CN105138879A - Method and device for controlling use permission of software - Google Patents
Method and device for controlling use permission of software Download PDFInfo
- Publication number
- CN105138879A CN105138879A CN201510463074.3A CN201510463074A CN105138879A CN 105138879 A CN105138879 A CN 105138879A CN 201510463074 A CN201510463074 A CN 201510463074A CN 105138879 A CN105138879 A CN 105138879A
- Authority
- CN
- China
- Prior art keywords
- user
- retinue
- software
- age
- predetermined threshold
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Image Analysis (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses a method and device for controlling use permission of software. The method comprises the following steps: S1100, acquiring an image comprising a user of the software; S1300, identifying the age of the user based on the image, judging whether the age of the user is more than or equal to a first predetermined threshold value or not, if not, performing a Step 1500, and if so, performing a step S1700; S1500, determining whether the use permission of the software is opened to the user or not according to a first predetermined strategy, and performing corresponding operations according to a decision result; and S1700, opening the user permission of the software to the user. By means of the method and the device disclosed by the invention, software use permissions of people of different ages can be controlled according to different strategies; and thus, reasonable use of the software by juveniles is automatically controlled while adults can use the software freely.
Description
Technical field
The present invention relates to computer realm, be specifically related to a kind of method and apparatus of control software design rights of using.
Background technology
Along with popularizing of the electronic equipments such as personal computer, notebook, panel computer, mobile phone, game machine, the chance that minor's contact runs on the various softwares on these electronic equipments gets more and more, such as system software and application software (APP).Because minor's intelligence is not yet physically well developed, a lot of APP (such as: some Games Software, some social software etc.) due to containing the information such as supertition, violence and be not suitable for minor use.In addition, minor's curiosity is strong, may revise unintentionally or delete system software.
But current software is not high for the use restriction of user.For solving the above-mentioned technical matters existed in prior art, be necessary the method and apparatus proposing a kind of control software design rights of using.
Summary of the invention
In view of the above problems, the present invention is proposed to provide a kind of method and apparatus of the control software design rights of using solved the problem at least in part.
According to one aspect of the invention, provide a kind of method of control software design rights of using.The method comprises:
Step S1100: gather the image comprising the user of software;
Step S1300: based on the age of this user of this image recognition, judges whether the age of this user is more than or equal to the first predetermined threshold, if not, then performs step S1500, if so, then performs step S1700;
Step S1500: determine the rights of using whether open this software to this user according to the first predetermined policy, and according to determination result execution corresponding operating; And
Step S1700: the rights of using opening this software to this user.
Alternatively, this step S1500 comprises further:
Step S1510: detect whether there is retinue on the side of this user based on this image, if so, then performs step S1530, if not, then performs step S1550;
Step S1530: detect this retinue and whether meet pre-conditioned, if so, then performs step S1700, if not, then performs step S1550; And
Step S1550: refuse the rights of using opening this software to this user.
Alternatively, this is pre-conditioned comprises: in this retinue, there is at least one the retinue that the age is more than or equal to the second predetermined threshold, wherein, this second predetermined threshold is greater than this first predetermined threshold based on this image recognition the age of this retinue.
Alternatively, this pre-conditionedly comprises further: it is live body that existing, the age is more than or equal at least one position in the retinue of this second predetermined threshold.
Alternatively, this pre-conditionedly comprises further: existing, the age similarity be more than or equal between the face of in the retinue of this second predetermined threshold at least one and the face of this user is more than or equal to the 3rd predetermined threshold.
Alternatively, the age that this second predetermined threshold equals this user adds predetermined value, and this predetermined value is more than or equal to 20.
Alternatively, in this step S1510, whether should there is retinue based on the detection of this image on the side of this user is according to whether also there are other faces in the images except the face of this user.
Alternatively, in this step S1510, should based on this image detect the side of this user whether exist retinue also according to the watching direction of other existing faces and run this software electronic equipment direction between consistance.
Alternatively, in this step S1510, should detect whether there is retinue also according to the relation between the existing distance between other face and faces of this user and the 4th predetermined threshold on the side of this user based on this image.
