CN105354510A - Photo naming method and naming system - Google Patents

Photo naming method and naming system Download PDF

Info

Publication number
CN105354510A
CN105354510A CN201510727222.8A CN201510727222A CN105354510A CN 105354510 A CN105354510 A CN 105354510A CN 201510727222 A CN201510727222 A CN 201510727222A CN 105354510 A CN105354510 A CN 105354510A
Authority
CN
China
Prior art keywords
photo
security
level
naming
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510727222.8A
Other languages
Chinese (zh)
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510727222.8A priority Critical patent/CN105354510A/en
Publication of CN105354510A publication Critical patent/CN105354510A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Studio Devices (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a photo naming method and a photo naming system. The photo naming method comprises: setting security levels for a plurality of photos respectively; according to the security levels, classifying the plurality of photos to form a first category of photos and a second category of photos; storing the first category of photos into a first folder, and performing consecutive naming according to a first preset rule; and storing the second category of photos into a second folder, and performing consecutive naming according to a second preset rule. According to the photo naming method and the photo naming system which are provided by the invention, the photos at dierent security levels are named respectively by multiple sets of preset rules, so that leakage caused by the consecutive naming of the photos is avoided; the naming method and naming system have the advantage of strong pertinence; and security vulnerabilities caused by an original naming rule are filled up.

Description

The naming method of photo and naming system
Technical field
The invention belongs to storage and the security fields of computing machine, particularly relate to a kind of naming method and naming system of photo.
Background technology
Popularizing of intelligent terminal, the life for user brings great enjoyment, such as, can take pictures anywhere or anytime or record a video, to record or to share the fine moment.But in today that individual privacy receives publicity day by day, the improper process of the file such as photo or video, then may bring great puzzlement for user.
At present, the naming method of photo, mainly comprises following mode or its combination: name with the pixel of photo, e.g., and 1080*14400001; Name with the size of photo, e.g., 300KB0002; Name with the shooting address of photo, e.g., Shenzhen City, Guangdong Province Nanshan District 0003; Name with the shooting time of photo, e.g., 201510010004; To take equipment name, e.g., iPhone60005; To take the systematic naming method of equipment, as DSC_0006.JPG; Name, as iphone61080*1440300KB0007 with above-mentioned combination in any.
When there is privacy photo in the file storing above-mentioned photo, the conventional relative strategy of user comprises:
(1) by the application program of encryption class, as mobile phone house keeper, the file of whole photo or storage space are encrypted;
(2) select privacy photo one by one, and described privacy photo is removed or separately deposits to encryption folder.
But, by encipheror, whole photo is encrypted, not specific aim.And described privacy photo is removed or separately deposits to encryption folder, then that remaining common photo can be caused to name is discontinuous, and the holder still existing for mobile phone exposes the security risk of clues and traces.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of naming method and naming system of photo, the encryption of photo in prior art can be solved without specific aim and the technical matters that there are security breaches.
For solving the problems of the technologies described above, embodiments providing a kind of naming method of photo, being applied in terminal device, described naming method comprises:
Respectively level of security is arranged to multiple photo;
According to level of security, described multiple photo is classified, to form first kind photo and Equations of The Second Kind photo;
By described first kind photo storage to the first file, and name continuously with the first preset rules; And
By described Equations of The Second Kind photo storage to the second file, and name continuously with the second preset rules.
For solving the problems of the technologies described above, embodiments providing a kind of naming system of photo, being applied in mobile phone, described naming system comprises:
Module is set, for arranging level of security to multiple photo respectively;
Sort module, for classifying to described multiple photo according to level of security, to form first kind photo and Equations of The Second Kind photo;
First name module, for by described first kind photo storage to the first file, and names continuously with the first preset rules; And
Second name module, for by described Equations of The Second Kind photo storage to the second file, and names continuously with the second preset rules.
Relative to prior art, the naming method of a kind of photo provided by the invention and naming system, name respectively by organizing the photo of preset rules to different level of security more, avoid because the name of photo continuous print and divulging a secret of causing, pointed strong advantage when being encrypted and filled up the security breaches produced due to former naming rule.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the naming method of the photo that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the naming method of the photo that the embodiment of the present invention two provides;
Fig. 3 is the module diagram of the naming system of the photo that the embodiment of the present invention three provides;
Fig. 4 is the module diagram of the naming system of the photo that the embodiment of the present invention four provides.
Embodiment
What please refer in accompanying drawing is graphic, and wherein identical element numbers represents identical assembly, and principle of the present invention implements to illustrate in a suitable computing ring mirror.The following description is based on exemplified specific embodiments of the invention, and it should not be regarded as limiting the present invention not at other specific embodiment that this describes in detail.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, and those skilled in the art can recognize that the plurality of step of the following stated and operation also may be implemented in the middle of hardware.
The naming method of photo of the present invention provided by the invention and naming system, can be applicable to, in the terminal device such as smart mobile phone, digital camera, not enumerate one by one herein.
In addition, the present invention can also be applied to hiding of video file and display, and its principle is identical.
Embodiment one
Refer to Fig. 1, be depicted as the schematic flow sheet of the naming method of the photo that the embodiment of the present invention provides.The naming method of described photo, is mainly executed in the terminal device such as smart mobile phone, digital camera, does not enumerate one by one herein.
The naming method of described photo, comprising:
In step S101, respectively level of security is arranged to multiple photo.
Wherein, described level of security, comprising: level of security is high and level of security is low.
The rule of the selection of described setting, comprises the one as under type or combination:
(1) locate spot for photography, as the Conference Room I of Shenzhen City, Guangdong Province Nanshan District building, it is high that the photo that this place is taken is all level of security;
(2) arrange shooting time, as 2015-09-189:00 ~ 11:00, to be all level of security high for the photo of this time period shooting;
(3) locator key word, as maintained secrecy, if when the content of shooting is document, it is secret whether search comprises in full, if comprise, then level of security is high;
(4) gather portrait feature, as model A, the photo captured when model A enters mirror is that level of security is high;
(5) privacy photo type is set, as be greater than when the bare area of skin one preset bare threshold value time, such photo is defaulted as level of security high.
In step s 102, according to level of security, described multiple photo is classified, to form first kind photo and Equations of The Second Kind photo.
Wherein, using photo high for level of security as first kind photo, using photo low for level of security as Equations of The Second Kind photo.
In step s 103, by described first kind photo storage to the first file, and name continuously with the first preset rules.Specifically, describedly to name continuously with the first preset rules, specifically comprise:
(1) described by described first kind photo storage to the first file;
(2) be encrypted described first file by the biological information of user, the first file after wherein said encryption is saved to appointed area or setup of attribute is hiding; And
(3) name continuously with the first preset rules.
Be understandable that, by independently being stored by photo high for level of security and naming, make follow-up encryption, and hide provide convenience.Even if hidden by this kind of photo or delete, also clue can not be found out from former picture library.Be particularly useful for clapping in collective activity, many people have the situation of checking authority.
In step S104, by described Equations of The Second Kind photo storage to the second file, and name continuously with the second preset rules.
Be understandable that, described first preset rules and described second preset rules, comprising: the system of the shooting address of the pixel of photo, the size of photo, photo, the shooting time of photo, the name of shooting equipment, shooting equipment is or/and the combination in any of above-mentioned rule.And described first preset rules is different with described second preset rules.
The naming method of photo of the present invention, name respectively by organizing the photo of preset rules to different level of security more, avoid because the name of photo continuous print and divulging a secret of causing, pointed strong advantage and filled up the security breaches produced due to former naming rule.
Embodiment two
Refer to Fig. 2, be depicted as the schematic flow sheet of the naming method of the photo that the embodiment of the present invention provides.The naming method of described photo, is mainly executed in smart mobile phone.
The naming method of described photo, comprising:
In step s 201, arrange level of security respectively to multiple photo, described level of security comprises that level of security is high and level of security is low.
The rule of the selection of described setting, comprises the one as under type or combination:
(1) locate spot for photography, it is high that the photo that this place is taken is all level of security;
(2) arrange shooting time, to be all level of security high for the photo of this time period shooting;
(3) locator key word, if when the content of shooting is document, whether search comprises this keyword in full, if comprise, then level of security is high;
(4) gather portrait feature, and captured photo is that level of security is high when default portrait enters mirror;
(5) privacy photo type is set, as be greater than when the bare area of skin one preset bare threshold value time, such photo is defaulted as level of security high.
In step S202, according to level of security, described multiple photo is classified, using photo high for level of security as first kind photo, using photo low for level of security as Equations of The Second Kind photo.
Wherein, step S203 is performed to first kind photo, step S206 is performed to Equations of The Second Kind photo.
In step S203, by described first kind photo storage to the first file.
In step S204, be encrypted described first file by the biological information of user, the first file after wherein said encryption is saved to appointed area or setup of attribute is hiding.
Be understandable that, comprise before encryption:
Gather the iris information of user, as the biological information of described user.Wherein, described user comprises managerial personnel and/or designated person.Managerial personnel typically refer to the owner of mobile phone, and power of composing is to designated person, and power of wherein composing can by gathering the iris of designated person or informing clear-text passwords.
Wherein, the iris information of described collection user, specifically comprises:
(1) eye image of user is gathered;
(2) Iris Location and normalized are carried out to described eye image, to generate iris image;
(3) from described iris image, iris feature point is extracted; And
(4) described iris feature point is encoded, to generate iris information.
In step S205, name continuously with the first preset rules.
Be understandable that, this step specifically comprises:
(1) identify whether described first kind photo is portrait photographs;
(2) when being portrait photographs, from name storehouse, title corresponding to described portrait photographs or code is read;
(3) in described first file, with described title or code for prefix, with time or order of addition for suffix, name.
Wherein, described name storehouse can be the address list of mobile phone, judges the contact method that whether there is personage in current people's photo in described address list, if exist, then reads the title in address list or code.
In step S206, by described Equations of The Second Kind photo storage to the second file, and name continuously with the second preset rules.
Be understandable that, described second preset rules, comprising: the system of the shooting address of the pixel of photo, the size of photo, photo, the shooting time of photo, the name of shooting equipment, shooting equipment is or/and the combination in any of above-mentioned rule.
The naming method of photo of the present invention, name respectively by organizing the photo of preset rules to different level of security more, avoid because the name of photo continuous print and divulging a secret of causing, pointed strong advantage and filled up the security breaches produced due to former naming rule.
Embodiment three
Refer to Fig. 3, be depicted as the module diagram of the naming system of the photo that the embodiment of the present invention provides.The naming system of described photo, is mainly executed in the terminal device such as smart mobile phone, digital camera, does not enumerate one by one herein.
The naming system 300 of described photo, comprising: arrange module 31, sort module 32, first name module 33, encrypting module 34 and the second name module 35.
Module 31 is set, is connected to the storer (sign) in terminal device, as picture library or photos folder, for arranging level of security to multiple photos wherein respectively.
Wherein, described level of security, comprising: level of security is high and level of security is low.
The rule of the selection of described setting, comprises the one as under type or combination:
(1) locate spot for photography, as the Conference Room I of Shenzhen City, Guangdong Province Nanshan District building, it is high that the photo that this place is taken is all level of security;
(2) arrange shooting time, as 2015-09-189:00 ~ 11:00, to be all level of security high for the photo of this time period shooting;
(3) locator key word, as maintained secrecy, if when the content of shooting is document, it is secret whether search comprises in full, if comprise, then level of security is high;
(4) gather portrait feature, as model A, the photo captured when model A enters mirror is that level of security is high;
(5) privacy photo type is set, as be greater than when the bare area of skin one preset bare threshold value time, such photo is defaulted as level of security high.
Sort module 32, is connected to and describedly arranges module 31, for classifying to described multiple photo according to level of security, to form first kind photo and Equations of The Second Kind photo.
Wherein, using photo high for level of security as first kind photo, using photo low for level of security as Equations of The Second Kind photo.
First name module 33, is connected to described sort module 32, for by described first kind photo storage to the first file, and names continuously with the first preset rules.
Be understandable that, by independently being stored by photo high for level of security and naming, make follow-up encryption, and hide provide convenience.Even if hidden by this kind of photo or delete, also clue can not be found out from former picture library.Be particularly useful for clapping in collective activity, many people have the situation of checking authority.
Encrypting module 34, be connected to described sort module 32 and the first name module 33, be encrypted described first file for the biological information by user, the first file after wherein said encryption is saved to appointed area or setup of attribute is hiding.
Second name module 35, for by described Equations of The Second Kind photo storage to the second file, and names continuously with the second preset rules.
Be understandable that, described first preset rules and described second preset rules, comprising: the system of the shooting address of the pixel of photo, the size of photo, photo, the shooting time of photo, the name of shooting equipment, shooting equipment is or/and the combination in any of above-mentioned rule.And described first preset rules is different with described second preset rules.
The naming system of photo of the present invention, name respectively by organizing the photo of preset rules to different level of security more, avoid because the name of photo continuous print and divulging a secret of causing, pointed strong advantage and filled up the security breaches produced due to former naming rule.
Embodiment four
Refer to Fig. 4, be depicted as the module diagram of the naming system of the photo that the embodiment of the present invention provides.The naming system of described photo, is mainly executed in smart mobile phone.
The naming system 400 of described photo, comprising: arrange module 41, sort module 42, first name module 43, acquisition module 44, encrypting module 45 and the second name module 46.
Arrange module 41, for arranging level of security to multiple photo respectively, described level of security comprises that level of security is high and level of security is low.
Sort module 42, for classifying to described multiple photo according to level of security, using photo high for level of security as first kind photo, using photo low for level of security as Equations of The Second Kind photo.
First name module 43, for by described first kind photo storage to the first file, and names continuously with the first preset rules.
Wherein, described first name module 43, comprising: recognin module 431, reading submodule 432 and combination submodule 433.
Specifically, described recognin module 431, for identifying whether described first kind photo is portrait photographs.Described reading submodule 432, for when being portrait photographs, reads title corresponding to described portrait photographs or code from name storehouse.Described combination submodule 433, in described first file, with described title or code for prefix, with time or order of addition for suffix, carries out combination name.
Wherein, described name storehouse can be the address list of mobile phone, judges the contact method that whether there is personage in current people's photo in described address list, if exist, then reads the title in address list or code.
Acquisition module 44, is connected to described encrypting module, for gathering the iris information of user, as the biological information of described user; Wherein, described user comprises managerial personnel and/or designated person.Managerial personnel typically refer to the owner of mobile phone, and power of composing is to designated person, and power of wherein composing can by gathering the iris of designated person or informing clear-text passwords.
Described acquisition module 44 comprises: image submodule 441, processing submodule 442, feature submodule 443 and encoding submodule 444.
Specifically, described image submodule 441, for gathering the eye image of user.Described processing submodule 442, for carrying out Iris Location and normalized to described eye image, to generate iris image.Described feature submodule 443, for extracting iris feature point from described iris image.Described encoding submodule 444, for encoding to described iris feature point, to generate iris information.
Encrypting module 45, be connected to described sort module 42 and the first name module 43, be encrypted described first file for the biological information by user, the first file after wherein said encryption is saved to appointed area or setup of attribute is hiding.
Second name module 46, for by described Equations of The Second Kind photo storage to the second file, and names continuously with the second preset rules.
Be understandable that, described second preset rules, comprising: the system of the shooting address of the pixel of photo, the size of photo, photo, the shooting time of photo, the name of shooting equipment, shooting equipment is or/and the combination in any of above-mentioned rule.
The naming system of photo of the present invention, name respectively by organizing the photo of preset rules to different level of security more, avoid because the name of photo continuous print and divulging a secret of causing, pointed strong advantage and filled up the security breaches produced due to former naming rule.
The naming method of the photo that the embodiment of the present invention provides and naming system belong to same design, and its specific implementation process refers to instructions in full, repeats no more herein.
In sum; although the present invention discloses as above with preferred embodiment; but above preferred embodiment is also not used to limit the present invention; those of ordinary skill in the art; without departing from the spirit and scope of the present invention; all can do various change and retouching, the scope that therefore protection scope of the present invention defines with claim is as the criterion.

