CN106326773B - A kind of method, apparatus and terminal of photo encryption handling - Google Patents

A kind of method, apparatus and terminal of photo encryption handling Download PDF

Info

Publication number
CN106326773B
CN106326773B CN201610750780.0A CN201610750780A CN106326773B CN 106326773 B CN106326773 B CN 106326773B CN 201610750780 A CN201610750780 A CN 201610750780A CN 106326773 B CN106326773 B CN 106326773B
Authority
CN
China
Prior art keywords
photo
facial image
image
encrypted
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610750780.0A
Other languages
Chinese (zh)
Other versions
CN106326773A (en
Inventor
张学勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610750780.0A priority Critical patent/CN106326773B/en
Publication of CN106326773A publication Critical patent/CN106326773A/en
Application granted granted Critical
Publication of CN106326773B publication Critical patent/CN106326773B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation

Landscapes

  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides the method, apparatus and terminal of a kind of photo encryption handling, this method, which is used, carries out recognition of face to photo, to judge in the photo whether to include facial image, if including facial image, then obtain the number of the facial image in the photo, when the number of the facial image is predetermined number, which is encrypted;When the program includes facial image in photo and facial image is predetermined number, photo is encrypted, so that some privacy photos that user is not intended to other people to see are protected, improves the safety of photo management.

