characteristic information; determining a ciphertext of the face feature information as a first key for encrypting the screenshot picture; or acquiring an expression identifier corresponding to a preset expression action; encrypting the face feature information and the pre-expression identifier by adopting a second secret key through a preset encryption algorithm; and determining the character string obtained by encryption as a first key for encrypting the screen shot picture.
The processor may further perform the steps of: when a viewing request of a screenshot picture is detected, acquiring a face image of a user through a camera, and detecting that the user makes a preset expression action; acquiring a picture ciphertext and a second key corresponding to the screen capture picture; and decrypting the picture ciphertext according to the second key and the face image to obtain the screen capture picture.
The processor may further perform the steps of: extracting face feature information of the user from the collected face image; generating a first key for decrypting the picture ciphertext according to the second key and the face feature information; and decrypting the picture ciphertext by adopting the first key through a preset encryption algorithm to obtain the screenshot picture.
The processor may further perform the steps of: if the picture ciphertext is encrypted only according to the face feature information of the user, encrypting the face feature information by using the second key to obtain a first key; if the picture ciphertext is encrypted according to the facial feature information of the user and a preset expression action, encrypting the facial feature information and an expression identifier corresponding to the preset expression action by using the second key to obtain a first key; if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs and the face feature information of the user, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information through the unique identifier to obtain a first secret key; if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs, the face feature information of the user and the preset expression action, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information and the expression identifier corresponding to the preset expression action through the unique identifier to obtain a first secret key.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A screen capture method, comprising:
detecting a screen capturing event triggered by a preset screen capturing key in a current interface, and acquiring a face image of a user through a camera;
detecting that the user makes a preset expression action, and capturing a screen of the current interface to obtain a screen capture picture of the current interface;
generating a first key according to the face image of the user;
and encrypting the screen capture picture by adopting the first key, and storing a picture ciphertext corresponding to the screen capture picture.
2. The method of claim 1, wherein generating the first key from the facial image of the user comprises:
extracting face feature information of the user from the face image of the user;
generating a second key through a preset encryption algorithm, and encrypting the face feature information by adopting the second key to obtain a ciphertext of the face feature information;
and determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture.
3. The method of claim 1, wherein generating the first key from the facial image of the user comprises:
obtaining an expression identifier corresponding to the preset expression action;
extracting face feature information of the user from the face image of the user;
generating a second key through a preset encryption algorithm, and encrypting the facial feature information and the expression identifier by adopting the second key;
and determining the character string obtained by encryption as a first key for encrypting the screen capture picture.
4. The method of claim 1, wherein generating the first key from the facial image of the user comprises:
acquiring a unique identifier corresponding to an application program to which the current interface belongs;
extracting face feature information of the user from the face image of the user;
using the unique identifier as a second key;
encrypting the face feature information by adopting the second secret key through a preset encryption algorithm to obtain a ciphertext of the face feature information; determining the ciphertext of the face feature information as a first key for encrypting the screenshot picture; or acquiring an expression identifier corresponding to the preset expression action; encrypting the facial feature information and the expression identifier by using the second key through the preset encryption algorithm; and determining the character string obtained by encryption as a first key for encrypting the screen capture picture.
5. The method according to any one of claims 2-4, wherein after storing the picture cipher text corresponding to the screenshot picture, the method further comprises:
when the viewing request of the screenshot picture is detected, acquiring a face image of the user through the camera, and detecting that the user makes the preset expression action;
acquiring a picture ciphertext and a second key corresponding to the screen capture picture;
and decrypting the picture ciphertext according to the second key and the face image to obtain the screenshot picture.
6. The method according to claim 5, wherein the decrypting the picture ciphertext according to the second key and the face image to obtain the screenshot picture comprises:
extracting face feature information of the user from the collected face image;
generating a first key for decrypting the picture ciphertext according to the second key and the face feature information;
and decrypting the picture ciphertext by adopting the first key through a preset encryption algorithm to obtain the screenshot picture.
7. The method according to claim 6, wherein the generating a first key for decrypting the picture ciphertext according to the second key and the face feature information comprises:
if the picture ciphertext is encrypted only according to the face feature information of the user, encrypting the face feature information by using the second key to obtain a first key;
if the picture ciphertext is encrypted according to the facial feature information of the user and a preset expression action, encrypting the facial feature information and an expression identifier corresponding to the preset expression action by using the second key to obtain a first key;
if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs and the face feature information of the user, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information through the unique identifier to obtain a first secret key;
if the picture ciphertext is encrypted according to the unique identifier corresponding to the application program to which the current interface belongs, the face feature information of the user and the preset expression action, acquiring the unique identifier corresponding to the application program, and encrypting the face feature information and the expression identifier corresponding to the preset expression action through the unique identifier to obtain a first secret key.
8. A screen capture device, comprising:
the face acquisition module is used for detecting a screen capture event triggered by a preset screen capture key in the current interface and acquiring a face image of a user through a camera;
the screen capturing module is used for detecting that the user makes a preset expression action, capturing the screen of the current interface and obtaining a screen capturing picture of the current interface;
the key generation module is used for generating a first key according to the face image of the user;
and the encryption module is used for encrypting the screen capture picture by adopting the first key and storing a picture ciphertext corresponding to the screen capture picture.
9. A computer device comprising a memory and a processor, the memory having stored therein computer-readable instructions that, when executed by the processor, cause the processor to perform the steps of the method of any of claims 1 to 7.
10. A storage medium having stored thereon computer-readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the method of any one of claims 1 to 7.
CN202011554259.2A 2020-12-24 2020-12-24 Screen capturing method, device, equipment and storage medium Pending CN112632577A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011554259.2A CN112632577A (en) 2020-12-24 2020-12-24 Screen capturing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011554259.2A CN112632577A (en) 2020-12-24 2020-12-24 Screen capturing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112632577A true CN112632577A (en) 2021-04-09