Claims (12)

1. a naming method for photo, is characterized in that, comprising:
Respectively level of security is arranged to multiple photo;
According to level of security, described multiple photo is classified, to form first kind photo and Equations of The Second Kind photo;
By described first kind photo storage to the first file, and name continuously with the first preset rules; And
By described Equations of The Second Kind photo storage to the second file, and name continuously with the second preset rules.
2. naming method as claimed in claim 1, is characterized in that, describedly arranges level of security to multiple photo respectively, specifically comprises:
For photo arranges level of security, comprising: level of security is high or level of security is low;
Classify to described multiple photo according to level of security, to form first kind photo and Equations of The Second Kind photo, concrete execution is: using photo high for level of security as first kind photo, using photo low for level of security as Equations of The Second Kind photo.
3. naming method as claimed in claim 2, is characterized in that, described by described first kind photo storage to the first file, and names continuously with the first preset rules, specifically comprises:
Described by described first kind photo storage to the first file;
Be encrypted described first file by the biological information of user, the first file after wherein said encryption is saved to appointed area or setup of attribute is hiding; And
Name continuously with the first preset rules.
4. naming method as claimed in claim 1, it is characterized in that, the described biological information by user is encrypted described first file, comprises before:
Gather the iris information of user, as the biological information of described user;
Wherein, described user comprises managerial personnel and/or designated person.
5. naming method as claimed in claim 4, is characterized in that, the iris information of described collection user, as the biological information of described user, specifically comprises:
Gather the eye image of user;
Iris Location and normalized are carried out to described eye image, to generate iris image;
Iris feature point is extracted from described iris image; And
Described iris feature point is encoded, to generate iris information.
6. naming method as claimed in claim 1, is characterized in that, described by described first kind photo storage to the first file, and names continuously with the first preset rules, specifically comprises:
Identify whether described first kind photo is portrait photographs;
When being portrait photographs, from name storehouse, read title corresponding to described portrait photographs or code;
In described first file, with described title or code for prefix, with time or order of addition for suffix, name.
7. a naming system for photo, is applied in mobile phone, it is characterized in that, described naming system comprises:
Module is set, for arranging level of security to multiple photo respectively;
Sort module, for classifying to described multiple photo according to level of security, to form first kind photo and Equations of The Second Kind photo;
First name module, for by described first kind photo storage to the first file, and names continuously with the first preset rules; And
Second name module, for by described Equations of The Second Kind photo storage to the second file, and names continuously with the second preset rules.
8. naming system as claimed in claim 1, is characterized in that:
Described module being set, for arranging level of security for photo, comprising: level of security is high or level of security is low; And
Described sort module, for using photo high for level of security as first kind photo, using photo low for level of security as Equations of The Second Kind photo.
9. naming system as claimed in claim 8, is characterized in that, also comprise:
Encrypting module, be connected to described sort module and the first name module, be encrypted described first file for the biological information by user, the first file after wherein said encryption is saved to appointed area or setup of attribute is hiding.
10. naming system as claimed in claim 9, is characterized in that, also comprise:
Acquisition module, is connected to described encrypting module, for gathering the iris information of user, as the biological information of described user;
Wherein, described user comprises managerial personnel and/or designated person.
11. naming systems as claimed in claim 10, it is characterized in that, described acquisition module comprises:
Image submodule, for gathering the eye image of user;
Processing submodule, for carrying out Iris Location and normalized to described eye image, to generate iris image;
Feature submodule, for extracting iris feature point from described iris image; And
Encoding submodule, for encoding to described iris feature point, to generate iris information.
12. naming systems as claimed in claim 7, is characterized in that, described first name module comprises:
Recognin module, for identifying whether described first kind photo is portrait photographs;
Reading submodule, for when being portrait photographs, reads title corresponding to described portrait photographs or code from name storehouse; And
Combination submodule, in described first file, with described title or code for prefix, with time or order of addition for suffix, carries out combination and names.
CN201510727222.8A 2015-10-28 2015-10-28 Photo naming method and naming system Pending CN105354510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510727222.8A CN105354510A (en) 2015-10-28 2015-10-28 Photo naming method and naming system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510727222.8A CN105354510A (en) 2015-10-28 2015-10-28 Photo naming method and naming system