Description

A kind of method, apparatus and terminal of photo encryption handling
Technical field
The present invention relates to field of terminal technology, and in particular to a kind of method, apparatus and terminal of photo encryption handling.
Background technique
With the fast development of terminal technology, the function of terminal is more and more abundant.In the various functions of terminal, function of taking pictures It can be widely used, and increasingly be liked by user.User takes pictures whenever and wherever possible, so that would generally deposit in terminal Store up a large amount of photo.
Currently, terminal is usually stored and is shown according to the separate sources of photo to the management of photo.For example, production of taking pictures Raw photo is put into a file, is put into another file by the received photo of some application program, by again One received photo of application program is put into another file.
However, this photo management method of the prior art, only roughly classifies to photo, not according to source It is managed according to the relationship of photo and user.Some privacy photos that user is not intended to other people to see are unable to get protection, lead Family of applying is faced with the risk of privacy leakage.
It can be seen that photo management method safety in the prior art is low, need further to be improved.
Summary of the invention
The embodiment of the present invention provides the method, apparatus and terminal of a kind of photo encryption handling, and photo management can be improved Safety.
The embodiment of the present invention provides a kind of method of photo encryption handling, comprising:
Recognition of face is carried out to photo, to judge in the photo whether to include facial image;
If obtaining the number of the facial image in the photo including facial image;
When the number of the facial image is predetermined number, the photo is encrypted.
Correspondingly, point inventive embodiments also provide a kind of device of photo encryption handling, comprising:
Identification module, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
Module is obtained, for obtaining when the judging result of the identification module is includes facial image in the photo The number of the facial image in the photo;
Encrypting module, for when the number of the facial image is predetermined number, the photo to be encrypted.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, the device including above-mentioned photo encryption handling.
Whether the embodiment of the present invention, which is used, carries out recognition of face to photo, to judge in the photo to include facial image;If Including facial image, then the number of the facial image in the photo is obtained;It is right when the number of the facial image is predetermined number The photo is encrypted.When the program includes facial image in photo and facial image is predetermined number, to photo It is encrypted, so that some privacy photos that user is not intended to other people to see are protected, improves the safety of photo management Property.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described.It should be evident that drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of the method for the photo encryption handling that the embodiment of the present invention one provides.
Fig. 2 is the flow diagram of the method for photo encryption handling provided by Embodiment 2 of the present invention.
Fig. 3 is the structural schematic diagram of the device for the first photo encryption handling that the embodiment of the present invention three provides.
Fig. 4 is the structural schematic diagram of the device for second of photo encryption handling that the embodiment of the present invention three provides.
Fig. 5 is the structural schematic diagram for the first terminal that the embodiment of the present invention four provides.
Fig. 6 is the structural schematic diagram for second of terminal that the embodiment of the present invention four provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in above-mentioned attached drawing, " second ", " third " etc. (if present) is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be appreciated that this The object of sample description is interchangeable under appropriate circumstances.In addition, term " includes " and " having " and their any deformation, meaning Figure, which is to cover, non-exclusive includes.For example, containing the process, method of series of steps or containing a series of modules or list The device of member, terminal, system those of are not necessarily limited to be clearly listed step or module or unit, can also include unclear The step of ground is listed or module or unit also may include its intrinsic for these process, methods, device, terminal or system Its step or module or unit.
The embodiment of the present invention provides the method, apparatus and terminal of a kind of photo encryption handling, will carry out respectively below detailed Explanation.
Embodiment one
The present embodiment will be described from the angle of the device of photo encryption handling, which specifically can integrate in terminal In, which can be the equipment such as smart phone, tablet computer.
A kind of method of photo encryption handling, comprising: recognition of face is carried out to photo, with judge in the photo whether include Facial image;If obtaining the number of the facial image in the photo including facial image;When the number of the facial image is When predetermined number, which is encrypted.
As shown in Figure 1, the method for the photo encryption handling, detailed process may include:
Whether S101 carries out recognition of face to photo, to judge in the photo to include facial image.
Recognition of face belongs to biometrics identification technology.Recognition of face is the face feature based on people, to the photo of input It is first determined whether there are facial images.If there is facial image, then the position of each facial image can be further identified It sets, the location information of size and each major facial organ.Then it according to these information, further extracts in each facial image Included identity characteristic, and the identity characteristic of the identity characteristic and known facial image is compared, so that identification is every The identity of a facial image.
In concrete application, photo is not limited to the photo of shooting, can also be through the received picture of application program either The screenshot etc. generated by the screenshot function of terminal.When terminal often gets a photo, i.e., recognition of face is carried out to the photo, To judge in the photo whether to include facial image.For example, after user shoots photo by the camera-enabled of terminal, immediately Recognition of face is carried out to the photo.For another example carrying out people to the photo of browsing when browsing photo by the album function in terminal Face identification.
