Disclosure of Invention
In order to solve the above technical problems or at least partially solve the above technical problems, the present application provides a data encryption method, a data decryption method and a system for virtual reality.
In a first aspect, an embodiment of the present application provides a data encryption method for virtual reality, including:
Determining data to be encrypted in a virtual reality space;
Determining a target carrier to be associated for associating with the data to be encrypted in the virtual reality space;
Acquiring first encrypted data obtained after encrypting the data to be encrypted;
And associating the first encrypted data to the target carrier to be associated, and hiding the encrypted data in the virtual reality space.
Optionally, in the foregoing data encryption method, the determining, in the virtual reality space, a target carrier to be associated for associating with the data to be encrypted includes:
Receiving the selected target carrier to be associated in the virtual reality space, or
Determining a data type of the target encrypted data;
And determining the target carrier to be associated corresponding to the data type in the virtual reality space.
Optionally, in the foregoing data encryption method, the obtaining first encrypted data after encrypting the data to be encrypted includes:
Acquiring equipment information accessed in the virtual reality space;
Determining encryption mode information which can be used for encryption according to the equipment information, and displaying each encryption mode information;
Receiving selected target encryption mode information in the encryption mode information;
receiving target encryption information corresponding to the target encryption mode information;
And encrypting the data to be encrypted according to the target encryption information to obtain the first encrypted data.
Optionally, the data encryption method as described above further includes, after determining the data to be encrypted in the virtual reality space:
Acquiring an encryption request for encrypting the data to be encrypted in the virtual reality space;
Acquiring an encryption information acquisition control according to the encryption request;
Receiving and obtaining second encrypted information through the encrypted information acquisition control;
and encrypting the data to be encrypted through the second encryption information to obtain second encryption data, and hiding the second encryption data in the virtual reality space.
Optionally, the determining the data to be encrypted in the virtual reality space according to the foregoing data encryption method includes:
Newly establishing the data to be encrypted in the virtual reality space, or
And importing the existing data to be encrypted into the virtual reality space.
In a second aspect, an embodiment of the present application further provides a data decryption method for virtual reality, including:
determining a target carrier to be decrypted selected in the virtual reality space;
Acquiring first target encrypted data associated with the target carrier to be decrypted, wherein the first target encrypted data is hidden in the virtual reality space;
receiving first decryption information for decrypting the first target encrypted data;
And decrypting the first target encrypted data when the first decryption information is consistent with the first encryption information corresponding to the first target encrypted data, obtaining first decrypted data, and displaying the first decrypted data in the virtual reality space.
Optionally, the data decryption method as described above further includes:
determining a decryption request received in the virtual reality space;
Acquiring a decryption information acquisition control according to the decryption request;
Receiving and obtaining second decryption information through the decryption information obtaining control;
inquiring hidden data corresponding to the virtual reality space according to the second decryption information to obtain second target encryption data corresponding to the second decryption information;
And decrypting the second target encrypted data according to the second decryption information to obtain second decrypted data, and displaying the second decrypted data in the virtual reality space.
In a third aspect, an embodiment of the present application further provides a data encryption device for virtual reality, including:
the data determining module is used for determining data to be encrypted in the virtual reality space;
The first carrier determining module is used for determining a target carrier to be associated for associating with the data to be encrypted in the virtual reality space;
The first encryption module is used for obtaining first encrypted data obtained after the data to be encrypted are encrypted;
And the hiding module is used for associating the first encrypted data to the target carrier to be associated and hiding the encrypted data in the virtual reality space.
Optionally, the data encryption device as described above, the first carrier determining module includes:
A first receiving unit for receiving the selected target carrier to be associated in the virtual reality space, or
A first determining unit configured to determine a data type of the target encrypted data;
And the second determining unit is used for determining the target carrier to be associated corresponding to the data type in the virtual reality space.