Publications (1)

Publication Number Publication Date
CN105354510A true CN105354510A (en) 2016-02-24

Family

ID=55330481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510727222.8A Pending CN105354510A (en) 2015-10-28 2015-10-28 Photo naming method and naming system

Country Status (1)

Country Link
CN (1) CN105354510A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991A (en) * 2016-06-24 2016-11-16 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN106326773A (en) * 2016-08-29 2017-01-11 广东欧珀移动通信有限公司 Method and device for photo encryption management as well as terminal
CN106649784A (en) * 2016-12-28 2017-05-10 深圳天珑无线科技有限公司 Picture storing method, picture searching method, picture searching device and terminal
CN111027290A (en) * 2019-11-22 2020-04-17 贝壳技术有限公司 Data report naming method and device, electronic equipment and storage medium
CN111078650A (en) * 2019-12-20 2020-04-28 成都康赛信息技术有限公司 File storage method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN103631819A (en) * 2012-08-27 2014-03-12 华为技术有限公司 Method and system for naming picture
CN104572847A (en) * 2014-12-15 2015-04-29 广东欧珀移动通信有限公司 Method and device for naming photo

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631819A (en) * 2012-08-27 2014-03-12 华为技术有限公司 Method and system for naming picture
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN104572847A (en) * 2014-12-15 2015-04-29 广东欧珀移动通信有限公司 Method and device for naming photo

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991A (en) * 2016-06-24 2016-11-16 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN106326773A (en) * 2016-08-29 2017-01-11 广东欧珀移动通信有限公司 Method and device for photo encryption management as well as terminal
CN106326773B (en) * 2016-08-29 2019-05-03 Oppo广东移动通信有限公司 A kind of method, apparatus and terminal of photo encryption handling
CN106649784A (en) * 2016-12-28 2017-05-10 深圳天珑无线科技有限公司 Picture storing method, picture searching method, picture searching device and terminal
CN111027290A (en) * 2019-11-22 2020-04-17 贝壳技术有限公司 Data report naming method and device, electronic equipment and storage medium
CN111078650A (en) * 2019-12-20 2020-04-28 成都康赛信息技术有限公司 File storage method
CN111078650B (en) * 2019-12-20 2023-07-25 成都康赛信息技术有限公司 File storage method

Similar Documents

Publication Publication Date Title
JP6349031B2 (en) Method and apparatus for recognition and verification of objects represented in images
Highfield et al. A methodology for mapping Instagram hashtags
Smith et al. Big data privacy issues in public social media
US9972113B2 (en) Computer-readable recording medium having stored therein album producing program, album producing method, and album producing device for generating an album using captured images
EP3063730B1 (en) Automated image cropping and sharing
CN105354510A (en) Photo naming method and naming system
US20160148068A1 (en) Image processing apparatus and method, and electronic device
CN105005597A (en) Photograph sharing method and mobile terminal
JP6396897B2 (en) Search for events by attendees
CN104519267A (en) Shooting control method and terminal equipment
EP3317773B1 (en) Systems and methods for media privacy
WO2016145844A1 (en) Picture sorting method and corresponding picture storage and display device
CN103699679A (en) Method and equipment for retrieving information of target objects
US9081801B2 (en) Metadata supersets for matching images
CN104331515A (en) Method and system for generating travel journal automatically
US10885619B2 (en) Context-based imagery selection
US10706245B2 (en) Link association
US11200402B2 (en) Application execution based on object recognition
Tayeb et al. Toward metadata removal to preserve privacy of social media users
EP3616092A1 (en) Media sharing based on identified physical objects
US20200236295A1 (en) Imaging apparatus
WO2016197709A1 (en) Information processing method and mobile terminal
CN111163170A (en) Photo sharing method, system and server
Hong Modern tech can't shield your secret identity
Zhong et al. i-Memory: An intelligence Android-based photo management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160224