CN105335642A - Processing method and processing system of pictures - Google Patents

Processing method and processing system of pictures Download PDF

Info

Publication number
CN105335642A
CN105335642A CN201510717913.XA CN201510717913A CN105335642A CN 105335642 A CN105335642 A CN 105335642A CN 201510717913 A CN201510717913 A CN 201510717913A CN 105335642 A CN105335642 A CN 105335642A
Authority
CN
China
Prior art keywords
picture
photo
encryption
portrait
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510717913.XA
Other languages
Chinese (zh)
Other versions
CN105335642B (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510717913.XA priority Critical patent/CN105335642B/en
Publication of CN105335642A publication Critical patent/CN105335642A/en
Application granted granted Critical
Publication of CN105335642B publication Critical patent/CN105335642B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a processing method and a processing system of pictures. The processing method comprises the steps of opening a picture library storing the pictures, wherein the pictures comprise common photos and encrypted photos; collecting biological characteristic information of a current user; judging whether the current user is a manager or not according to the biological characteristic information of the current user; if the current user is the manager, opening the picture library, and displaying the common pictures and the encrypted photos; if the current user is not the manager, entering a permission interface of a tourist, and receiving a password input by the tourist; obtaining a corresponding empowerment list of the password according to the password, and displaying the pictures in the picture library according to the empowerment list, wherein the pictures comprise common pictures and/or encrypted pictures. According to the processing method and the processing system, through judging the biological characteristic information of the current user or the input password, the same picture library can display different picture contents, the advantages of classification display, high pertinence and limited authorization are realized and the demand of simultaneous sharing and secrecy can be met.

Description

The disposal route of picture and disposal system
Technical field
The invention belongs to the storage security field of computing machine, particularly relate to a kind of disposal route and disposal system of picture.
Background technology
Popularizing of intelligent terminal, the life for user brings great convenience and enjoyment, such as, can take pictures anywhere or anytime or record a video, to record or to share the fine moment.
But in today that individual privacy receives publicity day by day, the improper process of the pictures such as the map file of comparison film or download, then may bring great puzzlement for user.
At present, to the method for the confidential treatment of picture, mainly by carrying out whole encryptions to management software to the picture library of picture, as by application programs such as mobile phone house keepers, picture library is encrypted.But there is following defect in current method:
(1) by encipheror, whole picture is encrypted, not specific aim;
(2) share and maintain secrecy between cannot balance, that is, user can not restrictively authorize; And
(3) if do not select hiding photo, then once mobile phone holder wants decryption, there is target, cracked usually just matter of time.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of disposal route and disposal system of picture, can solve that photo in prior art is unfiled, photo hide and display without specific aim and share and secret between the technical matters that cannot balance.
For solving the problems of the technologies described above, embodiments providing a kind of disposal route of picture, comprising:
Open the picture library of picture, described picture comprises common photo and encryption photo;
Gather the biological information of active user;
Judge whether it is managerial personnel according to the biological information of described active user;
If managerial personnel, then open picture library, and show described common photo and encryption photo;
If not managerial personnel, then enter the authority interface of visitor, and receive the password of described visitor input; And
Obtain the tax power list of its correspondence according to described password, and show the picture in described picture library according to the list of described tax power, comprising: normal picture and/or encryption picture.
For solving the problems of the technologies described above, embodiments providing a kind of disposal system of picture, comprising:
Picture library, for picture, described picture comprises common photo and encryption photo;
Acquisition module, for gathering the biological information of active user;
Feature judge module, for judging whether it is managerial personnel according to the biological information of described active user;
Display module, for when active user is managerial personnel, opens picture library and shows described common photo and encryption photo;
Authority module, for when active user is not managerial personnel, enters the authority interface of visitor, and receives the password of described visitor input; And
Described display module, also for obtaining the tax power list of its correspondence according to described password, and shows the picture in described picture library, comprising: normal picture and/or encryption picture according to the list of described tax power.
Relative to prior art, the disposal route of picture provided by the invention and disposal system, by the judgement to the biological information of active user or input password, to file, different image contents is presented to identical picture library, there is classification display, with strong points and can the advantage of limited discretion, the demand shared and maintain secrecy can be met simultaneously.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the disposal route of the picture that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the disposal route of the picture that the embodiment of the present invention two provides;
Fig. 3 is the judgement schematic flow sheet for privacy picture that the embodiment of the present invention two provides;
Fig. 4 is the module diagram of the disposal system of the picture that the embodiment of the present invention three provides;
Fig. 5 is the module diagram of the disposal system of the picture that the embodiment of the present invention four provides.
Embodiment
What please refer in accompanying drawing is graphic, and wherein identical element numbers represents identical assembly, and principle of the present invention implements to illustrate in a suitable computing ring mirror.The following description is based on exemplified specific embodiments of the invention, and it should not be regarded as limiting the present invention not at other specific embodiment that this describes in detail.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, and those skilled in the art can recognize that the plurality of step of the following stated and operation also may be implemented in the middle of hardware.
The disposal route of picture of the present invention provided by the invention and disposal system, can be applicable to, in the terminal device such as smart mobile phone, digital camera, not enumerate one by one herein.
Embodiment one
Refer to Fig. 1, be depicted as the schematic flow sheet of the disposal route of the picture that the embodiment of the present invention provides.
The disposal route of described picture, is applied in terminal device, the treating method comprises:
In step S101, open the picture library of picture, described picture comprises common photo and encryption photo.
