CN112765689B - Data processing method, device, equipment and medium - Google Patents

Data processing method, device, equipment and medium Download PDF

Info

Publication number
CN112765689B
CN112765689B CN202011618833.6A CN202011618833A CN112765689B CN 112765689 B CN112765689 B CN 112765689B CN 202011618833 A CN202011618833 A CN 202011618833A CN 112765689 B CN112765689 B CN 112765689B
Authority
CN
China
Prior art keywords
terminal
display screen
user
unauthorized user
color
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011618833.6A
Other languages
Chinese (zh)
Other versions
CN112765689A (en
Inventor
熊玉伦
钱东红
杨波
高飞
刘丹丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Aviv Information Technology Co ltd
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011618833.6A priority Critical patent/CN112765689B/en
Publication of CN112765689A publication Critical patent/CN112765689A/en
Application granted granted Critical
Publication of CN112765689B publication Critical patent/CN112765689B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Abstract

The application relates to the technical field of computers, and provides a data processing method, a data processing device, data processing equipment and a data processing medium, which are used for solving the problem that switching between an anti-peeping state and a normal display state cannot be performed. The method is applied to a terminal, the terminal comprises a display screen, and the method comprises the following steps: responding to the trigger operation of the target data, and detecting whether an unauthorized user exists in the shooting range of the terminal; if an unauthorized user exists in the camera shooting range of the terminal, determining the distance between the terminal and the unauthorized user; and if the distance is smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to enable the display screen to enter a data protection mode.