When being judged as in the photo includes facial image, step S102 is executed;It does not include people when being judged as in the photo It, can be there are many processing method when face image.For example, the photo is added when being judged as in the photo does not include facial image Enter in default file folder, it can be " landscape photograph " that this document, which presss from both sides title,.
S102 obtains the number of the facial image in the photo if including facial image.
Specifically, when judging in photo includes facial image, which is obtained by the face characteristic information identified The number of facial image in piece.Face characteristic information can be position, size and each major facial organ of facial image The information such as position.
In practical application, when photo is single shines, the number of the facial image got is one;When photo is double According to when, the number of the facial image got is two;When photo is more people's photos, the number of the facial image got can To be three, four etc..
S103 is encrypted the photo when the number of the facial image is predetermined number.
Specifically, predetermined number can be user and preset and store a quantity in the terminal.For example, default Number can be one or two.After getting the number of facial image, the predetermined number stored in terminal is called, by facial image Number compared with the predetermined number, to judge whether the number of the facial image is predetermined number.When facial image When number is predetermined number, which is encrypted.When the number of the facial image is not predetermined number, Ke Yiyou A variety of processing methods.For example, the photo is added in default file folder when the number of the facial image is not predetermined number, It can be " Duo Renzhao " that the default file, which presss from both sides title,.
The safety that photo management can be improved is encrypted to photo, ensures the personal secrets of user.In order to mention Height avoids that the photo for not needing encryption is encrypted, as of the facial image to the accuracy of photo encryption Number be predetermined number, then to the photo be encrypted can with specifically includes the following steps:
When the number of the facial image is predetermined number, which is matched with pre-set image, to obtain Matching result;
If the matching result is successful match, which is encrypted.
Specifically, pre-set image can be preparatory typing and the facial image of storage in the terminal.For example, pre-set image can To be the personal full face of user's shooting.When the number of facial image is predetermined number, by the facial image and default figure As being matched, to obtain matching result.
Matched specific method, which can be, compares the facial image in the photo with pre-set image, judges the photo In facial image and pre-set image whether be identical personage image.If the image of identical personage, then matching result is With success;If not the image of identical personage, then matching result is that it fails to match.
When matching result is successful match, which is encrypted.
In a preferred embodiment, predetermined number is two, and pre-set image is pre-stored two in terminal The image of different personages.For example, pre-set image can be the personal full face of user and the front of another personage is shone Piece.The facial image is matched with pre-set image, is specifically included with obtaining matching result:
Two images in the facial image are matched with two pre-set images respectively, to obtain matching result;
If the matching result is successful match, which is encrypted and is specifically included:
If the matching result is two images in the facial image respectively with two pre-set image successful match, right The photo is encrypted.
Specifically, two images in facial image are matched with two pre-set images respectively, to obtain matching knot Fruit.For example, two pre-set images are image A, image B, two images in facial image are image C, image D, then will first scheme As C and image A, image B comparison, if image C is identical as image A (or image B), then image D and image B (or image A) is right Than, if image D and image B (or image A) are also identical, matching result be the facial image in two images respectively with this two A pre-set image successful match.
If matching result be the facial image in two images respectively with two pre-set image successful match, to this Photo is encrypted.
In concrete application, which, which is encrypted, be may comprise steps of:
The photo is added in default file folder;
Default file folder is encrypted.
Specifically, default file folder can be the file pre-established at the terminal.For example, default file folder title can To be " personal photo ".When matching result is successful match, which is added in default file folder, then to the default text Part folder is encrypted.Carrying out encryption to default file folder may comprise steps of:
Receiving encryption key;
Default file folder is encrypted using the encryption information.
Specifically, encryption information can be the information such as password, fingerprint, sound, iris.Terminal can receive user and pass through screen The password or encrypting fingerprint information of curtain or key-press input also can receive the Voice Encryption information that user passes through microphone input, The iris encryption information that user is inputted by camera can also be received.Then, using received encryption information to default file Folder is encrypted.
After encrypting to default file folder, only has the people (i.e. other people of user or user's authorization) of permission The photo in this document folder could be browsed, it is possible thereby to which some privacy photos for protecting user that other people is not intended to see are not let out Dew, improves the safety of photo management.
When it is implemented, the present invention is not limited by the execution sequence of described each step, conflict is not being generated In the case of, certain steps can also be carried out using other sequences or be carried out simultaneously.
From the foregoing, it will be observed that the method for photo encryption handling provided in an embodiment of the present invention, carries out recognition of face using to photo, To judge in the photo whether to include facial image;If obtaining the number of the facial image in the photo including facial image; When the number of the facial image is predetermined number, which is encrypted.The program includes face figure in photo As and facial image be predetermined number when, photo is encrypted, so as to be not intended to other people to see some hidden by user Private photo is protected, and the safety of photo management is improved.
Embodiment two
According to the method for photo encryption handling described in embodiment one, citing is described in further detail below.
In the present embodiment, it will be specifically integrated in smart phone in the method for photo encryption handling, in smart phone It is described in detail for the method for photo encryption handling.
As shown in Fig. 2, the method for photo encryption handling, detailed process can be such that
Whether S201 carries out recognition of face to photo, to judge in the photo to include facial image.
In concrete application, photo is not limited to the photo of shooting, can also be through the received picture of application program either The screenshot etc. generated by the screenshot function of smart phone.When smart phone often gets a photo, i.e., the photo is carried out Recognition of face, to judge in the photo whether to include facial image.For example, after user shoots photo by smart phone, with Recognition of face is carried out to the photo.For another example opening the photograph after receiving photo by the wechat application program of smart phone When piece, recognition of face is carried out to the photo.
When being judged as in the photo includes facial image, step S202 is executed;It does not include people when being judged as in the photo It, can be there are many processing method when face image.For example, the photo is added when being judged as in the photo does not include facial image Enter in default file folder, it can be " landscape photograph " that this document, which presss from both sides title,.
S202 obtains the number of the facial image in the photo if including facial image.
Specifically, when judging in photo includes facial image, which is obtained by the face characteristic information identified The number of facial image in piece.Face characteristic information can be position, size and each major facial organ of facial image The information such as position.
In practical application, when photo is single shines, the number of the facial image got is one;When photo is double According to when, the number of the facial image got is two;When photo is more people's photos, the number of the facial image got can To be three, four etc..
S203 matches the facial image with pre-set image when the number of the facial image is predetermined number, with Obtain matching result.
Specifically, predetermined number can be user and preset and be stored in a quantity in smart phone.For example, with When family wishes to protect single photo, predetermined number can be set to one;It, can will be pre- when user wishes to protect double photo If number is set as two.After getting the number of facial image, the predetermined number being stored in smart phone is called, by face The number of image is compared with the predetermined number, to judge whether the number of the facial image is predetermined number.When face figure When the number of picture is predetermined number, which is matched with pre-set image;When the number of facial image is not default It, can be there are many processing method when number.For example, when the number for being judged as the facial image is not predetermined number, by the photograph Piece is added in default file folder, and it can be " Duo Renzhao " that this document, which presss from both sides title,.
Pre-set image can be preparatory typing and be stored in the facial image in smart phone.For example, user can will clap The personal full face taken the photograph is set as pre-set image.When the number that judging result is facial image is predetermined number, by the people Face image is matched with pre-set image, to obtain matching result.
Matched specific method, which can be, compares the facial image in the photo with pre-set image, judges the photo In facial image and pre-set image whether be identical personage image.If the image of identical personage, then matching result is With success, step S204 is then executed;If not the image of identical personage, then matching result is that it fails to match.
When predetermined number is two, pre-set image is the image of pre-stored two different personages in smart phone. For example, pre-set image can be the personal full face of user and the full face of another personage.By the facial image Carrying out matched specific method with pre-set image can be such that two pre-set images are image A, image B, two in facial image A image is image C, image D, then first compares image C and image A, image B, if image C is identical as image A (or image B), Image D and image B (or image A) is compared again, if image D and image B (or image A) are also identical, matching result is the people Two images in face image then execute step S204 respectively with two pre-set image successful match.
The photo is added in default file folder when matching result is successful match by S204.
Specifically, default file folder can be the file pre-established on smart phone.For example, default file presss from both sides name Title can be " personal photo " or " privacy photo ".When the matching result in S203 is two in successful match or facial image Image respectively with two pre-set image successful match when, will the photo be added default file folder in.
S205, receiving encryption key.
S206 encrypts default file folder using the encryption information.
Specifically, encryption information can be the information such as password, fingerprint, sound, iris.It is logical that smart phone can receive user The password or encrypting fingerprint information for crossing screen or key-press input also can receive user and believed by the Voice Encryption of microphone input Breath, can also receive the iris encryption information that user is inputted by camera.Then, using received encryption information to default text Part folder is encrypted.
After encrypting to default file folder, only has the people (i.e. other people of user or user's authorization) of permission The photo in this document folder could be browsed, it is possible thereby to which some privacy photos for protecting user that other people is not intended to see are not let out Dew, improves the safety of photo management.
When it is implemented, the present invention is not limited by the execution sequence of described each step, conflict is not being generated In the case of, certain steps can also be carried out using other sequences or be carried out simultaneously.
From the foregoing, it will be observed that the method for photo encryption handling provided in an embodiment of the present invention, carries out recognition of face using to photo, To judge in the photo whether to include facial image;If obtaining the number of the facial image in the photo including facial image; When the number of the facial image is predetermined number, which is matched with pre-set image, to obtain matching result; When matching result is successful match, which is added in default file folder;Receiving encryption key;Use the encryption information pair Default file folder is encrypted.The number of facial image of the program in photo be predetermined number and the facial image with When pre-set image successful match, which is added in default file folder, and using received encryption information to the default file Folder is encrypted, so that some privacy photos that user is not intended to other people to see are protected, improves the safety of photo management.
Embodiment three
In order to better implement above method, the embodiment of the present invention also provides a kind of device of photo encryption handling, the dress Setting can integrate in the terminal, which can be the equipment such as smart phone, tablet computer.
As shown in figure 3, the device of photo encryption handling may include: identification module 301, obtain module 302, encrypting module 303, it is described in detail below:
The identification module 301, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
The acquisition module 302, for when the judging result of the identification module 301 be the photo in include facial image when, Obtain the number of the facial image in the photo;
The encrypting module 303, for being carried out at encryption to the photo when the number of the facial image is predetermined number Reason.
Preferably, as shown in figure 4, encrypting module 303 includes: matched sub-block 3031, encrypts submodule 3032, specifically such as Under:
The matched sub-block 3031, for when the number of the facial image is predetermined number, by the facial image and pre- If image is matched, to obtain matching result;
The encryption submodule 3032, for when the matching result of the matched sub-block 3031 be successful match when, to the photograph Piece is encrypted.
Preferably, which is two, which is two pre-set images, and matched sub-block 3031 is specifically used In:
It is when the number of the facial image is predetermined number, two images in the facial image are default with two respectively Image is matched, to obtain matching result;
Encryption submodule 3032 is specifically used for:
When the matching result of the matched sub-block 3031 is default with this two respectively for two images in the facial image When images match success, which is encrypted.
Preferably, which is encrypted and is specifically included:
The photo is added in default file folder;
Default file folder is encrypted.
Preferably, encryption is carried out to default file folder to specifically include:
Receiving encryption key;
Default file folder is encrypted using the encryption information.
When it is implemented, the above modules can be used as independent entity to realize, any combination can also be carried out, is made It is realized for same or several entities.The specific implementation of the above modules can be found in the embodiment of the method for front, herein not It repeats again.
From the foregoing, it will be observed that the device of photo encryption handling provided in an embodiment of the present invention, by identification module 301 to photo into Row recognition of face, to judge in the photo whether to include facial image;Obtain the judgement knot that module 302 works as the identification module 301 When fruit is includes facial image in the photo, the number of the facial image in the photo is obtained;Encrypting module 303 is in the face figure When the number of picture is predetermined number, which is encrypted.The program includes facial image and face in photo When image is predetermined number, photo is encrypted, so that some privacy photos that user is not intended to other people to see obtain Protection, improves the safety of photo management.
Example IV
The embodiment of the present invention also provides a kind of terminal, which can be the equipment such as smart phone, tablet computer.
As shown in figure 5, terminal 400 may include: identification module 401, obtain module 402, encrypting module 403, specifically retouch It states as follows:
The identification module 401, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
The acquisition module 402, for when the judging result of the identification module 401 be the photo in include facial image when, Obtain the number of the facial image in the photo;
The encrypting module 403, for being carried out at encryption to the photo when the number of the facial image is predetermined number Reason.
Preferably, encrypting module 403 includes: matched sub-block, encrypts submodule, specific as follows:
The matched sub-block, for by the facial image and presetting figure when the number of the facial image is predetermined number As being matched, to obtain matching result;
The encryption submodule, for adding to the photo when the matching result of the matched sub-block is successful match Close processing.
Preferably, which is two, which is two pre-set images, and matched sub-block is specifically used for:
It is when the number of the facial image is predetermined number, two images in the facial image are default with two respectively Image is matched, to obtain matching result;
Encryption submodule is specifically used for:
When the matched sub-block matching result be the facial image in two images respectively with two pre-set images When successful match, which is encrypted.
Preferably, which is encrypted and is specifically included:
The photo is added in default file folder;
Default file folder is encrypted.
Preferably, encryption is carried out to default file folder to specifically include:
Receiving encryption key;
Default file folder is encrypted using the encryption information.
Aforesaid operations are for details, reference can be made to the embodiment of the method for front, and details are not described herein.
The embodiment of the present invention also provides another terminal, as shown in fig. 6, the terminal 500 may include radio frequency (RF, Radio Frequency) circuit 501, include one or more memory 502, the input unit of computer readable storage medium 503, display unit 504, sensor 505, voicefrequency circuit 506, Wireless Fidelity (WiFi, Wireless Fidelity) module 507, the components such as processor 508 and the power supply 509 of processing core are included one or more than one.Those skilled in the art Member it is appreciated that terminal structure shown in Fig. 6 not structure paired terminal restriction, may include more more or fewer than illustrating Component perhaps combines certain components or different component layouts.
Radio circuit 501 can be used for receiving and sending messages or communication process in signal send and receive, particularly, by base station Downlink information receive after, transfer to one or more than one processor 508 processing;In addition, the data for being related to uplink are sent To base station.In general, radio circuit 501 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillations Device, subscriber identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low noise amplification Device (LNA, Low Noise Amplifier), duplexer etc..In addition, radio circuit 501 can also by wireless communication with network It is communicated with other equipment.Any communication standard or agreement, including but not limited to global system for mobile telecommunications can be used in the wireless communication System (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more Location (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 502 can be used for storing software program and module.Processor 508 is stored in memory 502 by operation Software program and module, thereby executing various function application and data processing.Memory 502 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to terminal (such as audio data, phone directory etc.) etc..In addition, memory 502 may include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory 502 can also include Memory Controller, to provide processor 508 and input unit 503 to memory 502 Access.
Input unit 503 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, in a specific embodiment In, input unit 503 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touching Control plate, collect user on it or nearby touch operation (such as user using any suitable object such as finger, stylus or Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 508, and can reception processing Order that device 508 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 503 can also include other input equipments.Specifically, other are defeated Entering equipment can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One of mark, operating stick etc. are a variety of.
Display unit 504 can be used for showing information input by user or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Display Unit 504 may include display panel, optionally, can using liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further , touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, send processing to Device 508 is followed by subsequent processing device 508 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event Visual output.Although touch sensitive surface and display panel are to realize input and input as two independent components in Fig. 6 Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Terminal may also include at least one sensor 505, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 506 can provide the audio interface between user and terminal by loudspeaker, microphone.Voicefrequency circuit The audio data received can be converted into electric signal by 506, be transferred to loudspeaker, be converted to voice signal output by loudspeaker; On the other hand, the voice signal of collection is converted to electric signal by microphone, is converted to audio number after being received by voicefrequency circuit 506 According to then such as another terminal will be sent to through radio circuit 501 after audio data output processor 508 handles, or by sound Frequency is further processed according to output to memory 502.Voicefrequency circuit 506 is also possible that earphone jack, to provide peripheral hardware The communication of earphone and terminal.
Wireless Fidelity (WiFi) belongs to short range wireless transmission technology, and terminal can be helped by wireless fidelity module 507 User sends and receive e-mail, browses webpage and access streaming video etc., it provides wireless broadband internet access for user. Although Fig. 6 shows wireless fidelity module 507, but it is understood that, and it is not belonging to must be configured into for terminal, completely may be used To omit within the scope of not changing the essence of the invention as needed.
Processor 508 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 502, and call and be stored in memory 502 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 508 can wrap Include one or more processing cores;Preferably, processor 508 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 508.
Terminal further includes the power supply 509 (such as battery) powered to all parts.Preferably, power supply can pass through power supply pipe Reason system and processor 508 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.Power supply 509 can also include one or more direct current or AC power source, recharging system, power failure inspection The random components such as slowdown monitoring circuit, power adapter or inverter, power supply status indicator.
Although being not shown in Fig. 6, terminal can also include camera, bluetooth module etc., and details are not described herein.
Specifically in the present embodiment, the processor 508 in terminal can be according to following instruction, will be one or more The corresponding executable file of the process of application program is loaded into memory 502, and is run by processor 508 and be stored in storage Application program in device 502, to realize various functions:
Recognition of face is carried out to photo, to judge in the photo whether to include facial image;If being obtained including facial image Take the number of the facial image in the photo;When the number of the facial image is predetermined number, which is encrypted Processing.
Preferably, processor 508 has identification module, obtains module, encrypting module, is described in detail below:
Whether processor 508 is used to carry out recognition of face to photo by identification module, to judge in the photo to include people Face image;
Processor 508 is used to work as the judging result of the identification module by acquisition module to include facial image in the photo When, obtain the number of the facial image in the photo;
Processor 508 is used for through encrypting module when the number of the facial image is predetermined number, is carried out to the photo Encryption.
Aforesaid operations are for details, reference can be made to the embodiment of the method for front, and details are not described herein.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of terminal, by carrying out recognition of face to photo, to judge the photograph It whether include facial image in piece;If obtaining the number of the facial image in the photo including facial image;When the face figure When the number of picture is predetermined number, which is encrypted.The program includes facial image and face in photo When image is predetermined number, photo is encrypted, so that some privacy photos that user is not intended to other people to see obtain Protection, improves the safety of photo management.
It should be noted that those of ordinary skill in the art will appreciate that whole in the various methods of above-described embodiment or Part steps are relevant hardware can be instructed to complete by program, which can store in computer-readable storage medium In matter, storage medium may include: read-only memory (ROM, Read OnlyMemory), random access memory (RAM, Random Access Memory), disk or CD etc..
The method, apparatus and terminal for being provided for the embodiments of the invention a kind of photo encryption handling above have carried out in detail It introduces, used herein a specific example illustrates the principle and implementation of the invention, the explanation of above embodiments It is merely used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention Thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be understood For limitation of the present invention.

Claims (6)

1. a kind of method of photo encryption handling characterized by comprising
Recognition of face is carried out to photo, to judge in the photo whether to include facial image;
If obtaining the number of the facial image in the photo including facial image;
When the number of the facial image be two when, by two images in the facial image respectively with two pre-set images It is matched, to obtain matching result;
If the matching result be the facial image in two images respectively with described two pre-set image successful match, Receive the Voice Encryption information that user passes through microphone input;
The photo is encrypted using the Voice Encryption information;
If the number in the photo not including facial image in facial image or the photo is not two, by the photograph Piece is added in the first default file folder.
2. the method according to claim 1, wherein the described the step of photo is encrypted, is specific Include:
The photo is added in default file folder;
Default file folder is encrypted.
3. a kind of device of photo encryption handling characterized by comprising
Identification module, for carrying out recognition of face to photo, to judge in the photo whether to include facial image;
Module is obtained, for when the judging result of the identification module be in the photo includes facial image, described in acquisition The number of the facial image in photo;
Encrypting module is used for:
When the number of the facial image be two when, by two images in the facial image respectively with two pre-set images It is matched, to obtain matching result;
If the matching result be the facial image in two images respectively with described two pre-set image successful match, Receive the Voice Encryption information that user passes through microphone input;
The photo is encrypted using the Voice Encryption information;
If the number in the photo not including facial image in facial image or the photo is not two, by the photograph Piece is added in the first default file folder.
4. device according to claim 3, which is characterized in that the described photo is encrypted specifically includes:
The photo is added in default file folder;
Default file folder is encrypted.
5. a kind of terminal, which is characterized in that the terminal includes device described in claim 3 or 4.
6. a kind of storage medium, which is characterized in that computer program is stored in the storage medium, when the computer program When running on computers, so that method described in computer perform claim requirement 1 or 2.
CN201610750780.0A 2016-08-29 2016-08-29 A kind of method, apparatus and terminal of photo encryption handling Expired - Fee Related CN106326773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610750780.0A CN106326773B (en) 2016-08-29 2016-08-29 A kind of method, apparatus and terminal of photo encryption handling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610750780.0A CN106326773B (en) 2016-08-29 2016-08-29 A kind of method, apparatus and terminal of photo encryption handling