Be understandable that, described encryption photo refer to privacy photo encryption formed, the password of encryption adopts the biological information of managerial personnel usually, and described biological information comprises iris information, face information, finger print information, palmprint information and/or audio-frequency information.That is, support managerial personnel at hand held terminal equipment, can deciphering be completed towards during described terminal device or between speaking, not only convenient but also quick.
In step s 102, the biological information of active user is gathered.
Specifically, the realization of described collection, normally carries out while user uses described terminal device, convenient again fast, and the step of described collection comprises the combination of any one or more as follows:
(1) by iris information, the face information of camera collection user;
(2) gathered finger print information, the palmprint information of user by touch point, be such as arranged on the major key of mobile phone or the tripper of camera; And/or
(3) audio-frequency information of user is gathered by microphone.
Wherein, for iris information, the step of the described iris information by camera collection user, specifically comprises:
(1.1) eye image of user is gathered;
(1.2) Iris Location and normalized are carried out to described eye image, to generate iris image;
(1.3) from described iris image, iris feature point is extracted; And
(1.4) described iris feature point is encoded, to generate iris information.
In step s 103, judge whether it is managerial personnel according to the biological information of described active user.
Wherein, if managerial personnel, then perform step S104, if not managerial personnel, then perform step S105.
Specifically, described judgement comprises:
(1) preset the cryptographic libraries of managerial personnel, described cryptographic libraries comprises the various biological informations of described managerial personnel, and described biological information comprises iris information, face information, finger print information, palmprint information and/or audio-frequency information;
(2) contrast the biological information in the biological nature information of described active user and described cryptographic libraries, and generate matching degree;
(3) judge whether described matching degree is greater than preset matching threshold value;
(4) when being greater than described preset matching threshold value, be judged as managerial personnel, wherein said managerial personnel are generally the owner of terminal device; Or
(5) when being not more than described preset matching threshold value, be judged as visitor, wherein said visitor is relative with managerial personnel, specifically comprises: authorized visitor, namely knows the cipher; Without the visitor authorized, namely do not know the cipher.
In addition, this step it is also understood that into, being be decrypted the encryption photo in step S101, if successful decryption, is then managerial personnel, if decipher unsuccessfully, is not then managerial personnel, but visitor.
In step S104, when active user is managerial personnel, open picture library, and show described common photo and encryption photo.
In step S105, when active user is not managerial personnel, enter the authority interface of visitor, and receive the password of described visitor input.
Be understandable that, described password comprises: the biological characteristic of designated user and/or clear-text passwords.
In step s 106, obtain the tax power list of its correspondence according to described password, and show the picture in described picture library according to the list of described tax power, comprising: normal picture and/or encryption picture.
As shown in the tax power list of table 1, when inputting password 0001, whole photo can be checked, comprising common photo and encryption photo; When inputting password 0002, can common photo be checked, but the authority photo of encryption can not be checked; When inputting password 0003, encryption photo can be checked, but can not common photo be checked.
Power list composed by table 1
Password The authority of common photo The authority of encryption photo
0001 Be Be
0002 Be No
0003 No Be
The disposal route of picture provided by the invention, by the judgement to the biological information of active user or input password, to file, different image contents is presented to identical picture library, there is classification display, with strong points and can the advantage of limited discretion, the demand shared and maintain secrecy can be met simultaneously.
Embodiment two
Refer to Fig. 2, be depicted as the schematic flow sheet of the disposal route of the picture that the embodiment of the present invention provides.Wherein, the label that step identical in Fig. 2 and Fig. 1 still adopts S1 to start, the step different from Fig. 1 carries out label, to show differentiation with S2 beginning.
The disposal route of described picture, is applied in terminal device, the treating method comprises:
In step s 201, the picture in picture library is classified, the picture in picture library is classified according to level of security, form normal picture and privacy picture.
Refer to Fig. 3, be depicted as the judgement schematic flow sheet of privacy picture.Described picture in picture library to be classified according to level of security in order to illustrate, forms the concrete steps of normal picture and privacy picture, comprising:
In step S301, obtain the content of photo current.
In step s 302, judge whether photo current belongs to word class picture.
Wherein, if word class picture, then perform step S303, if not word class picture then performs step S306.
In step S303, judge whether comprise predetermined keyword in word.
Wherein, if comprise described predetermined keyword, then perform step S304, if do not comprise described predetermined keyword, then perform step S305.
Be understandable that, described predetermined keyword, as secret, top-secret, secret or contract etc.
In step s 304, the level of security of photo current is set to height, and is categorized into privacy picture.
In step S305, the level of security of photo current is set to low, and is categorized into normal picture.
In step S306, continue to judge whether described photo current belongs to portrait class picture.
Be understandable that, can by arranging face or the ratio of health in picture judges whether to belong to portrait class picture.Such as, when the ratio of the health of people exceedes 25% of picture, be judged as portrait class picture.
In step S307, the bare ratio of portrait in statistics picture.
In step S308, judge whether described bare ratio exceedes default bare threshold value.
Wherein, if described bare ratio exceedes default bare threshold value, then perform step S304; If described bare ratio is no more than default bare threshold value, then perform step S309.
In step S309, continue to judge whether described portrait mates with the encryption portrait preset.
Wherein, if coupling, then perform step S304, if do not mate, then perform step S305.
Be understandable that, for step S304, when described picture belongs to word class picture and comprises predetermined keyword in word, described picture belong to portrait class picture and portrait with preset encryption portrait mate time and described picture belong to portrait class picture and wherein the bare ratio of portrait exceedes default bare threshold value time, execution step S304.
For step S305, when described picture belongs to word class picture and does not comprise predetermined keyword in word, described picture belong to portrait class picture and portrait with preset encryption portrait do not mate time and described picture belong to portrait class picture and wherein the bare ratio of portrait is no more than default bare threshold value time, perform step S305.
In step S202, be encrypted to form encryption picture to described privacy picture by the biological information of management.
Be understandable that, described encryption photo refer to privacy photo encryption formed, the password of encryption adopts the biological information of managerial personnel usually, and described biological information comprises iris information, face information, finger print information, palmprint information and/or audio-frequency information.That is, support managerial personnel at hand held terminal equipment, can deciphering be completed towards during described terminal device or between speaking, not only convenient but also quick.
In step S101, open the picture library of picture, described picture comprises common photo and encryption photo.
In step s 102, the biological information of active user is gathered.
Described biological information, comprising: the iris information of user, face information, finger print information, palmprint information and/or audio-frequency information.
In step s 103, judge whether it is managerial personnel according to the biological information of described active user.
Wherein, if managerial personnel then perform step S104, if not managerial personnel then perform step S105.
Be understandable that, described managerial personnel are generally the owner of terminal device; Described visitor is relative with managerial personnel, comprising: authorized visitor, namely knows the cipher; Without the visitor authorized, namely do not know the cipher.
In addition, this step it is also understood that into, be decrypted encryption photo, if successful decryption, being then managerial personnel, if decipher unsuccessfully, is not then managerial personnel, but visitor.
In step S104, when active user is managerial personnel, open picture library, and show described common photo and encryption photo.
In step S105, when active user is not managerial personnel, enter the authority interface of visitor, and receive the password of described visitor input.
Be understandable that, described password comprises: the biological characteristic of designated user and/or clear-text passwords.
In step S203, judge that whether described password is correct.
Wherein, if password is correct, then perform step S106, if password bad, then perform step S204.
In step s 106, obtain the tax power list of its correspondence according to described password, and show the picture in described picture library according to the list of described tax power, comprising: normal picture and/or encryption picture.
In step S204, delete the encryption photo in described picture library.
The step of described deletion specifically comprises:
(1) errors number of the password inputted is added up;
(2) contrast described errors number and whether exceed default danger threshold; And
(3) when errors number exceedes default danger threshold, the encryption photo in described picture library is deleted.
Be understandable that, if the target of active user has been confirmed to be a certain picture library, then crack according to decoding software, usually just matter of time is successfully cracked, so by presetting a danger threshold, when exceeding danger threshold, directly damage operation is carried out, to ensure the safety of privacy to encryption photo.