Description

Data processing method, device, equipment and medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, apparatus, device, and medium.
Background
With the continuous development of science and technology, portable mobile terminals such as mobile phones and tablet computers have become an indispensable part in life and work of people, and people can read, entertain, work and the like at any time by using the portable mobile terminals. However, in public places, when a user uses the portable mobile terminal, contents displayed on a display screen in the portable mobile terminal are easily peeped by others.
At present, can be provided with the peep-proof membrane on the portable mobile terminal, the visual angle of display screen can be dwindled to the peep-proof membrane, and the content that the display screen shows can only be seen to the people in certain angle range promptly, for example the content that the user oneself can look over the display screen to can peep-proof to a certain extent, but this kind of mode can make portable mobile terminal be in the peep-proof mode always, and portable mobile terminal can't normally show.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, data processing equipment and a data processing medium, which are used for solving the problem that switching between an anti-peeping state and a normal display state cannot be performed.
In a first aspect, an embodiment of the present application provides a data processing method, which is applied to a terminal, where the terminal includes a display screen, and the method includes:
responding to the trigger operation of the target data, and detecting whether an unauthorized user exists in the shooting range of the terminal;
if the unauthorized user exists in the camera shooting range of the terminal, determining the distance between the terminal and the unauthorized user;
and if the distance is smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to enable the display screen to enter a data protection mode.
In the embodiment of the application, when a user triggers target data, it is determined that an unauthorized user exists in a shooting range of a terminal, and when it is determined that the distance between the terminal and the unauthorized user is smaller than a preset threshold value, color parameters of a display screen of the terminal are adjusted, so that the display screen enters a data protection mode, data are prevented from being peeped by the unauthorized user, the display screen can be switched between a peeping prevention state and a normal display state due to the fact that the color parameters of the display screen can be adjusted, and user experience is improved. In addition, the display screen of the terminal can be switched to the data protection mode only when the distance between the terminal and the unauthorized user is smaller than the preset threshold value, so that the situation that the data protection mode is opened by the terminal under the condition that the content displayed by the display screen is not clearly seen by the unauthorized user and the normal use of the user is influenced can be avoided.
In a possible embodiment, the terminal is pre-stored with facial images of authorized users; responding to the trigger operation of the target data, and detecting whether an unauthorized user exists in the camera shooting range of the terminal, wherein the method comprises the following steps:
detecting at least one face image in the shooting range of the terminal in response to the trigger operation of the target data;
and if one face image exists in at least one detected face image and the matched face image cannot be determined in the pre-stored face images of the authorized users, determining that the unauthorized user exists in the shooting range of the terminal.
In this embodiment, the terminal prestores the face images of the authorized users, and by matching the detected face images of the authorized users with the face images of the authorized users, it is possible to quickly and accurately determine whether an unauthorized user exists within the camera shooting range of the terminal, so as to determine whether to start the data protection mode in the following.
In one possible embodiment, the display screen comprises a display module and a color-changing thin film layer arranged on the display module; if the distance is determined to be smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal to enable the display screen to enter a data protection mode, wherein the method comprises the following steps:
and if the distance is smaller than the preset threshold value, controlling the color-changing film layer to display according to the target color parameter.
In this embodiment, when it is determined that the distance between the terminal and the unauthorized user is smaller than the preset threshold, the color film layer is controlled to display according to the target color parameter, and this manner is stable, so that the unauthorized user cannot view the content displayed on the display screen from any angle, and subsequently, the color parameter of the display screen can be adjusted, so that the user can normally view the content displayed on the display screen.
In a possible embodiment, the terminal prestores a correspondence between an illumination parameter of ambient light and a color parameter of the display screen, and before controlling the color-changing film layer to display the color-changing film layer according to a target color parameter, the method includes:
if the distance is smaller than a preset threshold value, acquiring an illumination parameter of the current ambient light;
and determining a target color parameter of the display screen according to the illumination parameter of the current ambient light and the corresponding relation.
In this embodiment, the target color parameter of the display screen is determined according to the illumination parameter and the corresponding relationship of the current ambient light, and the color parameter of the display screen can be adjusted under different illumination parameters of different environments to achieve the best data protection effect, and this adjustment mode is more flexible, and the user experience can be improved.
In a possible embodiment, before adjusting a color parameter of a display screen of the terminal to cause the display screen to enter a data protection mode, the method further includes:
if the distance is determined to be smaller than a preset threshold value, displaying prompt information; the prompt information is used for prompting a user whether to select to enter a data protection mode;
and determining the confirmation operation of the user for the prompt information.
In this embodiment, before the display screen of the terminal is switched to the data protection mode, the prompt information is displayed, on one hand, the user is prompted that the data is peeped, so that the user is more alert, on the other hand, the user is prompted whether to select to enter the data protection mode, and after the user confirms, the display screen of the terminal is switched to the data protection mode, so that the influence on the normal use of the user due to frequent entering of the data protection mode is avoided.
In a possible embodiment, after determining that the distance is smaller than the preset threshold, adjusting a color parameter of a display screen of the terminal to enable the display screen to enter a data protection mode, the method further includes:
if the unauthorized user does not exist in the camera shooting range of the terminal, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into a normal display mode; when the display screen is in a normal display mode, a user can normally view the content displayed by the display screen;
if the distance between the terminal and the unauthorized user is larger than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into the normal display mode.
In this embodiment, after the display screen of the terminal is switched to the data protection mode, the user may adjust an angle or a position of the terminal, and when there is no unauthorized user in the image capture range of the terminal or the distance between the terminal and the unauthorized user is greater than a preset threshold, the color parameter of the display screen of the terminal is adjusted, so that the display screen is switched to the normal display mode, and the user can normally view the content displayed by the display screen, and the normal use of the user is not affected on the premise of preventing the data from being peeped.
In a second aspect, a data processing apparatus is provided, the apparatus being provided in a terminal, the terminal including a display screen, the apparatus comprising:
the detection module is used for responding to the trigger operation of the target data and detecting whether an unauthorized user exists in the camera shooting range of the terminal;
the determining module is used for determining the distance between the terminal and the unauthorized user if the unauthorized user exists in the camera shooting range of the terminal;
and the adjusting module is used for adjusting the color parameter of the display screen of the terminal if the distance is determined to be smaller than the preset threshold value, so that the display screen enters a data protection mode.
In a possible embodiment, the terminal has a face image of each authorized user prestored therein, and the detection module is specifically configured to:
detecting at least one face image in the shooting range of the terminal in response to the trigger operation of the target data;
and if one face image exists in at least one detected face image and the matched face image cannot be determined in the pre-stored face images of the authorized users, determining that the unauthorized user exists in the shooting range of the terminal.
In one possible embodiment, the display screen comprises a display module and a color-changing thin film layer arranged on the display module; the adjustment module is specifically configured to:
and if the distance is smaller than the preset threshold value, controlling the color-changing film layer to display according to the target color parameter.
In a possible embodiment, the terminal pre-stores a corresponding relationship between an illumination parameter of ambient light and a color parameter of a display screen of the terminal; the adjustment module is specifically configured to:
before controlling the color-changing film layer to display according to target color parameters, if the distance is determined to be smaller than a preset threshold value, acquiring illumination parameters of current ambient light;
and determining a target color parameter of the display screen according to the illumination parameter of the current ambient light and the corresponding relation.
In a possible embodiment, the adjusting module is further configured to:
before adjusting the color parameters of the display screen of the terminal to enable the display screen to enter a data protection mode, if the distance is determined to be smaller than a preset threshold value, displaying prompt information; the prompt information is used for prompting a user whether to select to enter a data protection mode;
and determining the confirmation operation of the user for the prompt information.
In a possible embodiment, the adjusting module is further configured to:
if the distance is smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal to enable the display screen to enter a data protection mode, and if the unauthorized user does not exist in the shooting range of the terminal, adjusting the color parameter of the display screen of the terminal to enable the display screen to be switched to a normal display mode; when the display screen is in a normal display mode, a user can normally view the content displayed by the display screen;
if the distance between the terminal and the unauthorized user is larger than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into the normal display mode.
In a third aspect, a data processing apparatus is provided, including:
at least one processor, and
a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the at least one processor implementing the method of any one of the first aspect by executing the instructions stored by the memory.
In a fourth aspect, a computer readable storage medium stores computer instructions which, when run on a computer, cause the computer to perform the method of any of the first aspects.
Drawings
Fig. 1A is an application scenario diagram of a data processing method according to an embodiment of the present application;
fig. 1B is a schematic partial cross-sectional view of a display screen provided in an embodiment of the present application;
fig. 2 is a flowchart of a data processing method according to an embodiment of the present application;
fig. 3 is a schematic diagram of an imaging range provided in an embodiment of the present application;
FIG. 4A is a diagram illustrating an example of an interface displaying a first type of prompt information according to an embodiment of the present disclosure;
FIG. 4B is a diagram illustrating an example of an interface displaying a second type of prompt information according to an embodiment of the present application;
fig. 5 is a block diagram of a data processing apparatus according to an embodiment of the present application;
fig. 6 is a block diagram of a data processing device according to an embodiment of the present application.
Detailed Description
In order to better understand the technical solutions provided by the embodiments of the present application, the following detailed description is made with reference to the drawings and specific embodiments.
The prior art mainly prevents that private data from revealing through setting up the anti-peeping membrane on portable mobile terminal, the anti-peeping membrane has adopted superfine shutter structure, can make the scope that the light reflection of penetrating into the anti-peeping membrane goes out diminish, however this kind of mode can only prevent that other people outside certain angle range from seeing the content that the display screen shows, consequently, the mode that sets up the anti-peeping membrane among the prior art can make portable mobile terminal be in the anti-peeping mode always, portable mobile terminal can't normally show.
In view of this, the present application provides a data processing method, which can be executed by a terminal, where the terminal may be, for example, a mobile phone, a personal computer, a smart watch, a tablet computer, or the like. The following describes application scenarios related to embodiments of the present application.
Referring to fig. 1A, for an application scenario schematic diagram of a data processing method provided in the embodiment of the present application, or may be understood as a structural example diagram of a terminal, the terminal 110 includes a camera 120 and a display 130. The camera 120 may be a front camera or a rear camera.
In a possible embodiment, the display 130 may be a display with a color-changing function, and in order to more clearly illustrate the structure of the display 130, the following is a schematic partial cross-sectional view of the display provided in the embodiment of the present application shown in fig. 1B, and the possible cross-sectional structure of the display 130 is exemplified:
the display screen 130 comprises a display module 140 and a color-changing film layer 150, wherein the color-changing film layer 150 is arranged on the display module 140, and the term "upper" means that the side of the display screen 130 which is relatively closer to a user is viewed by the user. The color-changing thin film layer 150 may be, for example, electrochromic glass or thermochromic glass, wherein the electrochromic glass may undergo reversible changes in color and transparency under the action of an applied electric field, and the thermochromic glass may undergo reversible changes in color and transparency under the control of an applied temperature. The display module 140 refers to various components of the display 130 required for normal display, and is not described herein.
The terminal 110 responds to a triggering operation of a user on target data, the camera 120 starts to detect whether an unauthorized user exists in a camera shooting range, and if the unauthorized user exists and the distance between the terminal 110 and the unauthorized user is smaller than a preset threshold value, the display screen 130 is switched to a data protection mode, so that the unauthorized user cannot view contents displayed on the display screen 130 from any angle, and data is prevented from being peeped. The process of entering the data protection mode for the specific display screen 130 will be described below.
The terminal 110 may execute the data processing method according to the embodiment of the present application at any time, or, considering that a user may not want to be interfered by the data protection mode, in this embodiment of the present application, the terminal 110 does not execute the data processing method according to the embodiment of the present application in response to the closing operation of the data protection mode, and the terminal 110 executes the data processing method according to the embodiment of the present application in response to the opening operation of the data protection mode. For example, a user opens a particular application in terminal 110 in which a data protection mode may be turned on or off. The terminal 110 may automatically turn on the data protection mode when the user does not make any setting, i.e., by default.
Taking the application scenario discussed in fig. 1A as an example, when the data protection mode is turned on, a data processing method related to the embodiment of the present application is described below. Referring to fig. 2, a flowchart of a data processing method according to an embodiment of the present application is shown, where the method includes:
s210, responding to the trigger operation of the target data, and detecting whether an unauthorized user exists in the shooting range of the terminal.
The target data referred to in the present application is data that needs to be protected and is set by a user in advance, and the type of the target data may be one or more of an application, a photo, a video, a file, and a folder. The trigger operation includes one or more of an open operation, a view operation, and an edit operation, the open operation includes a user clicking an application, a file, etc., the view operation includes a user browsing a video, a photo, etc., the edit operation includes a user inputting information on a chat interface, inputting a password on a payment interface, etc. The terminal 110 may add or delete target data in response to a setting operation of the target data by the user, for example, the user opens a specific application in the terminal 110 in which the target data may be added or deleted.
In response to a trigger operation performed by a user on target data, the terminal 110 may detect whether an unauthorized user is present within a camera range of the terminal 110 through a face image matching technique to determine whether to turn on a data protection mode. The unauthorized user is a user not in the authorized user list, and the authorized user is a user which is preset by the user and can view the target data. The terminal 110 may have one or more face images of authorized users pre-stored therein, may be at least one face image of authorized users obtained by the terminal 110 in response to a setting operation of the user, or the terminal 110 may automatically set the face image of authorized users, for example, the terminal 110 may automatically set contacts in various social applications stored by the user as authorized users, and may also capture and store the face image of at least one contact from the social applications. Further, the terminal 110 may add or delete the stored face image of the authorized user in response to a setting operation of the face image of the authorized user by the user, for example, the user opens a specific application in the terminal 110 in which the face image of the authorized person may be added or deleted.
Specifically, when the terminal 110 detects that the user triggers the target data, for example, the terminal 110 detects that a certain application or a certain interface is running. The camera 120 is turned on, detects at least one face image within the camera range of the terminal 110, for example, the camera 120 captures an image within the camera range thereof, the terminal 110 recognizes the at least one face image in the image, and compares each face image in the at least one face image with a face image of each authorized user. The camera shooting range can be understood as the maximum range that the camera 120 in the terminal 110 can capture, and the range can be understood as the angle range that the terminal 110 can shoot, and is generally 60 degrees to 80 degrees. It should be noted that, when the terminal 110 includes a plurality of cameras, a union of maximum acquisition ranges of the plurality of cameras is regarded as an acquisition range of the terminal 110, or a union of maximum acquisition ranges of the cameras to which the data processing method in the embodiment of the present application has authority to access is regarded as an acquisition range of the terminal 110. Referring to fig. 3, an exemplary diagram of a shooting range provided in the embodiment of the present application is shown, where an included angle range between two straight lines is a shooting range of the camera 120.
If each detected face image in the at least one face image can determine a matched face image in the pre-stored face images of the authorized users, the terminal 110 determines that no unauthorized user exists in the camera shooting range of the terminal. If one face image exists in at least one detected face image and a matched face image cannot be determined in the pre-stored face images of the authorized users, the terminal 110 determines that an unauthorized user exists in the camera shooting range of the terminal.
The following describes an example of a manner of matching face images, taking matching one of at least one detected face image as an example:
the terminal 110 extracts the face image and the face features of the face image of each authorized user, and calculates the similarity between the face features of the face image and the face features of the face image of each authorized user, for example, calculates the euclidean distance or the cosine similarity. If the similarity between the facial features of the facial image and the facial features of the facial image of an authorized user is greater than a preset threshold value, the facial image is matched with the facial image of the authorized user, otherwise, the facial image is not matched with the facial image of the authorized user.
After the detected face images are matched, if it is determined that an unauthorized user does not exist in the image pickup range of the terminal, which indicates that the data is not at risk of being peeped, the terminal 110 does not perform any operation, so that the user normally views the target data. If the terminal 110 determines that there is an unauthorized user in its imaging range, which indicates that there is a risk of data being peeped, step S220 is performed hereinafter.
And S220, if an unauthorized user exists in the camera shooting range of the terminal, determining the distance between the terminal and the unauthorized user.
If it is determined that an unauthorized user exists in the camera shooting range of the terminal 110, the unauthorized user may not be able to clearly see the content displayed on the display screen 130 due to the influence of the distance, so that in the embodiment of the present application, the distance between the terminal 110 and the unauthorized user needs to be determined, so as to prevent the terminal 110 from starting the data protection mode and influencing the normal use of the user under the condition that the unauthorized user cannot clearly see the content displayed on the display screen 130. The distance between the terminal 110 and the unauthorized user may be a straight line distance between a projected point of the terminal 110 on the ground and a projected point of the unauthorized user on the ground, or a vertical distance between a horizontal line where the terminal 110 is located and a horizontal line where the unauthorized user is located.
Specifically, the terminal 110 has a distance sensor therein, and the distance between the terminal 110 and an unauthorized user is detected by the distance sensor. The distance sensor obtains the distance between the terminal 110 and the unauthorized user by calculating the time from when the energy beam is transmitted to when the energy beam is reflected back by the unauthorized user. Energy beams such as electromagnetic waves, ultrasonic waves, acoustic waves, infrared light, and the like.
Alternatively, the terminal 110 determines the distance of the terminal 110 from the unauthorized user in accordance with the size ratio of the detected face image. For example, if the area ratio of the rectangular frame where the detected face image is located to the whole image is 1:10, the distance between the terminal 110 and the unauthorized user is 10 meters; if the area ratio of the rectangular frame in which the detected face image is located to the entire image is 3:10, the distance between the terminal 110 and the unauthorized user is 3 meters.
After determining the distance between the terminal 110 and the unauthorized user, the terminal 110 compares the distance with a preset threshold to determine whether the unauthorized user can see the contents displayed on the display 130. The preset threshold is set by the user through a plurality of trials, and may be, for example, the maximum distance that the user can see the content displayed on the display 130 from various angles. For the unauthorized users corresponding to different angles, the corresponding preset thresholds may be different or the same, for example, the maximum distances at which the users see the content displayed on the display screen 130 from different angles are different, the maximum distances corresponding to different angles are set as the preset thresholds corresponding to the angles, or the maximum value among the maximum distances corresponding to different angles is set as the preset threshold corresponding to each angle.
If the distance between the terminal 110 and the unauthorized user is greater than a preset threshold. In this case, although there is an unauthorized user in the image capturing range of the terminal 110, the distance between the unauthorized user and the terminal 110 is too far to see the content displayed on the display 130, which means that there is no risk of peeping the target data, and the terminal 110 does not perform any operation, so that the user can view the target data normally. If the distance between the terminal 110 and the unauthorized user is less than the preset threshold. In this case, an unauthorized user is present in the imaging range of the terminal 110, and the unauthorized user can see the content displayed on the display 130, indicating that the target data is at risk of being peeped, and execute step S230 below.
It should be noted that there may be one or more unauthorized users, and when there are a plurality of unauthorized users, the terminal 110 may detect the distance to each unauthorized user separately. As long as there is an unauthorized user whose distance from the terminal is smaller than the corresponding preset threshold, it is determined that the distance between the terminal 110 and the unauthorized user is smaller than the preset threshold.
And S230, if the distance is determined to be smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to enable the display screen to enter a data protection mode.
If it is determined that an unauthorized user exists in the camera shooting range of the terminal 110 and the distance between the terminal 110 and the unauthorized user is smaller than a preset threshold, the color parameter of the display screen 130 of the terminal 110 is adjusted so that the display screen 130 enters a data protection mode. When the display screen 130 is in the data protection mode, an unauthorized user cannot view the content displayed on the display screen 130 from any angle, so that data is prevented from being peeped.
In a possible embodiment, before the display screen 130 enters the data protection mode, in order to improve user experience, the terminal 110 may perform a reminding operation, so as to avoid that the display screen 130 enters the data protection mode without the user's knowledge, which affects the user's use. Wherein the reminding operation comprises one or more of the following steps:
1. and displaying the first prompt message.
To enter the data protection mode as soon as possible, a first type of prompt is used to prompt the user that the display screen 130 is about to enter the data protection mode. The content of the first type of prompt message is, for example, "find the data is at risk of being peeped, and enter the data protection mode after 3 seconds". After the first prompt message is displayed, the display 130 will automatically enter the data protection mode after 3 seconds.
2. And displaying the second prompt message.
Since the user may newly recognize the authorized person but has not been stored in the terminal 110, in order to avoid frequently entering the data protection mode and affecting the normal use of the user, the second prompting message is used to prompt the user whether to select to enter the data protection mode. The content of the second type of prompt message is, for example, "find the data is at risk of being peeped, confirm to enter the data protection mode? ".
After the display 130 displays the second prompt message, when the terminal 110 confirms the confirmation operation performed by the user for the second prompt message, the display 130 is switched to the data protection mode. When the terminal 110 confirms the unconfirmed operation of the user with respect to the second prompt information, the display screen 130 does not enter the data protection mode, and displays the previously displayed content, which is the content displayed by the display screen 130 before the second prompt information pops up. For example, when the user views the target photo, the display screen 130 pops up the second prompt information, and in response to the user performing an unconfirming operation on the second prompt information, the display screen 130 displays the target photo that the user previously viewed.
In order to avoid an unauthorized user viewing the target data using the terminal 110, the terminal 110 determines whether the user currently using the terminal 110 is an authorized user before confirming the confirmation or non-confirmation operation of the user for the second prompt information. If the user currently using the terminal 110 is determined to be an authorized user, the terminal 110 responds to the user to confirm or not confirm the second prompt message.
Further, after the preset time is exceeded, the terminal 110 does not detect any operation of the user, and automatically switches the display screen 130 to the data protection mode. For example, the preset time is 10 seconds, and within 10 seconds, after the terminal 110 confirms the confirmation operation of the user for the prompt information, the display screen 130 is switched to the data protection mode. Or the user does not perform any operation within 10 seconds, and after 10 seconds, the terminal 110 automatically switches the display screen 130 to the data protection mode.
Referring to fig. 4A, an example of an interface for displaying first prompt information provided in the present application is shown, where only the prompt information exists in the interface, and no other keys exist, and the display screen 130 is automatically switched to the data protection mode. Referring to fig. 4B, there are schematic diagrams of an interface for displaying second prompt information according to an embodiment of the present application, where the interface includes a prompt information "confirm" button 401 and a "cancel" button 402. When the user clicks the "confirm" button 401, the user performs a confirmation operation on the second prompt information, and the user selects to enter the data protection mode; when the user clicks the "cancel" button 402, this corresponds to an unconfirming operation performed by the user for the second prompt information, and represents that the user selects not to enter the data protection mode.
3. The display 130 is controlled to blink at a certain frequency, for example, the terminal 110 controls the display 130 to blink once per second for 3 seconds.
4. Vibration is performed, for example, the terminal 110 is continuously vibrated for 3 seconds.
5. The flash is controlled to flash at a certain frequency, for example, the flash of the camera 120 controlled by the terminal 110 flashes once per second for 3 seconds.
6. Issuing an alert tone, e.g. the player of the terminal 110 issues an alert tone: "find the data is peeped at risk, enter data protection mode after 3 seconds".
Further, the terminal 110 may perform one or more alerting operations or may not perform the alerting operation in response to a user's setting operation for the data protection mode. For example, the user opens a specific application in the terminal 110, sets whether to perform a reminder operation in the specific application, or sets to perform one or more reminder operations.
The terminal 110 adjusts the color parameters of the display 130 to cause the display 130 to enter a data protection mode. The color parameter may be a color, such as black, white, etc. The color parameter may be transparency, which refers to the transmittance of light through the color-changing film layer 150, such as 100%, 0%, etc., wherein 100% transparency is a fully transparent mode and 0% transparency is an opaque mode.
The target color parameters for controlling the display 130 may be fixed or dynamically determined, as exemplified below:
first, the target color parameters are dynamically determined.
The terminal 110 prestores a corresponding relationship between the illumination parameter of the ambient light and the color parameter of the display screen 130, and the target color parameter of the display screen 130 is dynamically determined according to the illumination parameter of the current ambient light and the corresponding relationship. The lighting parameter may be a color, such as white, yellow, etc. The illumination parameter may be illumination intensity, which is used to indicate the intensity of illumination, such as 100000 lux for summer sunlight and 10000 lux for cloudy outdoor sunlight.
If the target color parameters of the display screen 130 are different, the illumination parameters of the ambient light to be obtained are different, and specific examples are described as follows:
(1) when the terminal 110 needs to adjust the color of the display screen 130 to achieve the purpose of data protection, the terminal 110 may collect the illumination parameter of the ambient light as the color, and determine the target color parameter of the display screen 130 according to the color and the corresponding relationship.
For example, the corresponding relationship is: the color of the ambient light is yellow and the color parameter of the display screen 130 is yellow.