Publications (2)

Publication Number Publication Date
CN106326773A CN106326773A (en) 2017-01-11
CN106326773B true CN106326773B (en) 2019-05-03

Family

ID=57788615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610750780.0A Expired - Fee Related CN106326773B (en) 2016-08-29 2016-08-29 A kind of method, apparatus and terminal of photo encryption handling

Country Status (1)

Country Link
CN (1) CN106326773B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874918A (en) * 2017-02-23 2017-06-20 上海与德信息技术有限公司 A kind of photo store method and device
CN107181911A (en) * 2017-04-07 2017-09-19 北京安云世纪科技有限公司 A kind of image pickup method, device and mobile terminal
CN107181910A (en) * 2017-04-07 2017-09-19 北京安云世纪科技有限公司 A kind of image pickup method of mobile terminal, device and mobile terminal
CN107172344A (en) * 2017-04-07 2017-09-15 北京安云世纪科技有限公司 Shooting file memory method, device and the mobile terminal of a kind of mobile terminal
CN107169367A (en) * 2017-04-07 2017-09-15 北京安云世纪科技有限公司 A kind of storage method, device and mobile terminal for shooting file
CN109729431B (en) * 2018-12-26 2021-02-09 维沃移动通信有限公司 Video privacy protection method and terminal equipment
US11379610B2 (en) 2019-07-10 2022-07-05 Blackberry Limited Methods and devices for automatically encrypting files
CN111401197B (en) * 2020-03-10 2023-08-15 支付宝(杭州)信息技术有限公司 Picture risk identification method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034714A (en) * 2012-12-11 2013-04-10 北京百度网讯科技有限公司 Mobile terminal, picture sorting management method and picture sorting management device of mobile terminal
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN105354510A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo naming method and naming system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020025040A1 (en) * 2000-06-28 2002-02-28 Howard Stein Method and apparatus for generating an encryption key
CN101510205B (en) * 2009-03-16 2013-02-27 广州市有福数码科技有限公司 Method for implementing automatically clustering photographs, apparatus and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034714A (en) * 2012-12-11 2013-04-10 北京百度网讯科技有限公司 Mobile terminal, picture sorting management method and picture sorting management device of mobile terminal
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN105354510A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Photo naming method and naming system

Also Published As

Publication number Publication date
CN106326773A (en) 2017-01-11

Similar Documents

Publication Publication Date Title
CN106326773B (en) A kind of method, apparatus and terminal of photo encryption handling
CN103473494B (en) A kind of run the method for application, device and terminal unit
CN106778175B (en) Interface locking method and device and terminal equipment
CN106126015B (en) A kind of application program launching control method and terminal
WO2018032661A1 (en) Information displaying method for terminal device, and terminal device
CN104519485B (en) Communication means, device and system between a kind of terminal
CN104967790B (en) Method, photo taking, device and mobile terminal
CN106921791B (en) Multimedia file storage and viewing method and device and mobile terminal
CN107145794B (en) Data processing method and device and mobile terminal
CN106446841B (en) A kind of fingerprint template matching order update method and terminal
CN104217172B (en) Privacy content inspection method and device
CN109194818A (en) A kind of information processing method and terminal
US10216404B2 (en) Method of securing image data and electronic device adapted to the same
CN108415641A (en) A kind of processing method and mobile terminal of icon
CN109062634B (en) Application starting method and mobile terminal
CN109857297A (en) Information processing method and terminal device
CN108898552A (en) Picture joining method, double screen terminal and computer readable storage medium
WO2021068895A1 (en) Screen capturing method and terminal device thereof
CN106469280A (en) The method and device of instant messaging interface processing
CN105162930B (en) The way of recording and device of mobile terminal
CN108270757A (en) A kind of user account switching method, device, client and system
EP3687118A1 (en) Information search method, terminal, network device, and system
CN104348944A (en) Caller identification method and caller identification terminal
CN110287719A (en) File encrypting method and mobile terminal
CN109634481A (en) Text display method, device, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190503