According to a further aspect of the invention, additionally provide a kind of device of control software design rights of using, comprise image capture module, the first control module, execution module and authorization module.This image capture module is for gathering the image of the user comprising software.This first control module is used for the age based on this user of this image recognition, judges whether the age of this user is more than or equal to the first predetermined threshold, if not, then starts this execution module, if so, then start this authorization module.This execution module is used for the rights of using determining whether open to this user this software according to the first predetermined policy, and according to determination result execution corresponding operating.Authorization module is used for the rights of using opening this software to this user.
The method and apparatus of above-mentioned control software design rights of using, can use the authority of software to carry out the control of Different Strategies to the people of Different age group.This controls the reasonable employment of minor to software while ensureing that adult arbitrarily can use software automatically, avoids minor and is subject to the harmful effect of software or destroys software.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows the process flow diagram of the method for control software design rights of using according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of the method for control software design rights of using in accordance with another embodiment of the present invention;
Fig. 3 shows and detects based on image the process flow diagram that whether there is the step of retinue on the side of user according to an embodiment of the invention;
Fig. 4 shows the process flow diagram detecting retinue according to an embodiment of the invention and whether meet pre-conditioned step;
Fig. 5 shows the schematic block diagram of the device of control software design rights of using according to an embodiment of the invention; And
Fig. 6 shows the schematic block diagram of execution module according to an embodiment of the invention.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
In order to the people effectively controlling Different age group reasonably uses software, the invention provides a kind of method of control software design rights of using.Fig. 1 shows the process flow diagram of the method 1000 of control software design rights of using according to an embodiment of the invention.As shown in Figure 1, the method 1000 comprises step S1100, step S1300, step S1500 and step S1700.
In step S1100, gather the image comprising the user of software.User is the people expecting to use this software.This image comprises the user of software, can be the whole body of user, the upper part of the body or only face.Step S1100 can be implemented as the direct picture comprising the user of software of taking and is used as this image.Step S1100 can also be embodied as capture video, using the frame of the user comprising software as this image.
This step S1100 can be realized by the image capture module of the electronic equipment of operating software, the camera, mobile phone front-facing camera etc. of such as notebook.This step S1100 also can by independently image capture module realization.Such as, by be connected with the electronic equipment of operating software, realize for the image capture module of the device of control software design rights of using.The device of these control software design rights of using can independent of this electronic equipment.
In step S1300, based on the image that step S1100 gathers, identify the age of user, judge whether the age of user is more than or equal to the first predetermined threshold, if not, then perform step S1500, if so, then perform step S1700.First predetermined threshold can according to software the age bracket and state's laws relevant regulations etc. of user that are suitable for preset.In a concrete example, the first predetermined threshold was 18 one full year of life.
Because image comprises the user of software, so, the age of user can be identified based on image.Alternatively, comprise based on the age of image recognition user in step S1300: the face detecting user in the picture, based on the age of face estimation user.Face in image comprises such as pupil, canthus, the corners of the mouth, nose etc. obviously along with the feature of change of age, by analyzing these characteristic expansions in image, can estimate the age of personage in image relatively accurately.Wherein, the age of estimation user can utilize the method at existing various estimation face age, and the method etc. of such as machine learning, does not limit at this.
Be appreciated that with step S1100 similarly, step S1300 can complete in the electronic equipment of operating software, also can be connected with this electronic equipment, for control rights of using device in complete.In addition, step S1300 also can complete at the server being arranged in high in the clouds.At this, the equipment realizing step S1300 is not limited.
In step S1500, determine whether to the rights of using of user's Freeware according to the first predetermined policy, and perform corresponding operating according to determination result.Thus, the rights of using of user for software can be controlled.
According to a concrete example, this step S1500 can comprise: directly refusal is to the rights of using of user's Freeware.In other words, the first predetermined policy can comprise direct refusal.In the present embodiment, the rights of using refusing to open to user this software can adopt existing various feasible mode to realize, and do not limit at this.
Step S1700: to the rights of using of user's Freeware.By this step, user obtains the rights of using to software, and it can use arbitrarily this software.In the present embodiment, the rights of using opening this software to user can adopt existing various feasible mode to realize, and do not limit at this.