Optionally, the data encryption device as described above, the first encryption module includes:
the first acquisition unit is used for acquiring the equipment information accessed in the virtual reality space;
a third determining unit, configured to determine encryption mode information that can be used for encryption according to the device information, and display each encryption mode information;
a second receiving unit configured to receive target encryption mode information selected from among the encryption mode information;
the third receiving unit is used for receiving the target encryption information corresponding to the target encryption mode information;
The first encryption unit is used for encrypting the data to be encrypted according to the target encryption information to obtain the first encrypted data.
Optionally, the data encryption device further comprises a second encryption module, wherein the second encryption module comprises:
A second obtaining unit, configured to obtain an encryption request for encrypting the data to be encrypted in the virtual reality space;
the calling unit is used for calling the encryption information acquisition control according to the encryption request;
The fourth receiving unit is used for receiving and obtaining second encrypted information through the encrypted information acquisition control;
And the second encryption unit is used for encrypting the data to be encrypted through the second encryption information to obtain second encrypted data, and hiding the second encrypted data in the virtual reality space.
Optionally, the data encryption device as described above, the data determining module includes:
A new building unit, configured to newly build the data to be encrypted in the virtual reality space;
and the importing unit is used for importing the existing data to be encrypted into the virtual reality space.
In a fourth aspect, an embodiment of the present application further provides an information decryption apparatus for virtual reality, including:
The second carrier determining module is used for determining the target carrier to be decrypted, which is selected in the virtual reality space;
A first acquisition module for acquiring first target encrypted data associated with the target carrier to be decrypted;
A first decryption information receiving module for receiving first decryption information for decrypting the first target encrypted data;
And the first display module is used for decrypting the first target encrypted data to obtain first decrypted data when the first decryption information is consistent with the first encryption information corresponding to the first target encrypted data, and displaying the first decrypted data in the virtual reality space.
Optionally, the data decryption device as described above further includes:
the decryption request acquisition module is used for acquiring a decryption request received in the virtual reality space;
The calling module is used for calling and obtaining decryption information obtaining control according to the decryption request;
The second decryption information receiving module is used for receiving and obtaining second decryption information through the decryption information acquisition control;
The inquiring module is used for inquiring from the hidden data corresponding to the virtual reality space according to the second decryption information to obtain second target encryption data corresponding to the second decryption information;
and the second display module is used for decrypting the second target encrypted data according to the second decryption information to obtain second decrypted data, and displaying the second decrypted data in the virtual reality space.
In a fifth aspect, an embodiment of the present application further provides an information processing system for virtual reality, including a data encryption device as described above and a data decryption device as described above.
In a sixth aspect, an embodiment of the present application provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
The memory is used for storing a computer program;
the processor is configured to implement a processing method according to any one of the preceding claims when executing the computer program.
In a seventh aspect, an embodiment of the present application provides a storage medium comprising a stored program, wherein the program when run performs the method steps as set forth in any one of the preceding claims.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
According to the method provided by the embodiment of the application, the target carrier to be associated is used as the object of the first encrypted data displayed in the virtual reality space, and the first encrypted data is not directly displayed in the virtual reality space, so that the purpose of hiding the first encrypted data is achieved, and the first encrypted data is associated to the target carrier to be associated, so that the data and the object in the virtual space are more tightly combined, and the user experience can be effectively improved.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a block diagram of a data encryption method for virtual reality according to an embodiment of the present application, including steps S11 to S14 as follows:
And S11, determining data to be encrypted in the virtual reality space.
In particular, the virtual reality space may be read or entered into a virtual space by using the VR wearable device.
The data to be encrypted can be pictures, documents and video and audio data, and can also be any virtual object.
And S12, determining a target carrier to be associated for associating with the data to be encrypted in the virtual reality space.