Family

ID=75324772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011554259.2A Pending CN112632577A (en) 2020-12-24 2020-12-24 Screen capturing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112632577A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893866A (en) * 2016-02-15 2016-08-24 努比亚技术有限公司 Screen capture method and device
US20160352520A1 (en) * 2013-10-29 2016-12-01 Jory Schwach Encryption using biometric image-based key
CN106775424A (en) * 2017-01-13 2017-05-31 维沃移动通信有限公司 A kind of screenshotss processing method and mobile terminal
CN110175441A (en) * 2019-04-12 2019-08-27 平安普惠企业管理有限公司 Data managing method, device, equipment and storage medium based on bio-identification
CN111782110A (en) * 2019-04-03 2020-10-16 阿里巴巴集团控股有限公司 Screen capturing method and device, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160352520A1 (en) * 2013-10-29 2016-12-01 Jory Schwach Encryption using biometric image-based key
CN105893866A (en) * 2016-02-15 2016-08-24 努比亚技术有限公司 Screen capture method and device
CN106775424A (en) * 2017-01-13 2017-05-31 维沃移动通信有限公司 A kind of screenshotss processing method and mobile terminal
CN111782110A (en) * 2019-04-03 2020-10-16 阿里巴巴集团控股有限公司 Screen capturing method and device, electronic equipment and storage medium
CN110175441A (en) * 2019-04-12 2019-08-27 平安普惠企业管理有限公司 Data managing method, device, equipment and storage medium based on bio-identification

Similar Documents

Publication Publication Date Title
CN106487511B (en) Identity authentication method and device
JP6444500B2 (en) User authentication method and system using variable keypad and biometric authentication
CN109040439B (en) Method and device for realizing privacy protection
EP2813961A1 (en) Biometric verification with improved privacy and network performance in client-server networks
EA035080B1 (en) System and method for providing block chain-based multifactor personal identity verification
JPWO2003069489A1 (en) Identification method
CN105429761A (en) Key generation method and device
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
CN106372522A (en) Photo shooting method, corresponding device, photo viewing method and corresponding device
JP2006262333A (en) Living body authentication system
Stockinger Implicit authentication on mobile devices
CN111445231A (en) Method and device for realizing MOTOpay and electronic equipment
CN111314389A (en) Face authentication method, face authenticator and readable storage medium
CN105337742A (en) LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN108073820A (en) Security processing, device and the mobile terminal of data
FR2944400A1 (en) METHOD OF AUTHENTICATING A SERVER FROM A USER OF A MOBILE DEVICE
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
KR102068041B1 (en) Appratus and method of user authentication and digital signature using user's biometrics
WO2017091133A1 (en) Method and system for secure storage of information
Carta et al. Video injection attacks on remote digital identity verification solution using face recognition
CN112632577A (en) Screen capturing method, device, equipment and storage medium
CN105844137B (en) Device and method for identifying picture browsing operation authority
US20220350928A1 (en) Information processing system, information processing method, program, and user interface
CN114238909A (en) Virtual asset storage method and device and virtual asset query method and device
Jacob et al. QR based Card-less ATM Transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination