Tamper-proof data verification method and terminal
The invention discloses a tamper-proof data verification method and a terminal, and the method comprises the steps: building a corresponding image data source model for a shot image after the image is shot, calculating a first secret key, a first co-prime number and a second co-prime number accordin...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a tamper-proof data verification method and a terminal, and the method comprises the steps: building a corresponding image data source model for a shot image after the image is shot, calculating a first secret key, a first co-prime number and a second co-prime number according to the data in the data source model, carrying out the calculation of a second secret key through combining the two co-prime numbers, and carrying out the verification of the second secret key. Therefore, the data source model corresponding to the image can be encrypted by using the first key, and the ciphertext can be decrypted by using the second key. Therefore, due to the fact that the first secret key is different from the second secret key, the second secret key can be prevented from being obtained through cracking of the first secret key by using the asymmetric secret key, and the image information is prevented from being tampered. Moreover, the RSA encryption algorithm is suitable for integer data, and the |
---|