(2) When the terminal 110 needs to adjust the transparency of the display screen 130 to achieve the purpose of data protection, the terminal 110 may collect the illumination parameter of the ambient light as the illumination intensity, and determine the target color parameter of the display screen 130 according to the illumination intensity and the corresponding relationship.
For example, the corresponding relationship is: the illumination intensity of the ambient light is 10000 lux, and the color parameter of the display screen 130 is transparency 50%; the illumination intensity of the ambient light is 100 lux, and the color parameter of the display screen 130 is transparency 20%.
(3) When the terminal 110 needs to adjust the color and the transparency of the display screen 130 to achieve the purpose of data protection, the terminal 110 may collect the illumination parameters of the ambient light as the color and the illumination intensity, and determine the target color parameter of the display screen 130 according to the color, the illumination intensity, and the corresponding relationship.
For example, the corresponding relationship is: the color of the ambient light is yellow, the illumination intensity is 10000 lux, and the target color parameter of the display screen 130 is yellow and the transparency is 20%.
Second, the target color parameters are fixed.
The target color parameters for the display screen 130 to enter the data protection mode are fixed regardless of the color and illumination intensity of the ambient light. For example, the target color parameter of the display screen 130 is black and the transparency is 0%.
After determining the target color parameters of the display screen 130, the terminal 110 may control the color-changing film layer to display the color-changing film layer according to the target color parameters. For example, if the color-changing thin film layer 150 is electrochromic glass, the terminal 110 applies an electrical signal to the color-changing thin film layer 150 to display the color-changing thin film layer 150 according to the target color parameters. Or the color-changing film layer 150 is thermochromic glass, the terminal 110 controls the temperature of the color-changing film layer 150 to display the color-changing film layer 150 according to the target color parameter. For example, the terminal 110 may control the temperature of the thermochromic glass by passing a thermistor in the thermochromic glass.
After the terminal 110 switches the display 130 to the data protection mode, the user may adjust the position or angle, continue to detect whether there is an unauthorized user within the image capture range of the terminal 110, and determine the distance between the terminal 110 and the unauthorized user to determine whether the risk of data being peeped is removed. For the way of detecting the unauthorized user and the way of determining the distance between the terminal 110 and the unauthorized user, please refer to the above discussion, which is not repeated herein.
When an unauthorized user does not exist in the camera shooting range of the terminal 110 or the distance between the terminal 110 and the unauthorized user is greater than a preset threshold value, the risk that data is peeped is eliminated, and the color parameter of the display screen 130 is adjusted, so that the display screen 130 is switched to a normal display mode. Wherein, when the display screen 130 is in the normal display mode, the user can normally view the content displayed on the display screen 130. For example, when the terminal 110 detects that the user opens the target photo, the display screen 130 enters a data protection mode, and when the risk of peeping data is removed and the display screen 130 is in a normal display mode, the display screen 130 continues to display the target photo.
Specifically, the terminal 110 may store the color parameter of the display 130 before entering the data protection mode, and adjust the color parameter of the display 130 to the color parameter before switching. Or the terminal 110 may directly adjust the color parameters of the display 130 to a fixed color and a fixed transparency. For example, in the data protection mode, the target color parameter of the display 130 is black and the transparency is 0%, and in the normal display mode, the color parameter of the display 130 is white and the transparency is 100%.
Based on the same inventive concept, the present application provides a data processing apparatus, which is equivalently disposed in the terminal 110 discussed above, where the terminal 110 includes a display screen, please refer to fig. 5, and the apparatus includes:
a detection module 501, configured to detect whether an unauthorized user exists in a camera shooting range of a terminal in response to a trigger operation performed on target data;
a determining module 502, configured to determine, if an unauthorized user exists within a camera shooting range of a terminal, a distance between the terminal and the unauthorized user;
the adjusting module 503 is configured to adjust a color parameter of a display screen of the terminal if the distance is determined to be smaller than the preset threshold, so that the display screen enters a data protection mode.
In one possible embodiment, the device is pre-stored with facial images of each authorized user; the detection module 501 is specifically configured to:
detecting at least one face image in a shooting range of the terminal in response to a trigger operation performed on the target data;
and if one face image exists in at least one detected face image and the matched face image cannot be determined in the pre-stored face images of the authorized users, determining that the unauthorized user exists in the shooting range of the terminal.
In one possible embodiment, the display screen comprises a display module and a color-changing film layer arranged on the display module; the adjusting module 503 is specifically configured to:
and if the determined distance is smaller than the preset threshold value, controlling the color-changing film layer so that the color-changing film layer is displayed according to the target color parameters.
In a possible embodiment, the device prestores a corresponding relation between an illumination parameter of ambient light and a color parameter of a display screen of the terminal; the adjusting module 503 is specifically configured to:
before controlling the color-changing film layer to display according to the target color parameters, if the determined distance is smaller than a preset threshold value, acquiring the illumination parameters of the current ambient light;
and determining a target color parameter of the display screen according to the illumination parameter and the corresponding relation of the current ambient light.
In a possible embodiment, the adjusting module 503 is further configured to:
before adjusting the color parameters of a display screen of the terminal to enable the display screen to enter a data protection mode, if the distance is smaller than a preset threshold value, displaying prompt information; the prompt message is used for prompting the user to enter a data protection mode.
In a possible embodiment, the adjusting module 503 is further configured to:
if the distance is smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal to enable the display screen to enter a data protection mode, and if an unauthorized user does not exist in the camera shooting range of the terminal, adjusting the color parameter of the display screen of the terminal to enable the display screen to be switched to a normal display mode; when the display screen is in a normal display mode, a user can normally view the content displayed by the display screen;
and if the distance between the terminal and the unauthorized user is greater than a preset threshold value, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into the normal display mode.
It should be noted that, the data processing apparatus in the embodiment of the present application may implement the data processing method discussed above, and details are not described here.
Based on the same inventive concept, an embodiment of the present application provides a data processing apparatus, please refer to fig. 6, which can be used to implement the functions of the terminal 110 discussed above, and the apparatus includes:
at least one processor 601, and
a memory 602 communicatively coupled to the at least one processor 601;
wherein the memory 602 stores instructions executable by the at least one processor 601, the at least one processor 601 implementing the data processing method as discussed above by executing the instructions stored by the memory 602.
The processor 601 may be a Central Processing Unit (CPU), or one or more combinations of a digital processing unit, an image processor, and the like. The memory 602 may be a volatile memory (volatile memory), such as a random-access memory (RAM); the memory 602 may also be a non-volatile memory (non-volatile memory) such as, but not limited to, a read-only memory (rom), a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD), or any other medium which can be used to carry or store desired program code in the form of instructions or data structures and which can be accessed by a computer. The memory 602 may be a combination of the above.
As an example, the processor 601 in fig. 6 may implement the data processing method discussed above, and the processor 601 may also implement the functions of the apparatus discussed above in fig. 5, or may also be used to implement the functions of the terminal 110 discussed above.
Based on the same inventive concept, embodiments of the present application provide a computer-readable storage medium storing computer instructions that, when executed on a computer, cause the computer to perform the data processing method as discussed above.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. The data processing method is characterized in that the data processing method is applied to a terminal, the terminal comprises a display screen, the display screen comprises a display module and a color-changing film layer arranged on the display module, the terminal is pre-stored with a corresponding relation between an illumination parameter of ambient light and a color parameter of the display screen, and the method comprises the following steps:
responding to trigger operation of target data, and detecting whether an unauthorized user exists in a camera shooting range of the terminal, wherein the unauthorized user is a user who is not in an authorized user list, and the authorized user list is automatically set according to contacts in various social applications;
if the unauthorized user exists in the camera shooting range of the terminal, determining the distance between the terminal and the unauthorized user according to the area ratio of the rectangular frame where the detected face image is located and the whole image;
if the distance is smaller than a preset threshold value, acquiring an illumination parameter of the current ambient light, and determining a target color parameter of the display screen according to the illumination parameter of the current ambient light and the corresponding relation; and controlling the color-changing film layer to display according to target color parameters so that the display screen enters a data protection mode, wherein the preset threshold value is the maximum distance for a user to clearly see the content displayed by the display screen from all angles.
2. The method of claim 1, wherein the terminal is pre-stored with facial images of each authorized user; responding to the trigger operation of the target data, and detecting whether an unauthorized user exists in the camera shooting range of the terminal, wherein the method comprises the following steps:
detecting at least one face image in the shooting range of the terminal in response to the trigger operation of the target data;
and if one face image exists in at least one detected face image and the matched face image cannot be determined in the pre-stored face images of the authorized users, determining that the unauthorized user exists in the shooting range of the terminal.
3. The method of claim 1 or 2, wherein before adjusting the color parameters of the display screen of the terminal to cause the display screen to enter a data protection mode, the method further comprises:
if the distance is determined to be smaller than a preset threshold value, displaying prompt information; and the prompt information is used for prompting the user to enter a data protection mode.
4. The method according to claim 1 or 2, wherein after adjusting the color parameter of the display screen of the terminal to make the display screen enter the data protection mode if the distance is determined to be less than the preset threshold, the method further comprises:
if the unauthorized user does not exist in the camera shooting range of the terminal, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into a normal display mode; when the display screen is in a normal display mode, a user can normally view the content displayed by the display screen;
and if the distance between the terminal and the unauthorized user is greater than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into a normal display mode.
5. The utility model provides a data processing device, its characterized in that, the device sets up in the terminal, the terminal includes the display screen, the display screen includes display module assembly and sets up thin layer that discolours on the display module assembly, the device prestore ambient light's illumination parameter with the corresponding relation of the colour parameter of display screen, the device includes:
the detection module is used for responding to trigger operation of target data and detecting whether an unauthorized user exists in a camera shooting range of the terminal, wherein the unauthorized user is a user who is not in an authorized user list, and the authorized user list is automatically set according to contacts in various social applications;
the determining module is used for determining the distance between the terminal and the unauthorized user according to the area ratio of the rectangular frame where the detected face image is located and the whole image if the unauthorized user exists in the shooting range of the terminal;
and the adjusting module is used for acquiring the illumination parameter of the current environment light if the distance is determined to be smaller than a preset threshold value, determining the target color parameter of the display screen according to the illumination parameter of the current environment light and the corresponding relation, and controlling the color-changing film layer so as to display the color-changing film layer according to the target color parameter, so that the display screen enters a data protection mode, wherein the preset threshold value is the maximum distance from which a user clearly sees the content displayed by the display screen from all angles.
6. The apparatus of claim 5, wherein the apparatus is pre-stored with facial images of each authorized user; the detection module is specifically configured to:
detecting at least one face image in the shooting range of the terminal in response to the trigger operation of the target data;
and if one face image exists in at least one detected face image and the matched face image cannot be determined in the pre-stored face images of the authorized users, determining that the unauthorized user exists in the shooting range of the terminal.
7. The apparatus of claim 5 or 6, wherein the adjustment module is further to:
before adjusting the color parameters of the display screen of the terminal to enable the display screen to enter a data protection mode, if the distance is determined to be smaller than a preset threshold value, displaying prompt information; and the prompt information is used for prompting the user to enter a data protection mode.
8. The apparatus of claim 5 or 6, wherein the adjustment module is further to:
if the distance is smaller than the preset threshold value, adjusting the color parameter of the display screen of the terminal to enable the display screen to enter a data protection mode, and if the unauthorized user does not exist in the shooting range of the terminal, adjusting the color parameter of the display screen of the terminal to enable the display screen to be switched to a normal display mode; when the display screen is in a normal display mode, a user can normally view the content displayed by the display screen;
and if the distance between the terminal and the unauthorized user is greater than the preset threshold value, adjusting the color parameter of the display screen of the terminal so as to switch the display screen into a normal display mode.
9. A data processing apparatus, characterized by comprising:
at least one processor, and
a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the at least one processor implementing the method of any one of claims 1-4 by executing the instructions stored by the memory.
10. A computer-readable storage medium having stored thereon computer instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1-4.
CN202011618833.6A 2020-12-31 2020-12-31 Data processing method, device, equipment and medium Active CN112765689B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011618833.6A CN112765689B (en) 2020-12-31 2020-12-31 Data processing method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011618833.6A CN112765689B (en) 2020-12-31 2020-12-31 Data processing method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN112765689A CN112765689A (en) 2021-05-07
CN112765689B true CN112765689B (en) 2022-02-15

Family

ID=75698126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011618833.6A Active CN112765689B (en) 2020-12-31 2020-12-31 Data processing method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN112765689B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113849148B (en) * 2021-10-15 2022-11-22 西安科芮智盈信息技术有限公司 Picture display method and device, display equipment and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194303A (en) * 2010-03-15 2011-09-21 鸿富锦精密工业(深圳)有限公司 Electronic device and method for monitoring reading state of user
CN102914286A (en) * 2012-09-12 2013-02-06 福建网龙计算机网络信息技术有限公司 Method for automatically detecting user sitting posture based on handheld equipment
CN105205086A (en) * 2014-06-30 2015-12-30 小米科技有限责任公司 Sharing method and device for application program using information
CN106910121A (en) * 2015-12-23 2017-06-30 阿里巴巴集团控股有限公司 Generation account recording method and device
CN108268188A (en) * 2018-01-31 2018-07-10 维沃移动通信有限公司 The control method and mobile terminal of a kind of display screen
CN108830164A (en) * 2018-05-22 2018-11-16 北京小鱼在家科技有限公司 Reminding method, device, computer equipment and the storage medium of screen viewed status

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2536074T3 (en) * 2009-01-29 2015-05-20 Koninklijke Philips N.V. Lighting control system sensitive to ambient lighting conditions
CN102169682B (en) * 2011-03-18 2014-10-22 中兴通讯股份有限公司 Terminal, ambient light adapting method and system
CN102769822A (en) * 2011-05-05 2012-11-07 广州三星通信技术研究有限公司 Visual effect display method and mobile communication terminal using same
CN103955650A (en) * 2014-05-04 2014-07-30 合肥联宝信息技术有限公司 Method and device for preventing peeping through regulating screen luminance
CN105550554B (en) * 2015-07-28 2019-01-15 宇龙计算机通信科技(深圳)有限公司 A kind of glance prevention method and mobile terminal
CN105389527B (en) * 2015-10-27 2019-10-08 努比亚技术有限公司 The Anti-peeping device and method of mobile terminal
CN107783887B (en) * 2017-10-19 2019-12-10 维沃移动通信有限公司 Control method of mobile terminal and mobile terminal
CN107645610B (en) * 2017-10-19 2020-07-03 维沃移动通信有限公司 Control method of mobile terminal and mobile terminal
CN112099281A (en) * 2020-09-17 2020-12-18 努比亚技术有限公司 Electrochromic film control method, apparatus and computer-readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194303A (en) * 2010-03-15 2011-09-21 鸿富锦精密工业(深圳)有限公司 Electronic device and method for monitoring reading state of user
CN102914286A (en) * 2012-09-12 2013-02-06 福建网龙计算机网络信息技术有限公司 Method for automatically detecting user sitting posture based on handheld equipment
CN105205086A (en) * 2014-06-30 2015-12-30 小米科技有限责任公司 Sharing method and device for application program using information
CN106910121A (en) * 2015-12-23 2017-06-30 阿里巴巴集团控股有限公司 Generation account recording method and device
CN108268188A (en) * 2018-01-31 2018-07-10 维沃移动通信有限公司 The control method and mobile terminal of a kind of display screen
CN108830164A (en) * 2018-05-22 2018-11-16 北京小鱼在家科技有限公司 Reminding method, device, computer equipment and the storage medium of screen viewed status

Also Published As

Publication number Publication date
CN112765689A (en) 2021-05-07

Similar Documents

Publication Publication Date Title
US10469830B2 (en) Unauthorized viewer detection system and method
US10284773B2 (en) Method and apparatus for preventing photograph from being shielded
US20230412911A1 (en) Method of controlling camera device and electronic device thereof
WO2017059634A1 (en) Method and device for adjusting displayed image
US8600110B1 (en) Unauthorized viewer detection system and method
WO2018058813A1 (en) Electronic device and display method
WO2018058373A1 (en) Control method and apparatus for electronic device, and electronic device
CN106527682B (en) Method and device for switching environment pictures
CN110662095A (en) Screen projection processing method and device, terminal and storage medium
CN105447422A (en) Method for protecting user privacy and terminal
US20180114493A1 (en) Electronic Device with Display-Based Image Compensation and Corresponding Systems and Methods
CN108073328B (en) Touch response method and device
US11372516B2 (en) Method, device, and storage medium for controlling display of floating window
WO2020233201A1 (en) Icon position determination method and device
CN111241890A (en) Fingerprint identification method, device, equipment and storage medium
KR20190111034A (en) Feature image acquisition method and device, and user authentication method
CN111588354A (en) Body temperature detection method, body temperature detection device and storage medium
KR102365995B1 (en) Display device capable of automatically adjusting displayed image and method thereof
CN112219387B (en) Terminal device and image acquisition method
JP2010277205A (en) Information processing device, method and program
CN112765689B (en) Data processing method, device, equipment and medium
KR101550493B1 (en) Portable terminal with a function of eye protection
CN112492103A (en) Terminal peep-proof method and device and storage medium
CN108132733A (en) Touch panel, electronic equipment
CN108491834A (en) Fingerprint identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230525

Address after: Unit A916, Building 2 (Entrepreneurship Building A), Tsinghua Science and Technology Park (Zhuhai), No. 101 Daxue Road, Tangjiawan Town, National High tech Development Zone, Zhuhai City, Guangdong Province, 519080

Patentee after: Zhuhai Aviv Information Technology Co.,Ltd.

Patentee after: GREE ELECTRIC APPLIANCES Inc. OF ZHUHAI

Address before: 519070 No. 789 Jinji Road West, Zhuhai, Guangdong

Patentee before: GREE ELECTRIC APPLIANCES Inc. OF ZHUHAI

TR01 Transfer of patent right