The method of above-mentioned control software design rights of using may be used for running on any software in the electronic equipments such as personal computer, notebook, panel computer, mobile phone, game machine, comprises stand-alone software and network edition software.Software is various APP such as, especially such as: be usually not suitable for the application software that minor (or the age is lower than people of given age) uses alone when not having adult to guard.Concrete example is as some comprises the game of violence, superstitious content.
The method itself can be realized by the software run in the electronic equipment such as server and/or computing machine (such as APP).Above-mentioned steps S100 to step S400 can carry out before application software commencement of commercial operation, real-time continuous can carry out in application software operational process, also automatically can carry out at regular intervals in application software operational process centre, not limit at this.
The method of above-mentioned control software design rights of using can use the authority of software to carry out the control of Different Strategies to the people of Different age group.This controls the reasonable employment of minor to software while ensureing that adult arbitrarily can use software automatically.
Fig. 2 shows the process flow diagram of the method 2000 of control software design rights of using in accordance with another embodiment of the present invention.As shown in Figure 2, the method 2000 comprises step S2100, step S2300, step S2510, step S2530, step S2550 and step S2700.Step S1100, step S1300 and step S1700 wherein in step S2100, step S2300 and step S2700 and said method 1000 are similar, for simplicity, do not repeat them here.Step S2510 in method 2000, step S2530 and step S2550 realize the function that in said method 1000, step S1500 realizes jointly.
In step S2510, based on the image gathered in step S2100, detect and whether there is retinue on the side of user, if so, then perform step S2530, if not, then perform step S2550.
This detection operation can realize by detecting other people any position whether existed in the picture except user, such as shoulder.Alternatively, whether this detecting step can according to also there are other faces to realize in the picture except the face of user.Alternatively, if existed, then directly judge to there is retinue on the side of user, otherwise otherwise.Comprise the features such as eyes, nose and the mouth with certain positional relationship in face, be convenient to very much detect.And these features are fairly obvious, this makes the false drop rate of Face datection lower.Detect the method that whether also there are other faces in the picture except the face of user, existing various feasible face identification method can be adopted, do not limit at this.
Step S2530: detect retinue and whether meet pre-conditioned, if so, then performs step S2700, if not, then performs step S2550.
When method 2000 performs this step, the age having determined user is less than normal, such as, be minor.Expect to have suitable retinue to use software to accompany it.Here, can set as required pre-conditioned.Such as, there is at least one the retinue that the age is more than or equal to 30 years old in pre-conditioned can being included in retinue.
Step S2550: refuse the rights of using to user's Freeware.By this step, user is prohibited from using this software.In the present embodiment, this step S2550 can adopt existing various feasible mode to realize, and does not limit at this.
By said method 2000, effectively ensure that the use of minor to software carries out under other people monitoring, but not carry out alone.
How to detect whether there is retinue on the side of user based on image to more clearly demonstrate, Fig. 3 shows the process flow diagram of above-mentioned steps S2510 according to an embodiment of the invention.As shown in Figure 3, this step S2510 comprises step S2511, step S2513 and step S2515.
In step S2511, according to whether also there are other faces to detect whether there is retinue on the side of user in the picture except the face of user.If so, then step S2513 is performed.If not, then there is not retinue on the side of user in final judgement, directly performs step S2550.
In step S2513, detect whether there is retinue on the side of user further according to the consistance between the watching direction of other existing faces and the direction of the electronic equipment of operating software.The direction of electronic equipment is the watching direction of user.If the watching direction of at least one is consistent with the direction of electronic equipment in other existing faces, then can infer that user side has at least a retinue accompanying user to use this software, then perform step S2515.If the watching direction of other existing faces is all not consistent with the direction of electronic equipment, although then there is retinue on user side, but this retinue may be busy with other affairs, actual not company user uses this software, therefore, there is not retinue in the side being considered as user, next performs step S2550.
In step S2515, detect whether there is retinue on the side of user further according to the relation between the existing distance between other face and faces of user and the 4th predetermined threshold.Generally speaking, if retinue is accompanying user to use software, the two head can gather closer, can see the screen etc. of electronic equipment preferably.4th predetermined threshold can set according to actual conditions.Such as, the 4th predetermined threshold can be set to slightly larger than the head of a family when instructing and monitoring child uses computer software and the usual distance of child.Exemplarily, the 4th predetermined threshold can be 60 centimetres.Therefore, if the distance in other faces between at least one and the face of user is less than the 4th predetermined threshold, then there is retinue on the side of user in final judgement, performs step S2530.If the distance between other face and faces of user is all more than or equal to the 4th predetermined threshold, then there is not retinue in the side being considered as user, performs step S2550.