The disposal route of picture provided by the invention, by the judgement to the biological information of active user or input password, to file, different image contents is presented to identical picture library, there is classification display, with strong points and can the advantage of limited discretion, the demand shared and maintain secrecy can be met simultaneously.
Embodiment three
Refer to Fig. 4, be depicted as the module diagram of the disposal system of the picture that the embodiment of the present invention provides.
The disposal system 400 of described picture, is applied in terminal device, and described disposal system 400 comprises: picture library 41, acquisition module 42, feature judge module 43, authority module 44 and display module 45.
Picture library 41, for picture, described picture comprises common photo and encryption photo.
Be understandable that, described encryption photo refer to privacy photo encryption formed, the password of encryption adopts the biological information of managerial personnel usually, and described biological information comprises iris information, face information, finger print information, palmprint information and/or audio-frequency information.That is, support managerial personnel at hand held terminal equipment, can deciphering be completed towards during described terminal device or between speaking, not only convenient but also quick.
Acquisition module 42, for gathering the biological information of active user.
Specifically, the realization of described acquisition function, normally carry out while user uses described terminal device, convenient again fast, described acquisition module comprises the combination of any one or more as follows: shooting submodule 421, touch-control submodule 422 and/or audio frequency submodule 423.
Wherein, described shooting submodule 421, gathers iris information, the face information of user for head.Described touch-control submodule 422, for gathering finger print information, the palmprint information of user, is such as arranged on the major key of mobile phone or the tripper of camera.Described audio frequency submodule 423, for gathering the audio-frequency information of user.
Again for the collection of submodule 421 pairs of iris information of making a video recording, specifically comprise: the eye image gathering user; Iris Location and normalized are carried out to described eye image, to generate iris image; Iris feature point is extracted from described iris image; Described iris feature point is encoded, to generate iris information.
Feature judge module 43, is connected to described acquisition module 42, for judging whether it is managerial personnel according to the biological information of described active user.
Wherein, described feature judge module 43 comprises: cryptographic libraries 431, matched sub-block 432, judge submodule 433 and the module 434 that bears fruit.
Specifically, described cryptographic libraries 431, for preserving the various biological informations of managerial personnel, described biological information comprises iris information, face information, finger print information, palmprint information and/or audio-frequency information.Described matched sub-block 432, for contrasting the biological information in the biological nature information of described active user and described cryptographic libraries, and generates matching degree.Described judgement submodule 433, for judging whether described matching degree is greater than preset matching threshold value.The described module 434 that bears fruit, for when being greater than described preset matching threshold value, is judged as managerial personnel; And when being not more than described preset matching threshold value, be judged as visitor.
Wherein, described managerial personnel are generally the owner of terminal device, and described visitor is relative with managerial personnel, specifically comprises: authorized visitor, namely knows the cipher; Without the visitor authorized, namely do not know the cipher.
In addition, described feature judge module 43 it is also understood that into, being be decrypted the encryption photo in picture library, if successful decryption, is then managerial personnel, if decipher unsuccessfully, is not then managerial personnel, but visitor.
Authority module 44, is connected to described feature judge module 43, for when active user is not managerial personnel, enters the authority interface of visitor, and receives the password of described visitor input.
Be understandable that, described password comprises: the biological characteristic of designated user and/or clear-text passwords.
Display module 45, is connected to described feature judge module 43, for when active user is managerial personnel, opens picture library, and shows described common photo and encryption photo; Also be connected to described authority module 44, for when active user is visitor, obtain the tax power list of its correspondence according to described password, and show the picture in described picture library according to the list of described tax power, comprising: normal picture and/or encryption picture.
Such as, compose power: first password, 0001, whole photo can be checked corresponding to authority, comprise common photo and encryption photo; Second password, when 0002, can check common photo corresponding to authority, but can not check the authority photo of encryption; 3rd password, 0003, encryption photo can be checked corresponding to authority, but can not common photo be checked.