Specifically, the target carrier to be associated may be a carrier for associating with the data encrypted by the data to be encrypted, optionally, the target carrier to be associated may be a virtual article selected from a virtual reality space, for example, a vase, a table, a box, a page of a book, etc., where an optional implementation manner may be that after the object is selected in the virtual reality operating system, scanning is performed, and a pop-up window inquires whether the article is selected as a carrier, if the confirmation is performed, information feature data (for example, location information, carrier identifier, etc.) of the target carrier to be associated is saved, and if the confirmation is cancelled, the target carrier to be associated is reselected.
S13, obtaining first encrypted data after the data to be encrypted are encrypted.
Specifically, the encrypting the data to be encrypted may be obtaining an encryption password by inputting a password, a fingerprint, a face, an iris, an action, a gesture, and the like, so as to obtain the first encrypted data after encrypting the data to be encrypted.
And S14, associating the first encrypted data to the target carrier to be associated, and hiding the encrypted data in the virtual reality space.
In other words, the target carrier to be associated is used as an object for displaying the first encrypted data in the virtual reality space, the first encrypted data is not directly displayed in the virtual reality space, the purpose of hiding the first encrypted data is achieved, and the first encrypted data is associated to the target carrier to be associated, so that the data and the object in the virtual space can be more tightly combined, and user experience can be effectively improved.
In some embodiments, as the foregoing data encryption method, the step S12 of determining the target carrier to be associated for associating with the data to be encrypted in the virtual reality space includes the following steps S121 to S123:
s121, receiving a selected target carrier to be associated in a virtual reality space;
specifically, one of the alternative implementation manners may be that a user selects an object in the virtual reality space through a VR glove or a motion catcher, and then the user can inquire whether the object is selected as a carrier through a popup window in a virtual manner and take the object as a target carrier to be associated after the user confirms the object.
S122, determining the data type of the target encrypted data;
s123, determining a target carrier to be associated corresponding to the data type in the virtual reality space.
Specifically, in step S122 and step S123, the data type of the target encrypted data may be obtained by obtaining the data type (e.g., video file, picture file, document, etc.), optionally, by identifying the file extension of the target encrypted data, etc.
The corresponding relation between the data type and the carrier can be obtained by presetting, for example, when the data type is a video file, an object to which the data type is related can be a television, a computer or a tablet personal computer, etc., and when the data type is a picture file, the object to which the data type is related can be an album, an electronic album or a photo frame, etc., so that a better degree of agreement between the target encrypted data and the target carrier to be related can be achieved, a better display effect can be achieved when the decrypted data is displayed in a virtual reality space in the later period, and user experience can be effectively improved.
In some embodiments, as the aforementioned data encryption method, the step S13 of obtaining the first encrypted data after encrypting the data to be encrypted includes the following steps S131 to S135:
And S131, acquiring equipment information accessed in the virtual reality space.
Specifically, the device information accessed in the virtual reality space may be information characterizing component devices possessed by or accessed by the VR wearable device corresponding to the virtual reality space, for example, VR handles, fingerprint identification sensors, VR glasses, helmets, iris identification sensors, VR gloves, motion traps, and the like.
And S132, determining encryption mode information which can be used for encryption according to the equipment information, and displaying each encryption mode information.
Specifically, the information that different equipment information can acquire is different, so that different encryption modes can be obtained according to different equipment information, and the information is displayed through the encryption mode information, wherein the encryption mode information can be displayed in a virtual reality space through an image-text mode, and the method also can comprise a teaching flow for realizing encryption. For example, when the fingerprint identification sensor is packaged in the equipment information, the user is informed of the fact that the encryption mode can be selected by displaying the corresponding encryption mode information, and meanwhile, how to input the fingerprint password is displayed.
And S133, receiving the selected target encryption mode information in the encryption mode information.
Specifically, when a plurality of encryption mode information is displayed in the virtual reality space, the user may select, for example, by the VR handle, among the encryption mode information, and the selected encryption mode information is the target encryption mode information.
And S134, receiving target encryption information corresponding to the target encryption mode information.
Specifically, after the target encryption mode information is determined, the target encryption information corresponding to the target encryption mode input by the user can be accepted.
And S135, encrypting the data to be encrypted according to the target encryption information to obtain first encrypted data.
Specifically, after the target encryption information is obtained, the data to be encrypted can be encrypted through the target encryption information, and the first encryption data is obtained, and then when the data to be encrypted needs to be accessed or edited later, the data to be encrypted can be obtained only after the first encryption data is decrypted through the target encryption information.
By the method in the embodiment, the system can automatically detect all the encryption modes, and the user can select among different encryption modes to input corresponding target encryption information.
As shown in fig. 2, in some embodiments, the data encryption method, as described above, further includes, after the step S11 of determining the data to be encrypted in the virtual reality space, the following steps S15 to S18:
S15, obtaining an encryption request for encrypting the data to be encrypted in the virtual reality space.
That is, the data to be encrypted is not hidden after being associated with the carrier, but is hidden directly in the virtual reality space, and the encryption request may be a request initiated by the user for encrypting the data to be encrypted.
And S16, acquiring an encryption information acquisition control according to the encryption request.
The encryption information acquisition control is a control used for acquiring password input by a user, wherein the encryption information acquisition control can be a pre-existing control, and the device for realizing the method of the embodiment can be obtained by calling the encryption information acquisition control from the preset control according to an encryption request.
And S17, receiving and obtaining second encrypted information through an encrypted information acquisition control.
Specifically, the second encryption information is input encryption information when the data to be encrypted is directly hidden in the virtual reality space, and the second encryption information is received through the encryption information acquisition control.
And S18, encrypting the data to be encrypted through the second encryption information to obtain second encryption data, and hiding the second encryption data in the virtual reality space.
That is, the second encrypted data is obtained after the data to be encrypted is encrypted through the second encrypted information, and the second encrypted data is directly hidden in the virtual reality space.
In some embodiments, as the foregoing data encryption method, the step S11 of determining the data to be encrypted in the virtual reality space includes the following steps S111 and S112:
S111, newly establishing the data to be encrypted in the virtual reality space, or
And S112, importing the existing data to be encrypted into the virtual reality space.
That is, the data to be encrypted may be newly created in the virtual reality space, wherein the method that may be used for the new creation includes creating the data to be encrypted that needs to be encrypted using an electronic pen, a data glove, a keyboard, etc. to which the VR device is connected.
The data to be encrypted may also be already present and imported from other devices.
By the method in the embodiment, different data to be encrypted can be encrypted, so that the types of the processable objects are increased.
As shown in fig. 3, according to another aspect of the present application, there is also provided a data decryption method for virtual reality, including steps S21 to S24 as follows:
and S21, determining the target carrier to be decrypted, which is selected in the virtual reality space.
S22, acquiring first target encryption data associated with a target carrier to be decrypted, wherein the first target encryption data is hidden in the virtual reality space.
Specifically, the target carrier to be decrypted is a carrier associated with first target encrypted data, and the first target encrypted data is hidden in the virtual reality space, so that the first target encrypted data is not directly processed, and optionally, the first target encrypted data can be obtained by selecting the first target encrypted data in the virtual reality space through VR wearing equipment.
Step S23, first decryption information for decrypting the first target encrypted data is received.
Specifically, the first decryption information is information for decrypting the first target encrypted data, and similarly, the first decryption information may be obtained by inputting the first decryption information into the virtual reality space through the VR wearable device.
And S24, decrypting the first target encrypted data to obtain first decrypted data when the first decryption information is consistent with the first encryption information corresponding to the first target encrypted data, and displaying the first decrypted data in the virtual reality space.
Specifically, after receiving the first decryption information, determining whether the first decryption information is consistent with the first encryption information corresponding to the first target encrypted data, and decrypting the first target encrypted data when the first decryption information is consistent with the first encryption information to obtain first decrypted data. Meanwhile, the first decrypted data is unhidden and displayed in the virtual reality space.
As shown in fig. 4, in some embodiments, the data decryption method as described above further includes steps S25 to S29 as follows:
s25, determining a decryption request received in the virtual reality space;
specifically, the method in this embodiment is used for a decryption method corresponding to when the encrypted data is directly hidden in the virtual reality space.
The decryption request may be a user initiated request for decrypting encrypted data hidden in the virtual reality space.
And S26, invoking according to the decryption request to obtain a decryption information acquisition control.
The decryption information acquisition control is a control for acquiring the decryption information input by the user, wherein the decryption information acquisition control can be a pre-existing control, and the device for realizing the method of the embodiment can acquire the control after calling the control from the preset control according to the decryption request.
S27, receiving and obtaining second decryption information through a decryption information acquisition control;
Specifically, the second decryption information is used for inputting decryption information when the encrypted data is directly hidden in the virtual reality space, and the second decryption information is received by the decryption information acquisition control.
And S28, inquiring the hidden data corresponding to the virtual reality space according to the second decryption information to obtain second target encryption data corresponding to the second decryption information.
Specifically, since there may be a plurality of hidden data in the virtual reality space, in order not to disclose all the hidden data, each hidden data may be decrypted by the second decryption information, and the decryption result may be determined, or the second target encrypted data corresponding to the second decryption information may be obtained by comparing the second decryption information with the decryption information corresponding to each hidden data.
And S29, decrypting the second target encrypted data according to the second decryption information to obtain second decrypted data, and displaying the second decrypted data in the virtual reality space.
The second decrypted data is obtained by decrypting the second target encrypted data with the second decryption information, and after decryption, the second decrypted data is displayed in the virtual reality space, the method in the embodiment can hide the data by virtue of the credential without using a carrier, so that the application scene of data hiding can be effectively improved.
As shown in fig. 5, according to an embodiment of another aspect of the present application, there is also provided a data encryption apparatus for virtual reality, including:
a data determining module 11, configured to determine data to be encrypted in a virtual reality space;
A first carrier determining module 12, configured to determine, in a virtual reality space, a target carrier to be associated for associating with data to be encrypted;
a first encryption module 13, configured to obtain first encrypted data obtained by encrypting data to be encrypted;
the hiding module 14 is configured to associate the encrypted data to the target carrier to be associated, and hide the encrypted data in the virtual reality space.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
As shown in fig. 6, according to an embodiment of another aspect of the present application, there is also provided an information decryption apparatus for virtual reality, including:
A second carrier determining module 21 for determining a target carrier to be decrypted selected in the virtual reality space;
A first acquisition module 22 for acquiring first target encrypted data associated with a target carrier to be decrypted;
a first decryption information receiving module 23 for receiving first decryption information for decrypting the first target encrypted data;
The first display module 24 is configured to decrypt the first target encrypted data to obtain first decrypted data when the first decryption information is consistent with the first encryption information corresponding to the first target encrypted data, and display the first decrypted data in the virtual reality space.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
According to an embodiment of another aspect of the present application, there is also provided an information processing system for virtual reality, including the data encryption apparatus as described above and the data decryption apparatus as described above.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
According to another embodiment of the present application, there is also provided an electronic device including, as shown in fig. 7, the electronic device may include a processor 1501, a communication interface 1502, a memory 1503 and a communication bus 1504, wherein the processor 1501, the communication interface 1502 and the memory 1503 complete communication with each other through the communication bus 1504.
A memory 1503 for storing a computer program;
The processor 1501 is configured to execute the program stored in the memory 1503, thereby implementing the steps of the method embodiment described above.
The bus mentioned above for the electronic device may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc., or may be a Digital signal processor (Digital SignalProcessing, DSP), an Application SPECIFIC INTEGRATED Circuit (ASIC), a Field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, or discrete hardware components.
The embodiment of the application also provides a storage medium, which comprises a stored program, wherein the program executes the method steps of the method embodiment.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.