Above-mentioned steps S2513, by the detection to retinue's watching direction, ensure that user side exists the retinue accompanying user to use this software really.In other words, ensure that the validity of the company of retinue.The distance of both user and retinue head is utilized to guarantee the validity of the company of retinue further in above-mentioned steps S2515.
One of ordinary skill in the art will appreciate that, process flow diagram shown in Fig. 3 is only the example of step S2510, and unrestricted.Such as, all nonessential existence such as step S2513, step S2515 wherein.Again such as, the execution sequence between each step can not necessarily as shown in the figure.Concrete example as, step S2515 can perform prior to step S2513.
Whether how to detect retinue meet pre-conditioned to more clearly demonstrate, Fig. 4 shows the process flow diagram of above-mentioned steps S2530 according to an embodiment of the invention.As shown in Figure 4, this step S2530 comprises step S2531, step S2533 and step S2535.
Pre-conditioned comprise first pre-conditioned: in retinue, there is at least one the retinue that the age is more than or equal to the second predetermined threshold.In step S2531, judge in retinue, whether to there is at least one the retinue that the age is more than or equal to the second predetermined threshold.If there is no the age is more than or equal to the retinue of the second predetermined threshold, then judge that retinue does not meet pre-conditioned, perform step S2550.If there is the retinue that the age is more than or equal to the second predetermined threshold, then perform step S2533.
Wherein, the age of retinue is based on image recognition.Step based on the age of image recognition retinue can complete in the electronic equipment running this software, can complete, also can complete at the server being arranged in high in the clouds, do not limit at this in the device being specifically designed to control software design rights of using.Alternatively, detect in the picture retinue face and based on face estimation retinue age.
Second predetermined threshold is greater than the first predetermined threshold.Usually, expect that the age of retinue is larger than the age of user, with the effect making retinue play supervision and protection.
Second predetermined threshold can be any real number being greater than the first predetermined threshold, and its concrete numerical value can set according to actual needs.In a concrete example, the second predetermined threshold is set as minimum certain value (such as 16 years old or 18 years old) being used alone the age equaling this software.In another specific example, the age second predetermined threshold being set as equaling this user add predetermined value after the age value that obtains, close with the age of the father and mother making retinue and teenage user, thus guarantee that minor uses related software under the monitoring of father and mother as far as possible.This predetermined value can be more than or equal to 20, such as 25 years old or 30 years old.
Pre-conditioned may further include second pre-conditioned: it is live body that existing, the age is more than or equal at least one position in the retinue of the second predetermined threshold.Live body represents real human body at this, and inhuman photo etc.In step S2533, judge to meet whether at least to there is a retinue in the first pre-conditioned retinue be live body.If existence is the retinue of live body, then perform step S2535.If there is no be the retinue of live body, then perform step S2550.
By increasing the step S2533 of this In vivo detection, can prevent minor from passing through to use the retinue that disguises oneself as such as photo, 3 dimension faceforms to reach the object of gaining software application authority by cheating.In step S2533, various feasible technical scheme can be adopted to carry out In vivo detection to retinue, such as, the method of infrared In vivo detection can be adopted, also random instruction retinue can be adopted to complete certain action (such as nod, shake the head, smile etc.) and the method detected this action, do not limit at this.
Pre-conditioned can further include the 3rd pre-conditioned: existing, the age similarity be more than or equal between the face of in the retinue of the second predetermined threshold at least one and the face of user is more than or equal to the 3rd predetermined threshold.In step S2535, to judge to meet in first pre-conditioned and the second pre-conditioned retinue the whether at least similarity existed between the face of a retinue and the face of user and be more than or equal to the 3rd predetermined threshold.If existed, then judge that retinue meets all pre-conditioned, performs step S2700.If there is no, then step S2550 is performed.