The disposal system of picture provided by the invention, by the judgement to the biological information of active user or input password, to file, different image contents is presented to identical picture library, there is classification display, with strong points and can the advantage of limited discretion, the demand shared and maintain secrecy can be met simultaneously.
Embodiment four
Refer to Fig. 5, be depicted as the module diagram of the disposal system of the picture that the embodiment of the present invention provides.Wherein, module identical in Fig. 5 and Fig. 4 still adopts the label of 4 beginnings, and the module different from Fig. 4 carries out label, to show differentiation with 5 beginnings.
The disposal system 500 of described picture, is applied in terminal device, and described disposal system comprises: sort module 51, encrypting module 52, picture library 41, acquisition module 42, feature judge module 43, authority module 44 and display module 45.
Sort module 51, is connected to picture library 41, for classifying to the picture in picture library, classifies according to level of security to the picture in picture library, forms normal picture and privacy picture.
Wherein, described sort module 51, comprising: script classify submodule 511 and portrait classification submodule 512, for filtering out privacy picture from described picture library, and it is low that remaining picture is set to level of security, and be classified to normal picture.
Wherein, described script classify submodule 511, for belonging to word class picture when photo current, and when comprising predetermined keyword, is set to height by the level of security of photo current, and is categorized into privacy picture.
Described portrait classification submodule 512, for whether belonging to portrait class picture when photo current, and when the bare ratio of portrait exceedes default exposed threshold value in picture, is set to height by the level of security of photo current, and is categorized into privacy picture; And when whether photo current belongs to portrait class picture, and when whether described portrait mates with the encryption portrait preset, the level of security of photo current is set to height, and is categorized into privacy picture.
Encrypting module 52, is connected to described sort module 51, for being encrypted to form encryption picture to described privacy picture by the biological information of management.
Picture library 41, is connected to described sort module 51 and encrypting module 52, and for picture, described picture comprises common photo and encryption photo.
Acquisition module 42, for gathering the biological information of active user.
Feature judge module 43, is connected to described acquisition module 42, for judging whether it is managerial personnel according to the biological information of described active user.
In addition, described feature judge module 43 it is also understood that as deciphering module, is to be decrypted the encryption photo in picture library, if successful decryption, is then managerial personnel, if decipher unsuccessfully, is not then managerial personnel, but visitor.
Display module 45, is connected to described feature judge module 43, for when active user is managerial personnel, opens picture library, and shows described common photo and encryption photo.
Authority module 44, is connected to described feature judge module 43, for when active user is not managerial personnel, enters the authority interface of visitor, and receives the password of described visitor input.
Be understandable that, described password comprises: the biological characteristic of designated user and/or clear-text passwords.
Password judge module 53, is connected to described authority module 44, for judging that whether described password is correct.
Wherein, if password is correct, then perform step S106, if password bad, then perform step S204.
Display module 45, is also connected to described password judge module 53, for obtaining the tax power list of its correspondence according to described password when password is correct, and shows the picture in described picture library according to the list of described tax power, comprising: normal picture and/or encryption picture.
Statistical module 54, is connected to described password judge module 53, for adding up the errors number of inputted password.
Contrast module 55, being connected to described statistical module 54, whether exceeding default danger threshold for contrasting described errors number.
Removing module 56, is connected to described contrast module 55 and picture library 41, for when errors number exceedes default danger threshold, deletes the encryption photo in described picture library.
The disposal system of picture provided by the invention, by the judgement to the biological information of active user or input password, to file, different image contents is presented to identical picture library, there is classification display, with strong points and can the advantage of limited discretion, the demand shared and maintain secrecy can be met simultaneously.
The disposal route of the picture that the embodiment of the present invention provides and disposal system belong to same design, and its specific implementation process refers to instructions in full, repeats no more herein.
In sum; although the present invention discloses as above with preferred embodiment; but above preferred embodiment is also not used to limit the present invention; those of ordinary skill in the art; without departing from the spirit and scope of the present invention; all can do various change and retouching, the scope that therefore protection scope of the present invention defines with claim is as the criterion.

