CN105138879B - The method and apparatus of control software access right - Google Patents

The method and apparatus of control software access right Download PDF

Info

Publication number
CN105138879B
CN105138879B CN201510463074.3A CN201510463074A CN105138879B CN 105138879 B CN105138879 B CN 105138879B CN 201510463074 A CN201510463074 A CN 201510463074A CN 105138879 B CN105138879 B CN 105138879B
Authority
CN
China
Prior art keywords
user
software
retinue
predetermined threshold
age
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510463074.3A
Other languages
Chinese (zh)
Other versions
CN105138879A (en
Inventor
赵礼杰
印奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Beijing Maigewei Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Beijing Maigewei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd, Beijing Maigewei Technology Co Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201510463074.3A priority Critical patent/CN105138879B/en
Publication of CN105138879A publication Critical patent/CN105138879A/en
Application granted granted Critical
Publication of CN105138879B publication Critical patent/CN105138879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a kind of method and apparatus of control software access right.This method includes:Step S1100:Acquisition includes the image of the user of software;Step S1300:At the age that the user is identified based on described image, judge whether the age of the user is greater than or equal to the first predetermined threshold, if not, S1500 is thened follow the steps, if so, thening follow the steps S1700;Step S1500:Decide whether to open the access right of the software according to the first predetermined policy to the user, and corresponding operating is executed according to determination result;And step S1700:The access right of the software is opened to the user.The above method and device can carry out the people of different age group using the permission of software the control of Different Strategies.While this ensures that adult can arbitrarily use software, reasonable employment of the minor to software has been automatically controlled.