The numerical value of the 3rd predetermined threshold is the assessed value of children and father and mother's similarity, can set according to actual conditions, and exemplarily, the 3rd predetermined threshold can be 50%.By this step S2535, can ensure that retinue is the father and mother of teenage user further, thus guarantee that minor uses related software under the monitoring of father and mother as far as possible.
One of ordinary skill in the art will appreciate that, process flow diagram shown in Fig. 4 is only the example of step S2530, and unrestricted.Such as, all nonessential existence such as step S2531 wherein, step S2533 and step S2535, can judge whether retinue meets by wherein any one or two steps pre-conditioned.Again such as, the execution sequence between each step can not necessarily as shown in the figure.Concrete example as, step S2535 can perform prior to step S2533.
According to a further aspect of the invention, a kind of device of control software design rights of using is additionally provided.Fig. 5 shows the schematic block diagram of the device 5000 of the control software design rights of using according to the present invention's specific embodiment.As shown in Figure 5, device 5000 comprises image capture module 5100, first control module 5300, execution module 5500 and authorization module 5700.
Image capture module 5100 is for gathering the image of the user comprising software.Image capture module 5100 can be the cameras such as monochromatic camera, colour imagery shot.First control module 5300, for the age based on image recognition user, judges whether the age of user is more than or equal to the first predetermined threshold, if not, then starts execution module 5500, if so, then starts authorization module 5700.Alternatively, the first control module 5300 can detect the face of user in the picture, based on the age of face estimation user.Execution module 5500 for determining whether to the rights of using of user's Freeware according to the first predetermined policy, and performs corresponding operating according to determination result.Authorization module 5700 is for the rights of using to user's Freeware.
In the device 5000 that this provides, the first control module 5300, execution module 5500 and authorization module 5700 can realize with various feasible software, hardware, firmware or their combination.Each module can be realized by various processing unit, computing machine or the server with data-handling capacity and/or instruction execution capability, such as CPU (central processing unit) (CPU), Graphics Processing Unit (GPU) etc.Communication between modules can be wire communication, also can be radio communication.In one example, the first control module 5300, execution module 5500 and authorization module 5700 are realized by same server (or personal computer) and the software (such as APP) run on wherein.In addition, the way of realization of this device 5000 can be not only independently electronic installation, also can be the control device with the common sparing such as the electronic equipment of operating software and/or associated server or whole hardware.At this, above-mentioned all the elements are not limited.
Fig. 6 shows the schematic block diagram of the execution module 5500 according to the present invention's specific embodiment.As shown in Figure 6, execution module 5500 comprises detection module 5510, second control module 5530, refusal module 5550 further.Detection module 5510, for detecting whether there is retinue on the side of user based on image, if so, then starts the second control module 5530, if not, then starts refusal module 5550.Whether the second control module 5530 meets pre-conditioned for detecting retinue, if so, then starts authorization module 5700, if not, then starts refusal module 5550.Refusal module 5550 is for refusing the rights of using to user's Freeware.
Alternatively, detection module 5510 is according to whether also there are other faces to detect whether there is retinue on the side of user in the picture except the face of user.Detection module 5510 detect whether to there is retinue on the side of user can also according to the consistance between the direction of the electronic equipment of the watching direction of other existing faces and operating software, namely with the consistance in the watching direction of user.In addition, detection module 5510 detect whether there is retinue on the side of user can also according to the relation between the existing distance between other face and faces of user and the 4th predetermined threshold.
Alternatively, involvedly in second control module 5530 pre-conditionedly to comprise: in retinue, there is at least one the retinue that the age is more than or equal to the second predetermined threshold, wherein, the second predetermined threshold is greater than the first predetermined threshold based on image recognition the age of retinue.Alternatively, the age that the second predetermined threshold equals user adds predetermined value, and predetermined value is more than or equal to 20.
Alternatively, involvedly in the second control module 5530 pre-conditionedly to comprise further: it is live body that existing, the age is more than or equal at least one position in the retinue of the second predetermined threshold.
Alternatively, involvedly in the second control module 5530 pre-conditionedly to comprise further: existing, the age similarity be more than or equal between the face of in the retinue of the second predetermined threshold at least one and the face of user is more than or equal to the 3rd predetermined threshold.
The device of the control software design rights of using of the embodiment of the present invention can also comprise other modules, and such as storer etc., do not limit at this.