Claims (12)

1. a disposal route for picture, is characterized in that, comprising:
Open the picture library of picture, described picture comprises common photo and encryption photo;
Gather the biological information of active user;
Judge whether it is managerial personnel according to the biological information of described active user;
If managerial personnel, then open picture library, and show described common photo and encryption photo;
If not managerial personnel, then enter the authority interface of visitor, and receive the password of described visitor input; And
Obtain the tax power list of its correspondence according to described password, and show the picture in described picture library according to the list of described tax power, comprising: normal picture and/or encryption picture.
2. disposal route as claimed in claim 1, is characterized in that, described in open the picture library of picture, also comprise before:
Picture in described picture library is classified according to level of security, forms normal picture and privacy picture; And
Be encrypted to form encryption picture to described privacy picture by the biological information of managerial personnel.
3. disposal route as claimed in claim 2, is characterized in that, describedly classifies according to level of security to the picture in described picture library, forms normal picture and privacy picture, specifically comprises:
Judge whether photo current belongs to word class picture;
If word class picture, then judge whether comprise predetermined keyword in word; And
When comprising predetermined keyword, the level of security of photo current is set to height, and is categorized into privacy picture.
4. disposal route as claimed in claim 2, is characterized in that, describedly classifies according to level of security to the picture in described picture library, forms normal picture and privacy picture, specifically comprises:
Judge whether photo current belongs to portrait class picture;
If portrait class picture, then judge the bare ratio of portrait in picture; And
When bare ratio exceedes default exposed threshold value, the level of security of photo current is set to height, and is categorized into privacy picture.
5. disposal route as claimed in claim 2, is characterized in that, describedly classifies according to level of security to the picture in described picture library, forms normal picture and privacy picture, specifically comprises:
Judge whether photo current belongs to portrait class picture;
If portrait class picture, then judge whether described portrait mates with the encryption portrait preset; And
If coupling, is set to height by the level of security of photo current, and is categorized into privacy picture.
6. disposal route as claimed in claim 1, is characterized in that, described if not managerial personnel, then enter the authority interface of visitor, and receives the password of described visitor input, also comprises afterwards:
Add up the errors number of the password inputted;
Contrast described errors number and whether exceed default danger threshold; And
When errors number exceedes default danger threshold, delete the encryption photo in described picture library.
7. a disposal system for picture, is characterized in that, comprising:
Picture library, for picture, described picture comprises common photo and encryption photo;
Acquisition module, for gathering the biological information of active user;
Feature judge module, for judging whether it is managerial personnel according to the biological information of described active user;
Display module, for when active user is managerial personnel, opens picture library and shows described common photo and encryption photo;
Authority module, for when active user is not managerial personnel, enters the authority interface of visitor, and receives the password of described visitor input; And
Described display module, also for obtaining the tax power list of its correspondence according to described password, and shows the picture in described picture library, comprising: normal picture and/or encryption picture according to the list of described tax power.
8. disposal route as claimed in claim 7, is characterized in that, also comprise:
Sort module, for classifying according to level of security to the picture in described picture library, forms normal picture and privacy picture; And
Encrypting module, is encrypted to form encryption picture to described privacy picture for the biological information by managerial personnel.
9. disposal system as claimed in claim 8, it is characterized in that, described sort module, specifically comprises:
Script classify submodule, for belonging to word class picture when photo current, and when comprising predetermined keyword, is set to height by the level of security of photo current, and is categorized into privacy picture.
10. disposal system as claimed in claim 8, it is characterized in that, described sort module also comprises:
Portrait classification submodule, for whether belonging to portrait class picture when photo current, and when the bare ratio of portrait exceedes default exposed threshold value in picture, is set to height by the level of security of photo current, and is categorized into privacy picture.
11. disposal systems as claimed in claim 10, is characterized in that, described portrait classification submodule, also for whether belonging to portrait class picture when photo current, and whether described portrait is when mating with the encryption portrait preset, the level of security of photo current is set to height, and is categorized into privacy picture.
12. disposal systems as claimed in claim 7, is characterized in that, also comprise:
Statistical module, for adding up the errors number of inputted password;
Whether contrast module, exceed default danger threshold for contrasting described errors number; And
Removing module, for when errors number exceedes default danger threshold, deletes the encryption photo in described picture library.
CN201510717913.XA 2015-10-28 2015-10-28 The processing method and processing system of picture Expired - Fee Related CN105335642B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510717913.XA CN105335642B (en) 2015-10-28 2015-10-28 The processing method and processing system of picture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510717913.XA CN105335642B (en) 2015-10-28 2015-10-28 The processing method and processing system of picture