Description

The method and apparatus of control software access right
Technical field
The present invention relates to computer realms, and in particular to a kind of method and apparatus of control software access right.
Background technology
With popularizing for the electronic equipments such as personal computer, notebook, tablet computer, mobile phone, game machine, minor connects The tactile chance for running on the various softwares on these electronic equipments is more and more, such as system software and application software (APP). Since minor's intelligence is not yet physically well developed, many APP (such as:Certain Games Softwares, certain social softwares etc.) due to containing There are the information such as supertition, violence and is not appropriate for minor's use.In addition, minor's curiosity is strong, may change unintentionally Or delete system software.
But current software is not high for the use limitation of user.To solve above-mentioned skill existing in the prior art Art problem, it is necessary to propose a kind of method and apparatus of control software access right.
Invention content
In view of the above problems, it is proposed that the present invention is in order to provide a kind of control software to solve the above problems at least partly The method and apparatus of access right.
According to one aspect of the invention, it provides a kind of methods of control software access right.This method includes:
Step S1100:Acquisition includes the image of the user of software;
Step S1300:Based on the age of the image recognition user, judge whether the age of the user is more than or waits In the first predetermined threshold, if not, S1500 is thened follow the steps, if so, thening follow the steps S1700;
Step S1500:Decide whether to open the access right of the software, and root according to the first predetermined policy to the user Corresponding operating is executed according to determination result;And
Step S1700:The access right of the software is opened to the user.
Optionally, step S1500 further comprises:
Step S1510:It whether there is retinue on the side of the user based on the image detection, if it is, holding Row step S1530, if not, thening follow the steps S1550;
Step S1530:Detect whether the retinue meets preset condition, if so, S1700 is thened follow the steps, if It is no, then follow the steps S1550;And
Step S1550:Refuse to open the access right of the software to the user.
Optionally, which includes:There are the ages in the retinue to be greater than or equal to the second predetermined threshold An at least retinue, wherein the age of the retinue is based on the image recognition, which is more than should First predetermined threshold.
Optionally, which further comprises:The existing, age is greater than or equal to accompanying for second predetermined threshold It is live body at least one in personnel.
Optionally, which further comprises:The existing, age is greater than or equal to accompanying for second predetermined threshold It is greater than or equal to third predetermined threshold with the similarity in personnel between at least one face and the face of the user.
Optionally, which adds predetermined value equal to the age of the user, and the predetermined value is big In or equal to 20.
Optionally, in step S1510, it should be whether there is on the side of the user based on the image detection and accompany people Member is according to whether there is also other faces in addition to the face of the user in the images.
Optionally, in step S1510, it should be whether there is on the side of the user based on the image detection and accompany people Member also according to other existing faces watching direction and run the software electronic equipment direction between it is consistent Property.
Optionally, in step S1510, it should be whether there is on the side of the user based on the image detection and accompany people Relationship of the member also according to the distance between other existing faces and the face of the user between the 4th predetermined threshold.
According to a further aspect of the invention, a kind of device of control software access right, including Image Acquisition mould are additionally provided Block, the first control module, execution module and authorization module.The image capture module is used to acquire the figure for the user for including software Picture.First control module is used for the age based on the image recognition user, judges whether the age of the user is more than Or it is equal to the first predetermined threshold, if it is not, then starting the execution module, if it is, starting the authorization module.The execution module Access right for deciding whether to open the software according to from the first predetermined policy to the user, and executed according to determination result Corresponding operating.Authorization module is used to open the access right of the software to the user.
The method and apparatus of above-mentioned control software access right, can to the people of different age group using software permission into The control of row Different Strategies.While this ensures that adult can arbitrarily use software, minor has been automatically controlled to software Reasonable employment, avoid minor by the harmful effect of software or destroy software.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, below the special specific implementation mode for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are common for this field Technical staff will become clear.Attached drawing only for the purpose of illustrating preferred embodiments, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart of the method for control software access right according to an embodiment of the invention;
Fig. 2 shows the flow charts of the method for control software access right in accordance with another embodiment of the present invention;
Fig. 3 shows that according to an embodiment of the invention whether there is on the side of user based on image detection is accompanied The flow chart of the step of personnel;
Fig. 4 shows the stream for the step of whether detection retinue according to an embodiment of the invention meets preset condition Cheng Tu;
Fig. 5 shows the schematic block diagram of the device of control software access right according to an embodiment of the invention;With And
Fig. 6 shows the schematic block diagram of execution module according to an embodiment of the invention.
Specific implementation mode
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
People in order to effectively control different age group reasonably uses software, and the present invention provides a kind of uses of control software The method of permission.Fig. 1 shows the flow chart of the method 1000 of control software access right according to an embodiment of the invention. As shown in Figure 1, this method 1000 includes step S1100, step S1300, step S1500 and step S1700.
In step S1100, acquisition includes the image of the user of software.User is the people it is expected using the software. The image includes the user of software, can be the whole body of user, the upper part of the body or only face.Step S1100 can be with The picture for being embodied as directly shooting the user for including software is used as the image.Step S1100 is also implemented as shooting and regards Frequently, using including the frame of the user of software as the image.
Step S1100 can be realized by the image capture module of the electronic equipment of runs software, such as notebook Camera, mobile phone front camera etc..Step S1100 can also be realized by independent image capture module.For example, by with The image capture module of device that the electronic equipment of runs software is connected, for control software access right is realized.It should The device of control software access right can be independently of the electronic equipment.
In step S1300, step S1100 acquired images are based on, the age of user is identified, judges user's Whether the age is greater than or equal to the first predetermined threshold, if not, S1500 is thened follow the steps, if so, thening follow the steps S1700. First predetermined threshold can be advance according to carry out such as the age bracket for the user that software is applicable in and state's laws relevant regulations Setting.In a specific example, the first predetermined threshold was 18 one full year of life.
Because image includes the user of software, thus it is possible to identify the age of user based on image.It is optional Ground, in step S1300 the age based on image recognition user include:The face for detecting user in the picture, is based on face Estimate the age of user.Face in image obviously can be with change of age including such as pupil, canthus, the corners of the mouth, nose etc. Feature can relatively accurately estimate the age of personage in image by analyzing these characteristic expansions in image.Wherein, Estimate that the age of user can utilize the existing various methods for estimating the face age, such as the method etc. of machine learning, This is not defined.
It is appreciated that similarly with step S1100, step S1300 can be completed in the electronic equipment of runs software, It can be completed in device being connected with the electronic equipment, for controlling access right.In addition, step S1300 can also It is completed in the server positioned at high in the clouds.Here, not being defined for the equipment for realizing step S1300.
In step S1500, the access right to user's Freeware, and root are decided whether according to the first predetermined policy Corresponding operating is executed according to determination result.Thus, it is possible to control access right of the user for software.
According to a specific example, step S1500 may include:Directly refuse the right to use to user's Freeware Limit.In other words, the first predetermined policy may include directly refusing.In the present embodiment, refuse to open the software to user Access right may be used existing various feasible modes and realize, not be defined herein.
Step S1700:To the access right of user's Freeware.By the step, user obtains to software Access right can arbitrarily use the software.In the present embodiment, the access right of the software is opened to user to adopt It is realized with existing various feasible modes, is not defined herein.
The method of above-mentioned control software access right can be used for run on personal computer, notebook, tablet electricity Any software in the electronic equipments such as brain, mobile phone, game machine, including LAN-ignorant program and network edition software.Software is for example various APP, especially for example:Minor's (or the age is less than the people of given age) is often unsuitable for the case where no adult guards Under the application software that is used alone.It is specifically for example certain to include violence, the game of superstitious content.
This method itself can by run on the software (such as APP) in the electronic equipments such as server and/or computer Lai It realizes.Above-mentioned steps S100 to step S400 can be carried out before application software commencement of commercial operation, can be run in application software Real-time continuous progress in the process rear at regular intervals among application software operational process can also automatically carry out, herein simultaneously Without limiting.
The method of above-mentioned control software access right can carry out difference to the people of different age group using the permission of software The control of strategy.While this ensures that adult can arbitrarily use software, minor has been automatically controlled to the reasonable of software It uses.
Fig. 2 shows the flow charts of the method 2000 of control software access right in accordance with another embodiment of the present invention. As shown in Fig. 2, this method 2000 includes step S2100, step S2300, step S2510, step S2530, step S2550 and step Rapid S2700.Wherein step S2100, step S2300 and step S2700 and the step S1100 in the above method 1000, step S1300 is similar with step S1700, for sake of simplicity, details are not described herein.Step S2510, step S2530 in method 2000 and Step S2550 realizes the function that step S1500 is realized in the above method 1000 jointly.
In step S2510, based on acquired image in step S2100, detection whether there is on the side of user Retinue, if so, S2530 is thened follow the steps, if not, thening follow the steps S2550.
Detection operation can by detect whether there is in the picture other people any position in addition to user come It realizes, such as shoulder.Optionally, which can be according to whether there is also other in addition to the face of user in the picture Face is realized.Optionally, otherwise on the contrary if it is present directly there are retinues beside user for judgement.Face In comprising having many characteristics, such as the eyes, nose and mouth of certain positional relationship, be highly convenient for detecting.Moreover, these features ten are clearly demarcated Aobvious, this makes the false drop rate of Face datection relatively low.Whether there is also other people in addition to the face of user in the picture for detection The method of face may be used existing various feasible face identification methods, not be defined herein.
Step S2530:Whether detection retinue meets preset condition, if so, S2700 is thened follow the steps, if not, Then follow the steps S2550.
When method 2000 goes to this step, it has been determined that the age of user is less than normal, e.g. minor.It is expected that There can be suitable retinue to accompany it to use software.Here it is possible to set preset condition as needed.For example, default Condition may include at least retinue for being greater than or equal to 30 years old there are the age in retinue.
Step S2550:Refuse the access right to user's Freeware.By the step, user is prohibited from using The software.In the present embodiment, step S2550 may be used existing various feasible modes and realize, herein and without It limits.
By the above method 2000, it to the use of software is carried out under other people monitoring that minor, which has been effectively ensured, , rather than carry out alone.
It illustrates how to whether there is retinue on the side of user based on image detection to become apparent from, Fig. 3 is shown The flow chart of above-mentioned steps S2510 according to an embodiment of the invention.As shown in figure 3, step S2510 includes step S2511, step S2513 and step S2515.
In step S2511, detected according to whether there is also other faces in addition to the face of user in the picture It whether there is retinue on the side of user.If so, thening follow the steps S2513.If it is not, then final judgement is using Retinue is not present in the side of person, directly executes step S2550.
In step S2513, according to the watching direction of other existing faces and the electronic equipment of runs software Direction between consistency come further detect the side of user whether there is retinue.The direction of electronic equipment is For the watching direction of user.If at least one watching direction and electronic equipment in other existing faces Direction it is consistent, then may infer that an at least retinue is accompanying user to use the software beside user, then Execute step S2515.If the watching direction of other existing faces is not consistent with the direction of electronic equipment, though So there are retinues beside user, but the retinue may be busy with other affairs, and practical there is no accompany User uses the software, and therefore, retinue is not present in the side for being considered as user, next executes step S2550.
It is predetermined with the 4th according to the distance between other existing faces and the face of user in step S2515 Relationship between threshold value whether there is retinue further to detect on the side of user.In general, if accompanying people Member is accompanying user to use software, and the two head can gather closer, can preferably to see the screen of electronic equipment Curtain etc..4th predetermined threshold can be set according to actual conditions.For example, the 4th predetermined threshold can be set as being slightly larger than Parent instruct and monitor child use computer software when and child usual distance.Illustratively, the 4th predetermined threshold can Think 60 centimetres.Therefore, if the distance between at least one in other faces and user face is less than the 4th predetermined threshold Value, then there are retinues beside user for final judgement, execute step S2530.If other faces and user's The distance between face is all higher than or is equal to the 4th predetermined threshold, then retinue is not present in the side for being considered as user, executes Step S2550.
Above-mentioned steps S2513 passes through the detection to retinue's watching direction, it is ensured that is deposited really beside user In the retinue for accompanying user to use the software.In other words, it is ensured that the validity of the company of retinue.It is above-mentioned In step S2515 using the distance on both user and retinue head come further ensure that retinue company it is effective Property.
It will appreciated by the skilled person that flow chart shown in Fig. 3 is only the example of step S2510, and it is unrestricted. For example, step S2513, step S2515 wherein etc. is nonessential existing.In another example executing sequence between each step It may not necessarily centainly as shown in the figure.Specifically for example, step S2515 can be executed prior to step S2513.
Illustrate how whether detection retinue meets preset condition to become apparent from, Fig. 4 is shown according to the present invention one The flow chart of the above-mentioned steps S2530 of a embodiment.As shown in figure 4, step S2530 includes step S2531, step S2533 With step S2535.
Preset condition may include the first preset condition:There are the ages in retinue to be greater than or equal to the second predetermined threshold An at least retinue.In step S2531, judge that being greater than or equal to second with the presence or absence of the age in retinue makes a reservation for An at least retinue for threshold value.It is greater than or equal to the retinue of the second predetermined threshold if there is no the age, then judges Retinue does not meet preset condition, executes step S2550.It is greater than or equal to accompanying for the second predetermined threshold if there is the age Personnel then follow the steps S2533.
Wherein, the age of retinue is based on image recognition.The step of age based on image recognition retinue It can complete, can be completed in the device dedicated for control software access right in the electronic equipment for running the software, It can also complete in the server positioned at high in the clouds, not be defined herein.Optionally, detect retinue's in the picture Face and the age that retinue is estimated based on face.
Second predetermined threshold is more than the first predetermined threshold.General it is desired that the age of retinue than user age more It is larger, so that retinue plays the role of supervision and protection.
Second predetermined threshold may be greater than the arbitrary real number of the first predetermined threshold, and concrete numerical value can be according to practical need It is set.In a specific example, the second predetermined threshold is set equal to the minimum of the software, the age is used alone Some value (such as 16 years old or 18 years old).In another specific example, the second predetermined threshold is set equal to the user Age plus the age value obtained after predetermined value so that the age of retinue and the parent of teenage user are close, To ensure that minor is to use related software under the monitoring of parent as far as possible.The predetermined value can be greater than or equal to 20, such as 25 years old or 30 years old.
Preset condition may further include the second preset condition:The existing, age is greater than or equal to the second predetermined threshold At least one is live body in the retinue of value.Live body indicates real human body herein, and inhuman photo etc..In step S2533 In, judge to meet in the retinue of the first preset condition whether at least to there is a retinue be live body.If there is being The retinue of live body, thens follow the steps S2535.If there is no the retinue for being live body, S2550 is thened follow the steps.
By increasing the step S2533 of the In vivo detection, minor can be prevented by using photo, 3 dimension face moulds The retinue that disguises oneself as such as type achievees the purpose that defraud of software license limit.In step S2533, it may be used various feasible Technical solution to carry out In vivo detection to retinue, for example, the method that infrared In vivo detection may be used, can also use with Machine instruction retinue completes certain action (such as nod, shake the head, smile) and to the method that the action is detected, This is not defined.
Preset condition can further include third preset condition:It is predetermined that the existing, age is greater than or equal to second Similarity in the retinue of threshold value between at least one face and the face of user is greater than or equal to the predetermined threshold of third Value.In step S2535, judge to meet in the retinue of the first preset condition and the second preset condition whether at least have one Similarity between the face and the face of user of position retinue is greater than or equal to third predetermined threshold.If it is present Judgement retinue meets all preset conditions, executes step S2700.If it does not exist, then executing step S2550.
The numerical value of third predetermined threshold is the assessed value of children and parent's similarity, can be set according to actual conditions Fixed, illustratively, third predetermined threshold can be 50%.By this step S2535, it may further ensure that retinue is not The parent of adult user, to ensure that minor is to use related software under the monitoring of parent as far as possible.
It will appreciated by the skilled person that flow chart shown in Fig. 4 is only the example of step S2530, and it is unrestricted. For example, step S2531, step S2533 and step S2535 wherein etc. is nonessential existing, it can be by therein arbitrary One or two step judges whether retinue meets preset condition.In another example the execution sequence between each step can With necessarily not as shown in the figure.Specifically for example, step S2535 can be executed prior to step S2533.
According to a further aspect of the invention, a kind of device of control software access right is additionally provided.Fig. 5 is shown according to this Invent the schematic block diagram of the device 5000 of the control software access right of a specific embodiment.As shown in figure 5, device 5000 Including image capture module 5100, the first control module 5300, execution module 5500 and authorization module 5700.
Image capture module 5100 is used to acquire the image for the user for including software.Image capture module 5100 can be The cameras such as monochromatic camera, colour imagery shot.First control module 5300 is used for the age based on image recognition user, sentences Whether the age of disconnected user is greater than or equal to the first predetermined threshold, if it is not, then start execution module 5500, if it is, Start authorization module 5700.Optionally, the first control module 5300 can detect the face of user in the picture, be based on face Estimate the age of user.Execution module 5500 according to the first predetermined policy for deciding whether to make to user's Freeware Corresponding operating is executed with permission, and according to determination result.Authorization module 5700 is used for the access right to user's Freeware.
Provided herein in device 5000, the first control module 5300, execution module 5500 and authorization module 5700 can be with It is realized with various feasible softwares, hardware, firmware or combination thereof.Each module can have data processing energy by various The processing unit of power and/or instruction execution capability, computer or server are realized, such as central processing unit (CPU), figure Processing unit (GPU) etc..Communication between modules can be wire communication, can also be wireless communication.In an example In, the first control module 5300, execution module 5500 and authorization module 5700 are by same server (or personal computer) and fortune Row is realized in software therein (such as APP).In addition, the way of realization of the device 5000 can not only be independent electronics dress It sets, or with the common sparings such as the electronic equipment of runs software and/or associated server or the control device of whole hardware. Above-mentioned all the elements are not defined at this.
Fig. 6 shows the schematic block diagram of execution module 5500 accord to a specific embodiment of that present invention.Such as Fig. 6 institutes Show, execution module 5500 further comprises detection module 5510, the second control module 5530, refusal module 5550.Detection module 5510 on the side of user based on image detection for whether there is retinue, if it is, starting the second control module 5530, if it is not, then starting refusal module 5550.Second control module 5530 is for detecting whether retinue meets default item Part, if it is, starting authorization module 5700, if it is not, then starting refusal module 5550.Refuse module 5550 for refuse to The access right of user's Freeware.
Optionally, detection module 5510 according in the picture in addition to the face of user whether there is also other faces come Detection whether there is retinue on the side of user.The detection of detection module 5510 whether there is on the side of user accompanies Personnel can also be between the direction according to the electronic equipment in the watching direction and runs software of other existing faces Consistency, the i.e. consistency with the watching direction of user.In addition, detection module 5510 detects being next in user It is no there are retinues can also be according to the distance between other existing faces and the face of user and the 4th predetermined threshold Relationship between value.
Optionally, preset condition involved in the second control module 5530 includes:There are older in retinue In or equal to the second predetermined threshold an at least retinue, wherein the age of retinue is based on image recognition Two predetermined thresholds are more than the first predetermined threshold.Optionally, the second predetermined threshold adds predetermined value equal to the age of user, and And predetermined value is greater than or equal to 20.
Optionally, preset condition involved in the second control module 5530 further comprises:The existing, age is more than Or equal at least one in the retinue of the second predetermined threshold it is live body.
Optionally, preset condition involved in the second control module 5530 further comprises:The existing, age is more than Or be more than equal to the similarity in the retinue of the second predetermined threshold between at least one face and the face of user or Equal to third predetermined threshold.
The device of the control software access right of the embodiment of the present invention can also include other modules, such as memory etc., It is not defined herein.
Those of ordinary skill in the art are by reading above for the detailed description of the method for control software access right, energy Enough understand structure, realization and the advantage of the device of above-mentioned control software access right, therefore which is not described herein again.
Method and apparatus are not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect Shield the present invention claims the more features of feature than being expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific implementation mode are expressly incorporated in the specific implementation mode, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art are appreciated that in addition at least one in such feature and/or process or unit Except excluding each other, any combinations may be used in this specification (including adjoint claim, abstract and attached drawing) Disclosed all features and so disclosed any method or all processes or unit of device are combined.Unless in addition It is expressly recited, each feature can be by offer phase disclosed in this specification (including adjoint claim, abstract and attached drawing) The alternative features of same, equivalent or similar purpose replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization, or to run on one or more processors Software module realize, or realized with combination thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) realize the device of control software access right according to the ... of the embodiment of the present invention In some modules some or all functions.The present invention is also implemented as one for executing method as described herein Partly or completely program of device (for example, computer program and computer program product).Such journey for realizing the present invention Sequence can may be stored on the computer-readable medium, or can be with the form of one or more signal.Such signal can It is obtained with being downloaded from internet website, either provided on carrier signal or provided in any other forms.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference mark between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be by the same hardware branch To embody.The use of word first, second, and third does not indicate that any sequence.These words can be explained and be run after fame Claim.

Claims (11)

1. a kind of method of control software access right, including:
Step S1100:Acquisition includes the image of the user of software;
Step S1300:The age that the user is identified based on described image, judge the age of the user whether be more than or Equal to the first predetermined threshold, if not, S1500 is thened follow the steps, if so, thening follow the steps S1700;
Step S1500:Decide whether to open the access right of the software, and root according to the first predetermined policy to the user Corresponding operating is executed according to determination result;And
Step S1700:The access right of the software is opened to the user;
Wherein, the step S1500 further comprises:
Step S1510:According to whether there is also other faces and institutes in addition to the face of the user in described image Consistency detection between the watching direction of other existing faces and the direction of the electronic equipment of the operation software exists The side of the user whether there is retinue, if so, S1530 is thened follow the steps, if not, thening follow the steps S1550;
Step S1530:Detect whether the retinue meets preset condition, if so, S1700 is thened follow the steps, if not, Then follow the steps S1550;And
Step S1550:Refuse to open the access right of the software to the user.
2. the method for claim 1, wherein the preset condition includes:There are older in the retinue In or equal at least one of the second predetermined threshold, wherein the age of the retinue is identified based on described image, institute It states the second predetermined threshold and is more than first predetermined threshold.
3. method as claimed in claim 2, wherein the preset condition further comprises:The existing, age is more than or waits At least one is live body in the retinue of second predetermined threshold.
4. method as claimed in claim 2 or claim 3, wherein the preset condition further comprises:The existing, age is more than Or the face equal at least one in the retinue of second predetermined threshold and similar between the face of the user Degree is greater than or equal to third predetermined threshold.
5. method as claimed in claim 2 or claim 3, wherein the age that second predetermined threshold is equal to the user adds Predetermined value, and the predetermined value is greater than or equal to 20.
6. described to be detected described based on described image the method for claim 1, wherein in the step S1510 The side of user with the presence or absence of retinue also according between existing other faces and the face of the user away from From the relationship between the 4th predetermined threshold.
7. method as described in any one of claims 1 to 3, wherein described to be based on described image in the step S1300 Identify that the age of the user includes:The face of the user is detected in described image, and institute is estimated based on the face State the age of user.
8. a kind of device of control software access right, including image capture module, the first control module, execution module and mandate Module,
Described image acquisition module is used to acquire the image for the user for including software;
First control module is used to identify the age of the user based on described image, judges the age of the user Whether the first predetermined threshold is greater than or equal to, if it is not, then starting the execution module, if it is, starting the mandate mould Block;
The execution module is used to decide whether to open to the user according to the first predetermined policy the right to use of the software Limit, and corresponding operating is executed according to determination result;
The authorization module is used to open the access right of the software to the user;
Wherein, the execution module further comprises detection module, the second control module, refusal module:
The detection module is used for according to whether there is also other faces in addition to the face of the user in described image And the consistency between the direction of the electronic equipment in the watching direction and operation software of other existing faces Detection whether there is retinue on the side of the user, if it is, start second control module, if not, Then start the refusal module;
Second control module is for detecting whether the retinue meets preset condition, if it is, being awarded described in starting Module is weighed, if it is not, then starting the refusal module;And
The refusal module is used to refuse to open to the user access right of the software.
9. device as claimed in claim 8, wherein the preset condition includes:There are older in the retinue In or equal to the second predetermined threshold an at least retinue, wherein the age of the retinue be based on described image Identification, second predetermined threshold is more than first predetermined threshold.
10. device as claimed in claim 9, wherein the preset condition further comprises:The existing, age be more than or It is live body equal at least one in the retinue of second predetermined threshold.
11. the device as described in claim 9 or 10, wherein the preset condition further comprises:It is existing, older In or equal to phase in the retinue of second predetermined threshold between at least one face and the face of the user It is greater than or equal to third predetermined threshold like degree.
CN201510463074.3A 2015-07-31 2015-07-31 The method and apparatus of control software access right Active CN105138879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510463074.3A CN105138879B (en) 2015-07-31 2015-07-31 The method and apparatus of control software access right

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510463074.3A CN105138879B (en) 2015-07-31 2015-07-31 The method and apparatus of control software access right

Publications (2)

Publication Number Publication Date
CN105138879A CN105138879A (en) 2015-12-09
CN105138879B true CN105138879B (en) 2018-10-12

Family

ID=54724224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510463074.3A Active CN105138879B (en) 2015-07-31 2015-07-31 The method and apparatus of control software access right

Country Status (1)

Country Link
CN (1) CN105138879B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106200432A (en) * 2016-07-29 2016-12-07 深圳前海弘稼科技有限公司 Control method and device, intelligence plantation equipment for intelligence plantation equipment
CN106548045A (en) * 2016-09-26 2017-03-29 惠州Tcl移动通信有限公司 It is a kind of based on the application program method for down loading at age, system and electronic equipment
CN106686053A (en) * 2016-11-18 2017-05-17 广州粤亮信息科技有限公司 Mobile application remote monitoring method and system
CN106658179B (en) * 2016-12-30 2019-12-31 合一智能科技(深圳)有限公司 App control method and device based on smart television camera
CN106657153A (en) * 2017-02-07 2017-05-10 深圳市金立通信设备有限公司 Network data downloading method and terminal
CN108537017B (en) * 2018-01-05 2021-07-23 上海连尚网络科技有限公司 Method and equipment for managing game users
CN109491972B (en) * 2018-02-28 2021-12-10 浙江久道信息科技有限公司 Image-based computer log record rapid recovery system and method
CN108734002A (en) * 2018-05-16 2018-11-02 Oppo广东移动通信有限公司 Intelligent configuration method, device, storage medium and the mobile terminal of system resource
CN113225327A (en) * 2021-04-29 2021-08-06 心动网络股份有限公司 Login client supervision method, device, equipment and medium based on voice recognition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101770613A (en) * 2010-01-19 2010-07-07 北京智慧眼科技发展有限公司 Social insurance identity authentication method based on face recognition and living body detection
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN103327406A (en) * 2013-05-27 2013-09-25 中山大学 Digital television anti-addiction method and system based on android system
CN104008320A (en) * 2014-05-19 2014-08-27 惠州Tcl移动通信有限公司 Using permission and user mode control method and system based on face recognition

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8718633B2 (en) * 2011-07-13 2014-05-06 Qualcomm Incorporated Intelligent parental controls for wireless devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101770613A (en) * 2010-01-19 2010-07-07 北京智慧眼科技发展有限公司 Social insurance identity authentication method based on face recognition and living body detection
CN102214286A (en) * 2010-04-08 2011-10-12 鸿富锦精密工业(深圳)有限公司 Network content restricted browsing control system and method
CN103327406A (en) * 2013-05-27 2013-09-25 中山大学 Digital television anti-addiction method and system based on android system
CN104008320A (en) * 2014-05-19 2014-08-27 惠州Tcl移动通信有限公司 Using permission and user mode control method and system based on face recognition

Also Published As

Publication number Publication date
CN105138879A (en) 2015-12-09

Similar Documents

Publication Publication Date Title
CN105138879B (en) The method and apparatus of control software access right
CN105380575B (en) Control method, system, Cloud Server and the sweeping robot of sweeping robot
US10460164B2 (en) Information processing apparatus, information processing method, eyewear terminal, and authentication system
CN104808772B (en) Detection wear-type smart machine is persistently attached to the device and method on human body
CN103927250B (en) A kind of terminal user's attitude detecting method
EP3270354A1 (en) Living body detection device, living body detection method, and recording medium
US20130282609A1 (en) Image recognition for personal protective equipment compliance enforcement in work areas
US10394019B2 (en) Determining eye openness with an eye tracking device
EP2570965A2 (en) Detection device, display control device and imaging control device, provided with the detection device, body detection method, control program, and recording medium
EP3153976A1 (en) Information processing device, photographing device, image sharing system, information processing method, and program
CN106464844A (en) Systems and methods for configuring baby monitor cameras to provide uniform data sets for analysis
JP6864847B2 (en) Management equipment, management system and management method
CN107209857A (en) User terminal and its offer method
CN105574467A (en) Method for protecting privacy of camera video via human identity recognition
CN106445092A (en) Vision protection processing method and apparatus for terminal
CN107077598A (en) Video with secret protection is caught
CN108781277A (en) Monitoring system, image processing equipment, image processing method and program recorded medium
CN115599219B (en) Eye protection control method, system and equipment for display screen and storage medium
CN107590953B (en) Alarm method and system of intelligent wearable device and terminal device
Balzarini et al. Computer animations of color markings reveal the function of visual threat signals in Neolamprologus pulcher
CN104808775B (en) Judge the device and method of head-wearing type intelligent device authentication effectiveness of information
CN109509330A (en) A kind of cell swimming pool intelligent monitor system
CN111666920A (en) Target object wearing detection method and device, storage medium and electronic device
KR101454644B1 (en) Loitering Detection Using a Pedestrian Tracker
JP2010134910A (en) Pet image detection system and method of controlling operation of the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100080 room 1001-011, building 3, Haidian street, Beijing, Haidian District, 1

Applicant after: MEGVII INC.

Applicant after: Beijing maigewei Technology Co., Ltd.

Address before: 100080 room 1001-011, building 3, Haidian street, Beijing, Haidian District, 1

Applicant before: MEGVII INC.

Applicant before: Beijing aperture Science and Technology Ltd.

GR01 Patent grant
GR01 Patent grant