Those of ordinary skill in the art, by reading above about the detailed description of the method for control software design rights of using, can understand the structure of the device of above-mentioned control software design rights of using, realization and advantage, therefore repeat no more here.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment at this method and apparatus provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that, except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or device or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can use with arbitrary array mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions that microprocessor or digital signal processor (DSP) can be used in practice to realize according to some modules in the device of the control software design rights of using of the embodiment of the present invention.The present invention can also be embodied as part or all the device program (such as, computer program and computer program) for performing method as described herein.Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.
Claims (15)
1. a method for control software design rights of using, comprising:
Step S1100: gather the image comprising the user of software;
Step S1300: based on the age of user described in described image recognition, judges whether the age of described user is more than or equal to the first predetermined threshold, if not, then performs step S1500, if so, then performs step S1700;
Step S1500: determine the rights of using whether open described software to described user according to the first predetermined policy, and according to determination result execution corresponding operating; And
Step S1700: the rights of using opening described software to described user.
2. the method for claim 1, wherein described step S1500 comprises further:
Step S1510: detect whether there is retinue on the side of described user based on described image, if so, then performs step S1530, if not, then performs step S1550;
Step S1530: detect described retinue and whether meet pre-conditioned, if so, then performs step S1700, if not, then performs step S1550; And
Step S1550: refuse the rights of using opening described software to described user.
3. method as claimed in claim 2, wherein, describedly pre-conditionedly to comprise: in described retinue, there is at least one position that the age is more than or equal to the second predetermined threshold, wherein, the age of described retinue, described second predetermined threshold was greater than described first predetermined threshold based on described image recognition.
4. method as claimed in claim 3, wherein, describedly pre-conditionedly to comprise further: it is live body that existing, the age is more than or equal at least one position in the retinue of described second predetermined threshold.
5. the method as described in claim 3 or 4, wherein, describedly pre-conditionedly to comprise further: existing, the age similarity be more than or equal between the face of in the retinue of described second predetermined threshold at least one and the face of described user is more than or equal to the 3rd predetermined threshold.
6. the method as described in claim 3 or 4, wherein, the age that described second predetermined threshold equals described user adds predetermined value, and described predetermined value is more than or equal to 20.
7. method as claimed in claim 2, wherein, in described step S1510, describedly detect based on described image whether to there is retinue on the side of described user be according to whether also there are other faces in described image except the face of described user.
8. method as claimed in claim 7, wherein, in described step S1510, described based on described image detect the side of described user whether exist retinue also according to the watching direction of other existing faces and run described software electronic equipment direction between consistance.
9. method as claimed in claim 7, wherein, in described step S1510, whether described exist retinue also according to the distance between other existing faces and the face of described user and the relation between the 4th predetermined threshold based on described image detection on the side of described user.
10. the method as described in any one of claim 1 to 9, wherein, in described step S1300, describedly to comprise based on the age of user described in described image recognition: the face detecting described user in described image, estimate the age of described user based on described face.
The device of 11. 1 kinds of control software design rights of using, comprises image capture module, the first control module, execution module and authorization module,
Described image capture module is for gathering the image of the user comprising software;
Described first control module is used for the age based on user described in described image recognition, judges whether the age of described user is more than or equal to the first predetermined threshold, if not, then starts described execution module, if so, then start described authorization module;
Described execution module is used for the rights of using determining whether open to described user described software according to the first predetermined policy, and according to determination result execution corresponding operating;
Described authorization module is used for the rights of using opening described software to described user.
12. devices as claimed in claim 11, wherein, described execution module comprises detection module, the second control module, refusal module further:
Described detection module is used for detecting whether there is retinue on the side of described user based on described image, if so, then starts described second control module, if not, then starts described refusal module;
Whether described second control module meets pre-conditioned for detecting described retinue, if so, then starts described authorization module, if not, then starts described refusal module; And
Described refusal module is for refusing the rights of using opening described software to described user.
13. devices as claimed in claim 12, wherein, describedly pre-conditionedly to comprise: in described retinue, there is at least one the retinue that the age is more than or equal to the second predetermined threshold, wherein, the age of described retinue, described second predetermined threshold was greater than described first predetermined threshold based on described image recognition.