Publications (2)

Publication Number Publication Date
CN105335642A true CN105335642A (en) 2016-02-17
CN105335642B CN105335642B (en) 2018-02-16

Family

ID=55286162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510717913.XA Expired - Fee Related CN105335642B (en) 2015-10-28 2015-10-28 The processing method and processing system of picture

Country Status (1)

Country Link
CN (1) CN105335642B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991A (en) * 2016-06-24 2016-11-16 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN106293394A (en) * 2016-07-29 2017-01-04 广州华多网络科技有限公司 A kind of method that picture is shared and electronic equipment
CN106709367A (en) * 2016-12-12 2017-05-24 上海斐讯数据通信技术有限公司 Mobile terminal-oriented device and method for limiting sliding browsing of pictures
CN108647528A (en) * 2018-04-25 2018-10-12 上海与德科技有限公司 A kind of photo processing method, device, terminal and storage medium
CN109885707A (en) * 2019-02-01 2019-06-14 北京字节跳动网络技术有限公司 The method for refreshing of picture, device, terminal device and storage medium in picture library
WO2019196296A1 (en) * 2018-04-09 2019-10-17 平安科技(深圳)有限公司 Image control and camera application photography control method and apparatus, and electronic device
CN111241508A (en) * 2019-12-31 2020-06-05 航天信息股份有限公司 Method and device for generating picture library authorization code and method and device for using picture library authorization code
CN112653713A (en) * 2021-01-22 2021-04-13 深圳市房多多网络科技有限公司 Image downloading protection method and device and computing equipment
CN112804445A (en) * 2020-12-30 2021-05-14 维沃移动通信有限公司 Display method and device and electronic equipment
CN113838547A (en) * 2021-09-28 2021-12-24 湖南康凯信息技术有限公司 Intelligent medical service management system based on intelligent terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104077517A (en) * 2014-06-30 2014-10-01 惠州Tcl移动通信有限公司 Mobile terminal user mode start method and system based on iris identification
CN104463017A (en) * 2014-12-22 2015-03-25 联想(北京)有限公司 Information processing method and electronic device
US20150095803A1 (en) * 2013-09-30 2015-04-02 Hon Hai Precision Industry Co., Ltd. Social network capable of recommending friends and friend recommendation method
CN104933342A (en) * 2015-06-18 2015-09-23 广东欧珀移动通信有限公司 Picture viewing method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150095803A1 (en) * 2013-09-30 2015-04-02 Hon Hai Precision Industry Co., Ltd. Social network capable of recommending friends and friend recommendation method
CN104077517A (en) * 2014-06-30 2014-10-01 惠州Tcl移动通信有限公司 Mobile terminal user mode start method and system based on iris identification
CN104463017A (en) * 2014-12-22 2015-03-25 联想(北京)有限公司 Information processing method and electronic device
CN104933342A (en) * 2015-06-18 2015-09-23 广东欧珀移动通信有限公司 Picture viewing method and mobile terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991A (en) * 2016-06-24 2016-11-16 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN106126991B (en) * 2016-06-24 2019-06-28 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN106293394B (en) * 2016-07-29 2019-07-12 广州华多网络科技有限公司 A kind of method and electronic equipment of picture sharing
CN106293394A (en) * 2016-07-29 2017-01-04 广州华多网络科技有限公司 A kind of method that picture is shared and electronic equipment
CN106709367A (en) * 2016-12-12 2017-05-24 上海斐讯数据通信技术有限公司 Mobile terminal-oriented device and method for limiting sliding browsing of pictures
WO2019196296A1 (en) * 2018-04-09 2019-10-17 平安科技(深圳)有限公司 Image control and camera application photography control method and apparatus, and electronic device
CN108647528A (en) * 2018-04-25 2018-10-12 上海与德科技有限公司 A kind of photo processing method, device, terminal and storage medium
CN109885707A (en) * 2019-02-01 2019-06-14 北京字节跳动网络技术有限公司 The method for refreshing of picture, device, terminal device and storage medium in picture library
CN111241508A (en) * 2019-12-31 2020-06-05 航天信息股份有限公司 Method and device for generating picture library authorization code and method and device for using picture library authorization code
CN112804445A (en) * 2020-12-30 2021-05-14 维沃移动通信有限公司 Display method and device and electronic equipment
CN112804445B (en) * 2020-12-30 2022-08-26 维沃移动通信有限公司 Display method and device and electronic equipment
CN112653713A (en) * 2021-01-22 2021-04-13 深圳市房多多网络科技有限公司 Image downloading protection method and device and computing equipment
CN113838547A (en) * 2021-09-28 2021-12-24 湖南康凯信息技术有限公司 Intelligent medical service management system based on intelligent terminal

Also Published As

Publication number Publication date
CN105335642B (en) 2018-02-16

Similar Documents

Publication Publication Date Title
CN105335642A (en) Processing method and processing system of pictures
US10284885B1 (en) Method and apparatus for redacting video for compression and identification of releasing party
CN105260669B (en) The transmission method and Transmission system of photo
CN105354509A (en) Picture processing method and processing system
CN104573551A (en) File processing method and mobile terminal
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN103020504A (en) Image management system and image management method based on fingerprint identification
CN104331667A (en) Data storing method and system based on dual system
CN102867157A (en) Mobile terminal and data protecting method
CN102495983A (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN101957894B (en) Conditional e-file authority controlling and managing system and method
CN107330848A (en) Image processing method, mobile terminal and storage device
CN105323355A (en) Android privacy protection system based on palm print recognition
CN105208045A (en) Identity authentication method, equipment and system
CN105335665B (en) Encryption method, encryption system, decryption method and the decryption system of photo
CN105095787A (en) Information processing method and device
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN105279443A (en) Picture encrypting and decrypting methods and devices
CN105303085A (en) File sharing method and sharing system
CN104732166A (en) Data storing and reading method and device and equipment
CN115114667A (en) Privacy information processing and classifying method and device for security chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180216

CF01 Termination of patent right due to non-payment of annual fee