14. devices as claimed in claim 13, wherein, describedly pre-conditionedly to comprise further: it is live body that existing, the age is more than or equal at least one position in the retinue of described second predetermined threshold.
15. devices as described in claim 13 or 14, wherein, describedly pre-conditionedly to comprise further: existing, the age similarity be more than or equal between the face of in the retinue of described second predetermined threshold at least one and the face of described user is more than or equal to the 3rd predetermined threshold.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510463074.3A CN105138879B (en) | 2015-07-31 | 2015-07-31 | The method and apparatus of control software access right |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510463074.3A CN105138879B (en) | 2015-07-31 | 2015-07-31 | The method and apparatus of control software access right |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105138879A true CN105138879A (en) | 2015-12-09 |
CN105138879B CN105138879B (en) | 2018-10-12 |
Family
ID=54724224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510463074.3A Active CN105138879B (en) | 2015-07-31 | 2015-07-31 | The method and apparatus of control software access right |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105138879B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106548045A (en) * | 2016-09-26 | 2017-03-29 | 惠州Tcl移动通信有限公司 | It is a kind of based on the application program method for down loading at age, system and electronic equipment |
CN106657153A (en) * | 2017-02-07 | 2017-05-10 | 深圳市金立通信设备有限公司 | Network data downloading method and terminal |
CN106658179A (en) * | 2016-12-30 | 2017-05-10 | 合智能科技(深圳)有限公司 | app control method and device based on smart television camera |
CN106686053A (en) * | 2016-11-18 | 2017-05-17 | 广州粤亮信息科技有限公司 | Mobile application remote monitoring method and system |
WO2018018813A1 (en) * | 2016-07-29 | 2018-02-01 | 深圳前海弘稼科技有限公司 | Control method and device for intelligent planting apparatus, and intelligent planting apparatus |
CN108537017A (en) * | 2018-01-05 | 2018-09-14 | 上海连尚网络科技有限公司 | A kind of method and apparatus for managing game user |
CN108573022A (en) * | 2018-02-28 | 2018-09-25 | 山峰 | Computer log based on image procossing records system and method |
CN108734002A (en) * | 2018-05-16 | 2018-11-02 | Oppo广东移动通信有限公司 | Intelligent configuration method, device, storage medium and the mobile terminal of system resource |
CN113225327A (en) * | 2021-04-29 | 2021-08-06 | 心动网络股份有限公司 | Login client supervision method, device, equipment and medium based on voice recognition |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770613A (en) * | 2010-01-19 | 2010-07-07 | 北京智慧眼科技发展有限公司 | Social insurance identity authentication method based on face recognition and living body detection |
CN102214286A (en) * | 2010-04-08 | 2011-10-12 | 鸿富锦精密工业(深圳)有限公司 | Network content restricted browsing control system and method |
US20130017806A1 (en) * | 2011-07-13 | 2013-01-17 | Sprigg Stephen A | Intelligent parental controls for wireless devices |
CN103327406A (en) * | 2013-05-27 | 2013-09-25 | 中山大学 | Digital television anti-addiction method and system based on android system |
CN104008320A (en) * | 2014-05-19 | 2014-08-27 | 惠州Tcl移动通信有限公司 | Using permission and user mode control method and system based on face recognition |
-
2015
- 2015-07-31 CN CN201510463074.3A patent/CN105138879B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770613A (en) * | 2010-01-19 | 2010-07-07 | 北京智慧眼科技发展有限公司 | Social insurance identity authentication method based on face recognition and living body detection |
CN102214286A (en) * | 2010-04-08 | 2011-10-12 | 鸿富锦精密工业(深圳)有限公司 | Network content restricted browsing control system and method |
US20130017806A1 (en) * | 2011-07-13 | 2013-01-17 | Sprigg Stephen A | Intelligent parental controls for wireless devices |
CN103327406A (en) * | 2013-05-27 | 2013-09-25 | 中山大学 | Digital television anti-addiction method and system based on android system |
CN104008320A (en) * | 2014-05-19 | 2014-08-27 | 惠州Tcl移动通信有限公司 | Using permission and user mode control method and system based on face recognition |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018018813A1 (en) * | 2016-07-29 | 2018-02-01 | 深圳前海弘稼科技有限公司 | Control method and device for intelligent planting apparatus, and intelligent planting apparatus |
CN106548045A (en) * | 2016-09-26 | 2017-03-29 | 惠州Tcl移动通信有限公司 | It is a kind of based on the application program method for down loading at age, system and electronic equipment |
CN106686053A (en) * | 2016-11-18 | 2017-05-17 | 广州粤亮信息科技有限公司 | Mobile application remote monitoring method and system |
CN106658179A (en) * | 2016-12-30 | 2017-05-10 | 合智能科技(深圳)有限公司 | app control method and device based on smart television camera |
CN106658179B (en) * | 2016-12-30 | 2019-12-31 | 合一智能科技(深圳)有限公司 | App control method and device based on smart television camera |
CN106657153A (en) * | 2017-02-07 | 2017-05-10 | 深圳市金立通信设备有限公司 | Network data downloading method and terminal |
CN108537017A (en) * | 2018-01-05 | 2018-09-14 | 上海连尚网络科技有限公司 | A kind of method and apparatus for managing game user |
CN108537017B (en) * | 2018-01-05 | 2021-07-23 | 上海连尚网络科技有限公司 | Method and equipment for managing game users |
CN108573022A (en) * | 2018-02-28 | 2018-09-25 | 山峰 | Computer log based on image procossing records system and method |
CN108573022B (en) * | 2018-02-28 | 2019-03-26 | 广东聚联电子商务股份有限公司 | Computer log based on image procossing records system and method |
CN108734002A (en) * | 2018-05-16 | 2018-11-02 | Oppo广东移动通信有限公司 | Intelligent configuration method, device, storage medium and the mobile terminal of system resource |
CN113225327A (en) * | 2021-04-29 | 2021-08-06 | 心动网络股份有限公司 | Login client supervision method, device, equipment and medium based on voice recognition |
Also Published As
Publication number | Publication date |
---|---|
CN105138879B (en) | 2018-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105138879A (en) | Method and device for controlling use permission of software | |
CN104102866B (en) | Authentication device and authentication method | |
US20200026920A1 (en) | Information processing apparatus, information processing method, eyewear terminal, and authentication system | |
US20170345393A1 (en) | Electronic device and eye protecting method therefor | |
US20130282609A1 (en) | Image recognition for personal protective equipment compliance enforcement in work areas | |
CN105574467A (en) | Method for protecting privacy of camera video via human identity recognition | |
CN103854031B (en) | For the method and apparatus identifying picture material | |
CN108781277A (en) | Monitoring system, image processing equipment, image processing method and program recorded medium | |
CN102214286A (en) | Network content restricted browsing control system and method | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
US10567642B2 (en) | Managing camera usage with warnings and/or disablement | |
CN111373371A (en) | Terminal control method and device | |
South et al. | Detecting and defending against seizure-inducing gifs in social media | |
KR101454644B1 (en) | Loitering Detection Using a Pedestrian Tracker | |
Alshehri et al. | Are smart home devices abandoning IPV victims? | |
CN104808775A (en) | Device and method for judging effectiveness of authentication information of head-wearing intelligent equipment | |
CN108055398B (en) | Eye protection reminding control method and electronic equipment | |
CN105718033A (en) | Fatigue detection system and method | |
CN112995763B (en) | Control method of intelligent monitoring system, 5G television, system and storage medium | |
CN109657428A (en) | A kind of control method of mobile terminal, mobile terminal and storage medium | |
CN105306856A (en) | Micro projector safety device | |
CN106203119B (en) | Hide processing method, device and the electronic equipment of cursor | |
CN108491412A (en) | Children's book recommends method, apparatus, platform, computer readable storage medium | |
CN111639592A (en) | Electronic display screen anti-photographing system and method | |
Wilson | Youtube is unsafe for children: Youtube's safeguards and the current legal framework are inadequate to protect children from disturbing content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100080 room 1001-011, building 3, Haidian street, Beijing, Haidian District, 1 Applicant after: MEGVII INC. Applicant after: Beijing maigewei Technology Co., Ltd. Address before: 100080 room 1001-011, building 3, Haidian street, Beijing, Haidian District, 1 Applicant before: MEGVII INC. Applicant before: Beijing aperture Science and Technology Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |