CN105335642B - The processing method and processing system of picture - Google Patents

The processing method and processing system of picture Download PDF

Info

Publication number
CN105335642B
CN105335642B CN201510717913.XA CN201510717913A CN105335642B CN 105335642 B CN105335642 B CN 105335642B CN 201510717913 A CN201510717913 A CN 201510717913A CN 105335642 B CN105335642 B CN 105335642B
Authority
CN
China
Prior art keywords
picture
photo
encryption
portrait
administrative staff
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510717913.XA
Other languages
Chinese (zh)
Other versions
CN105335642A (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510717913.XA priority Critical patent/CN105335642B/en
Publication of CN105335642A publication Critical patent/CN105335642A/en
Application granted granted Critical
Publication of CN105335642B publication Critical patent/CN105335642B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The present invention provides a kind of processing method and processing system of picture, including:The picture library of storage picture is opened, the picture includes common photo and encryption photo;Gather the biological information of active user;Judge whether it is administrative staff according to the biological information of the active user;If administrative staff, then picture library is opened, and show the common photo and encryption photo;If not administrative staff, then into the authority interface of visitor, and receive the password of visitor's input;Power list, and the picture in the picture library according to the tax power list display are assigned according to corresponding to the password obtains it, including:Normal picture and/or encryption picture.The present invention is by the biological information to active user or inputs the judgement of password, and different image content is presented to file to identical picture library, have classification display, it is with strong points and can limited discretion the advantages of, can meet the needs of sharing and maintaining secrecy simultaneously.

Description

The processing method and processing system of picture
Technical field
The invention belongs to the processing method and processing system of the storage security fields of computer, more particularly to a kind of picture.
Background technology
The popularization of intelligent terminal, brought great convenience and enjoyment for the life of user, such as, can at any time with Ground being taken pictures or recording a video, at the time of to record or share fine.
However, in individual privacy today of increasing concern, the improper processing to the picture such as photo or the map file of download, May be then that user brings great puzzlement.
At present, to the method for the secrecy processing of picture, mainly by being carried out to management software to the picture library for storing picture Whole encryptions, such as by mobile phone house keeper's application program, picture library is encrypted.However, there is following lack in current method Fall into:
(1) whole pictures are encrypted by encipheror, not targetedly;
(2) can not be balanced between sharing and maintaining secrecy, i.e. the mandate that user can not be restricted;And
(3) if not selecting to hide photo, once mobile phone holder wants decryption, there is target, crack generally only It is matter of time.
The content of the invention
In view of this, it is an object of the invention to provide a kind of processing method of picture and processing system, can solve existing There is photo in technology unfiled, photo hiding with showing the skill that can not be balanced without specific aim and between sharing and maintaining secrecy Art problem.
In order to solve the above technical problems, the embodiments of the invention provide a kind of processing method of picture, including:
The picture library of storage picture is opened, the picture includes common photo and encryption photo;
Gather the biological information of active user;
Judge whether it is administrative staff according to the biological information of the active user;
If administrative staff, then picture library is opened, and show the common photo and encryption photo;
If not administrative staff, then into the authority interface of visitor, and receive the password of visitor's input;And
Power list, and the figure in the picture library according to the tax power list display are assigned according to corresponding to the password obtains it Piece, including:Normal picture and/or encryption picture.
In order to solve the above technical problems, the embodiments of the invention provide a kind of processing system of picture, including:
Picture library, for storing picture, the picture includes common photo and encryption photo;
Acquisition module, for gathering the biological information of active user;
Feature judge module, for judging whether it is administrative staff according to the biological information of the active user;
Display module, for when active user is administrative staff, opening picture library and showing the common photo and encryption Photo;
Authority module, for when active user is not administrative staff, into the authority interface of visitor, and receiving the trip The password of visitor's input;And
The display module, it is additionally operable to assign power list according to corresponding to the password obtains it, and power row is assigned according to described Table shows the picture in the picture library, including:Normal picture and/or encryption picture.
Relative to prior art, the processing method and processing system of picture provided by the invention, by active user's Biological information or the judgement for inputting password, different image contents is presented to file to identical picture library, has classification aobvious Show, it is with strong points and can limited discretion the advantages of, can meet the needs of sharing and maintaining secrecy simultaneously.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the processing method for the picture that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the processing method for the picture that the embodiment of the present invention two provides;
Fig. 3 is the judgement schematic flow sheet for privacy picture that the embodiment of the present invention two provides;
Fig. 4 is the module diagram of the processing system for the picture that the embodiment of the present invention three provides;
Fig. 5 is the module diagram of the processing system for the picture that the embodiment of the present invention four provides.
Embodiment
Refer to the schema in accompanying drawing, wherein identical element numbers represent identical component, principle of the invention be with Implement to illustrate in an appropriate computing ring mirror.The following description is based on exemplified specific implementation of the invention Example, it is not construed as the limitation present invention other specific embodiments not detailed herein.
The principle of the invention illustrates that it is not represented as a kind of limitation, those skilled in the art can with above-mentioned word Solve plurality of step as described below and operation also may be implemented among hardware.
The processing method and processing system of picture of the invention provided by the invention, it can be applied to smart mobile phone, digital phase In the terminal devices such as machine, do not enumerate one by one herein.
Embodiment one
Referring to Fig. 1, it show the schematic flow sheet of the processing method of picture provided in an embodiment of the present invention.
The processing method of the picture, applied in terminal device, it the treating method comprises:
In step S101, the picture library of storage picture is opened, the picture includes common photo and encryption photo.
It is understood that the encryption photo refers to encrypt what is formed to privacy photo, the password generally use of encryption The biological information of administrative staff, the biological information include iris information, face information, finger print information, palmmprint letter Breath, and/or audio-frequency information.That is, support administrative staff hand held terminal equipment, towards the terminal device when or between speaking It can complete to decrypt, i.e., it is convenient and quick.
In step s 102, the biological information of active user is gathered.
Specifically, the realization of the collection, typically carried out while user is using the terminal device, quickly again It is convenient, including any of following or a variety of combination the step of the collection:
(1) iris information, the face information of user is gathered by camera;
(2) finger print information, the palmprint information of user are gathered by touch point, for example is arranged on the major key or camera of mobile phone On tripper;And/or
(3) audio-frequency information of user is gathered by microphone.
Wherein, by taking iris information as an example, it is described by camera gather user iris information the step of, specifically include:
(1.1) eye image of user is gathered;
(1.2) Iris Location and normalized are carried out to the eye image, to generate iris image;
(1.3) iris feature point is extracted from the iris image;And
(1.4) the iris feature point is encoded, to generate iris information.
In step s 103, judge whether it is administrative staff according to the biological information of the active user.
Wherein, if administrative staff, then step S104 is performed, if not administrative staff, then perform step S105.
Specifically, the judgement includes:
(1) cryptographic libraries of administrative staff are preset, the cryptographic libraries include the various biological characteristics letter of the administrative staff Breath, the biological information include iris information, face information, finger print information, palmprint information, and/or audio-frequency information;
(2) the biological nature information of the active user and the biological information in the cryptographic libraries are contrasted, and is generated Matching degree;
(3) judge whether the matching degree is more than preset matching threshold value;
(4) when more than the preset matching threshold value, it is judged as administrative staff, wherein the administrative staff are usually terminal The owner of equipment;Or
(5) when no more than the preset matching threshold value, it is judged as visitor, wherein the visitor is relative with administrative staff, Specifically include:Authorized visitor, that is, know the cipher;Visitor without mandate, that is, be unaware of password.
In addition, this step is also understood that be that the encryption photo in step S101 is decrypted, if successful decryption, It is then administrative staff, if decryption failure, is not administrative staff, but visitor.
In step S104, when active user is administrative staff, picture library is opened, and show the common photo and encryption Photo.
In step S105, when active user is not administrative staff, into the authority interface of visitor, and the trip is received The password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
In step s 106, power list is assigned according to corresponding to the password obtains it, and list display is weighed according to described assign Picture in the picture library, including:Normal picture and/or encryption picture.
As shown in the tax power list of table 1, when input password 0001, whole photos can be checked, including common photo with Encrypt photo;When inputting password 0002, common photo can be checked, but the authority photo of encryption can not be checked;It is close when inputting During code 0003, encryption photo can be checked, but common photo can not be checked.
Table 1 assigns power list
Password The authority of common photo Encrypt the authority of photo
0001 It is It is
0002 It is It is no
0003 It is no It is
The processing method of picture provided by the invention, by the biological information to active user or input sentencing for password It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
Embodiment two
Referring to Fig. 2, it show the schematic flow sheet of the processing method of picture provided in an embodiment of the present invention.Wherein, Fig. 2 The step identical with Fig. 1 is still started into line label using the label of S1 beginnings, the step different from Fig. 1 with S2, is distinguished with showing.
The processing method of the picture, applied in terminal device, it the treating method comprises:
In step s 201, the picture in picture library is classified, the picture in picture library is divided according to level of security Class, form normal picture and privacy picture.
Referring to Fig. 3, it show the judgement schematic flow sheet of privacy picture.To illustrate the picture root in picture library Classified according to level of security, form the specific steps of normal picture and privacy picture, including:
In step S301, the content of photo current is obtained.
In step s 302, judge whether photo current belongs to word class picture.
Wherein, if word class picture, then step S303 is performed, if not word class picture then performs step S306.
In step S303, judge whether include predetermined keyword in word.
Wherein, if comprising the predetermined keyword, step S304 is performed, if not including the predetermined keyword, is held Row step S305.
It is understood that the predetermined keyword, such as secrecy, top-secret, secret or contract.
In step s 304, the level of security of photo current is arranged to high, and is categorized into privacy picture.
In step S305, the level of security of photo current is arranged to low, and be categorized into normal picture.
In step S306, continue to judge whether the photo current belongs to portrait class picture.
It is understood that can be by setting the ratio of face or body in picture to judge whether to belong to portrait class Picture.For example when the ratio of the body of people exceedes the 25% of picture, it is judged as portrait class picture.
In step S307, the bare ratio of portrait in picture is counted.
In step S308, judge whether the bare ratio exceedes default bare threshold value.
Wherein, if the bare ratio exceedes default bare threshold value, step S304 is performed;If the bare ratio is not More than default bare threshold value, then step S309 is performed.
In step S309, continue to judge whether the portrait matches with default encryption portrait.
Wherein, if matching, step S304 is performed, if mismatching, performs step S305.
It is understood that for step S304, when the picture belongs in word class picture and word comprising pre- If during keyword, the picture belong to portrait class picture and portrait with it is default encryption portrait match when and the picture category In portrait class picture and when wherein the bare ratio of portrait exceedes default bare threshold value, step S304 is performed.
For step S305, when the picture, which belongs to, does not include predetermined keyword in word class picture and word, When the picture belongs to portrait class picture and portrait and default encryption portrait mismatch and the picture belongs to portrait class figure When the bare ratio of piece and wherein portrait is no more than default bare threshold value, step S305 is performed.
In step S202, the privacy picture is encrypted to form encryption figure by the biological information of management Piece.
It is understood that the encryption photo refers to encrypt what is formed to privacy photo, the password generally use of encryption The biological information of administrative staff, the biological information include iris information, face information, finger print information, palmmprint letter Breath, and/or audio-frequency information.That is, support administrative staff hand held terminal equipment, towards the terminal device when or between speaking It can complete to decrypt, i.e., it is convenient and quick.
In step S101, the picture library of storage picture is opened, the picture includes common photo and encryption photo.
In step s 102, the biological information of active user is gathered.
The biological information, including:The iris information of user, face information, finger print information, palmprint information, and/or Audio-frequency information.
In step s 103, judge whether it is administrative staff according to the biological information of the active user.
Wherein, if administrative staff then perform step S104, if not administrative staff then perform step S105.
It is understood that the administrative staff are usually the owner of terminal device;The visitor is relative with administrative staff, Including:Authorized visitor, that is, know the cipher;Visitor without mandate, that is, be unaware of password.
In addition, this step is also understood that be that encryption photo is decrypted, if successful decryption, for administrative staff, If decryption failure, is not administrative staff, but visitor.
In step S104, when active user is administrative staff, picture library is opened, and show the common photo and encryption Photo.
In step S105, when active user is not administrative staff, into the authority interface of visitor, and the trip is received The password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
In step S203, judge whether the password is correct.
Wherein, if password is correct, step S106 is performed, if password bad, performs step S204.
In step s 106, power list is assigned according to corresponding to the password obtains it, and list display is weighed according to described assign Picture in the picture library, including:Normal picture and/or encryption picture.
In step S204, the encryption photo in the picture library is deleted.
The step of deletion, specifically includes:
(1) errors number of inputted password is counted;
(2) contrast whether the errors number exceedes default danger threshold;And
(3) when errors number exceedes default danger threshold, the encryption photo in the picture library is deleted.
It is understood that it is a certain picture library that if the target of active user, which has confirmed that, cracked according to software is decoded, Simply matter of time is generally successfully cracked, so by presetting a danger threshold, when more than danger threshold, directly to encryption Photo carries out damage operation, to ensure the safety of privacy.
The processing method of picture provided by the invention, by the biological information to active user or input sentencing for password It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
Embodiment three
Referring to Fig. 4, it show the module diagram of the processing system of picture provided in an embodiment of the present invention.
The processing system 400 of the picture, applied in terminal device, the processing system 400 includes:Picture library 41, adopt Collect module 42, feature judge module 43, authority module 44 and display module 45.
Picture library 41, for storing picture, the picture includes common photo and encryption photo.
It is understood that the encryption photo refers to encrypt what is formed to privacy photo, the password generally use of encryption The biological information of administrative staff, the biological information include iris information, face information, finger print information, palmmprint letter Breath, and/or audio-frequency information.That is, support administrative staff hand held terminal equipment, towards the terminal device when or between speaking It can complete to decrypt, i.e., it is convenient and quick.
Acquisition module 42, for gathering the biological information of active user.
Specifically, the realization of the acquisition function, typically carried out while user is using the terminal device, soon Fast and convenient, the acquisition module includes any of following or a variety of combination:Image submodule 421, touch-control submodule 422, and/or audio submodule 423.
Wherein, the shooting submodule 421, iris information, face information for head collection user.The touch-control submodule Block 422, for gathering finger print information, the palmprint information of user, for example it is arranged on the major key of mobile phone or the tripper of camera. The audio submodule 423, for gathering the audio-frequency information of user.
Again exemplified by imaging submodule 421 to the collection of iris information, specifically include:Gather the eye image of user;It is right The eye image carries out Iris Location and normalized, to generate iris image;Iris is extracted from the iris image Characteristic point;The iris feature point is encoded, to generate iris information.
Feature judge module 43, the acquisition module 42 is connected to, for believing according to the biological characteristic of the active user Breath judges whether it is administrative staff.
Wherein, the feature judge module 43 includes:Cryptographic libraries 431, matched sub-block 432, judging submodule 433, with And result submodule 434.
Specifically, the cryptographic libraries 431, for the various biological informations of preservation management personnel, the biology is special Reference breath includes iris information, face information, finger print information, palmprint information, and/or audio-frequency information.The matched sub-block 432, for contrasting the biological nature information of the active user and the biological information in the cryptographic libraries, and generate matching Degree.The judging submodule 433, for judging whether the matching degree is more than preset matching threshold value.The result submodule 434, for when more than the preset matching threshold value, being judged as administrative staff;And work as and be not more than the preset matching threshold value When, it is judged as visitor.
Wherein, the administrative staff are usually the owner of terminal device, and the visitor is relative with administrative staff, specific bag Include:Authorized visitor, that is, know the cipher;Visitor without mandate, that is, be unaware of password.
In addition, the feature judge module 43 is it is also understood that it is that the encryption photo in picture library is decrypted to be, if solution Close success, then it is administrative staff, if decryption failure, is not administrative staff, but visitor.
Authority module 44, the feature judge module 43 is connected to, for when active user is not administrative staff, entering The authority interface of visitor, and receive the password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
Display module 45, the feature judge module 43 is connected to, for when active user is administrative staff, opening figure Storehouse, and show the common photo and encryption photo;The authority module 44 is also attached to, for being visitor as active user When, power list, and the picture in the picture library according to the tax power list display, bag are assigned according to corresponding to the password obtains it Include:Normal picture and/or encryption picture.
For example assign power:First password, 0001, it can check whole photos, including common photo and encryption corresponding to authority Photo;Second password, when 0002, common photo can be checked corresponding to authority, but the authority photo of encryption can not be checked;3rd Password, 0003, encryption photo can be checked corresponding to authority, but common photo can not be checked.
The processing system of picture provided by the invention, by the biological information to active user or input sentencing for password It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
Example IV
Referring to Fig. 5, it show the module diagram of the processing system of picture provided in an embodiment of the present invention.Wherein, Fig. 5 Still started with identical module in Fig. 4 using the label of 4 beginnings, the module different from Fig. 4 with 5 into line label, distinguished with showing.
The processing system 500 of the picture, applied in terminal device, the processing system includes:Sort module 51, add Close module 52, picture library 41, acquisition module 42, feature judge module 43, authority module 44 and display module 45.
Sort module 51, be connected to picture library 41, for classifying to the picture in picture library, to the picture in picture library according to Level of security is classified, and forms normal picture and privacy picture.
Wherein, the sort module 51, including:Word classify submodule 511 and portrait classification submodule 512, for from Filter out privacy picture in the picture library, and it is low that remaining picture is arranged into level of security, and it is classified to normal picture.
Wherein, the word classification submodule 511, for belonging to word class picture when photo current, and includes default pass During keyword, the level of security of photo current is arranged to high, and be categorized into privacy picture.
The portrait classification submodule 512, for whether belonging to portrait class picture, and portrait in picture when photo current When bare ratio exceedes default exposed threshold value, the level of security of photo current is arranged to high, and be categorized into privacy picture;And When whether photo current belongs to portrait class picture, and whether the portrait matches with default encryption portrait, by photo current Level of security be arranged to high, and be categorized into privacy picture.
Encrypting module 52, the sort module 51 is connected to, for the biological information by management to the privacy Picture is encrypted to form encryption picture.
Picture library 41, the sort module 51 and encrypting module 52 are connected to, for storing picture, the picture includes common Photo and encryption photo.
Acquisition module 42, for gathering the biological information of active user.
Feature judge module 43, the acquisition module 42 is connected to, for believing according to the biological characteristic of the active user Breath judges whether it is administrative staff.
In addition, it is deciphering module that the feature judge module 43, which is also understood that, it is that the encryption photo in picture library is carried out Decryption, it is not administrative staff if decryption fails for administrative staff if successful decryption, but visitor.
Display module 45, the feature judge module 43 is connected to, for when active user is administrative staff, opening figure Storehouse, and show the common photo and encryption photo.
Authority module 44, the feature judge module 43 is connected to, for when active user is not administrative staff, entering The authority interface of visitor, and receive the password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
Password judge module 53, the authority module 44 is connected to, for judging whether the password is correct.
Wherein, if password is correct, step S106 is performed, if password bad, performs step S204.
Display module 45, the password judge module 53 is also attached to, for being obtained when password is correct according to the password Take and power list is assigned corresponding to it, and the picture in the picture library according to the tax power list display, including:Normal picture and/or Encrypt picture.
Statistical module 54, the password judge module 53 is connected to, for counting the errors number of inputted password.
Contrast module 55, the statistical module 54 is connected to, for contrasting whether the errors number exceedes default danger Threshold value.
Removing module 56, the contrast module 55 and picture library 41 are connected to, for exceeding default danger threshold when errors number During value, the encryption photo in the picture library is deleted.
The processing system of picture provided by the invention, by the biological information to active user or input sentencing for password It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
The processing method and processing system of picture provided in an embodiment of the present invention belong to same design, and it implements process Refer to specification in full, here is omitted.
In summary, although the present invention is disclosed above with preferred embodiment, above preferred embodiment simultaneously is not used to limit The system present invention, one of ordinary skill in the art, without departing from the spirit and scope of the present invention, it can make various changes and profit Decorations, therefore protection scope of the present invention is defined by the scope that claim defines.

Claims (8)

  1. A kind of 1. processing method of picture, it is characterised in that including:
    Picture in picture library is classified according to level of security, forms normal picture and privacy picture, wherein, according to face or Ratio of the body in picture judges whether photo current belongs to portrait class picture, if portrait class picture, then judge picture The bare ratio of middle portrait;When bare ratio, which exceedes, presets exposed threshold value, the level of security of photo current is arranged to high, and It is categorized into privacy picture;
    The privacy picture is encrypted to form encryption picture by the biological information of administrative staff;
    The picture library of storage picture is opened, the storage picture includes common photo and encryption photo;
    Gather the biological information of active user;
    Judge whether it is administrative staff according to the biological information of the active user;
    If administrative staff, then picture library is opened, and show the common photo and encryption photo;
    If not administrative staff, then into the authority interface of visitor, and receive the password of visitor's input;And
    Power list, and the picture in the picture library according to the tax power list display are assigned according to corresponding to the password obtains it, Including:Normal picture and/or encryption picture.
  2. 2. processing method as claimed in claim 1, it is characterised in that the picture in picture library is carried out according to level of security Classification, normal picture and privacy picture are formed, is specifically included:
    Judge whether photo current belongs to word class picture;
    If word class picture, then judge whether include predetermined keyword in word;And
    When comprising predetermined keyword, the level of security of photo current is arranged to high, and be categorized into privacy picture.
  3. 3. processing method as claimed in claim 1, it is characterised in that the picture in picture library is carried out according to level of security Classification, normal picture and privacy picture are formed, is specifically included:
    Judge whether photo current belongs to portrait class picture;
    If portrait class picture, then judge whether the portrait matches with default encryption portrait;And
    If matching, the level of security of photo current is arranged to high, and be categorized into privacy picture.
  4. 4. processing method as claimed in claim 1, it is characterised in that it is described if not administrative staff, then into the power of visitor Boundary, and the password of visitor's input is received, also include afterwards:
    The errors number of the inputted password of statistics;
    Contrast whether the errors number exceedes default danger threshold;And
    When errors number exceedes default danger threshold, the encryption photo in the picture library is deleted.
  5. A kind of 5. processing system of picture, it is characterised in that including:
    Sort module, for classifying to the picture in picture library according to level of security, form normal picture and privacy picture;
    Wherein described sort module specifically includes:Portrait classification submodule, for whether belonging to portrait class picture when photo current, And when the bare ratio of portrait exceedes default exposed threshold value in picture, the level of security of photo current is arranged to high, and classify To privacy picture;
    Encrypting module, the privacy picture is encrypted to form encryption figure for the biological information by administrative staff Piece;
    Picture library, for storing picture, the storage picture includes common photo and encryption photo;
    Acquisition module, for gathering the biological information of active user;
    Feature judge module, for judging whether it is administrative staff according to the biological information of the active user;
    Display module, for when active user is administrative staff, opening picture library and showing the common photo and encryption photo;
    Authority module, for when active user is not administrative staff, into the authority interface of visitor, and it to be defeated to receive the visitor The password entered;And
    The display module, it is additionally operable to assign power list according to corresponding to the password obtains it, and list is weighed according to the tax and shown Show the picture in the picture library, including:Normal picture and/or encryption picture.
  6. 6. processing system as claimed in claim 5, it is characterised in that the sort module, specifically include:
    Word is classified submodule, for belonging to word class picture when photo current, and during comprising predetermined keyword, by photo current Level of security be arranged to high, and be categorized into privacy picture.
  7. 7. processing system as claimed in claim 5, it is characterised in that the portrait classification submodule, be additionally operable to currently to scheme Whether piece belongs to portrait class picture, and when whether the portrait matches with default encryption portrait, by the safe level of photo current It is not arranged to high, and is categorized into privacy picture.
  8. 8. processing system as claimed in claim 5, it is characterised in that also include:
    Statistical module, for counting the errors number of inputted password;
    Contrast module, for contrasting whether the errors number exceedes default danger threshold;And
    Removing module, for when errors number exceedes default danger threshold, deleting the encryption photo in the picture library.
CN201510717913.XA 2015-10-28 2015-10-28 The processing method and processing system of picture Expired - Fee Related CN105335642B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510717913.XA CN105335642B (en) 2015-10-28 2015-10-28 The processing method and processing system of picture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510717913.XA CN105335642B (en) 2015-10-28 2015-10-28 The processing method and processing system of picture

Publications (2)

Publication Number Publication Date
CN105335642A CN105335642A (en) 2016-02-17
CN105335642B true CN105335642B (en) 2018-02-16

Family

ID=55286162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510717913.XA Expired - Fee Related CN105335642B (en) 2015-10-28 2015-10-28 The processing method and processing system of picture

Country Status (1)

Country Link
CN (1) CN105335642B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991B (en) * 2016-06-24 2019-06-28 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN106293394B (en) * 2016-07-29 2019-07-12 广州华多网络科技有限公司 A kind of method and electronic equipment of picture sharing
CN106709367B (en) * 2016-12-12 2021-10-15 上海豹云网络信息服务有限公司 Device and method for limiting picture sliding browsing for mobile terminal
CN108551550A (en) * 2018-04-09 2018-09-18 平安科技(深圳)有限公司 Image control, the filming control method of camera applications, device and electronic equipment
CN108647528A (en) * 2018-04-25 2018-10-12 上海与德科技有限公司 A kind of photo processing method, device, terminal and storage medium
CN109885707A (en) * 2019-02-01 2019-06-14 北京字节跳动网络技术有限公司 The method for refreshing of picture, device, terminal device and storage medium in picture library
CN111241508A (en) * 2019-12-31 2020-06-05 航天信息股份有限公司 Method and device for generating picture library authorization code and method and device for using picture library authorization code
CN112804445B (en) * 2020-12-30 2022-08-26 维沃移动通信有限公司 Display method and device and electronic equipment
CN112653713A (en) * 2021-01-22 2021-04-13 深圳市房多多网络科技有限公司 Image downloading protection method and device and computing equipment
CN113838547A (en) * 2021-09-28 2021-12-24 湖南康凯信息技术有限公司 Intelligent medical service management system based on intelligent terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104077517A (en) * 2014-06-30 2014-10-01 惠州Tcl移动通信有限公司 Mobile terminal user mode start method and system based on iris identification
CN104463017A (en) * 2014-12-22 2015-03-25 联想(北京)有限公司 Information processing method and electronic device
CN104933342A (en) * 2015-06-18 2015-09-23 广东欧珀移动通信有限公司 Picture viewing method and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514286A (en) * 2013-09-30 2014-01-15 鸿富锦精密工业(深圳)有限公司 Friend recommending system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104077517A (en) * 2014-06-30 2014-10-01 惠州Tcl移动通信有限公司 Mobile terminal user mode start method and system based on iris identification
CN104463017A (en) * 2014-12-22 2015-03-25 联想(北京)有限公司 Information processing method and electronic device
CN104933342A (en) * 2015-06-18 2015-09-23 广东欧珀移动通信有限公司 Picture viewing method and mobile terminal

Also Published As

Publication number Publication date
CN105335642A (en) 2016-02-17

Similar Documents

Publication Publication Date Title
CN105335642B (en) The processing method and processing system of picture
RU2718226C2 (en) Biometric data safe handling systems and methods
CN105354509B (en) The processing method and processing system of picture
CN105260669B (en) The transmission method and Transmission system of photo
CN101958892B (en) Electronic data protection method, device and system based on face recognition
US11184173B2 (en) Secure distributed information system
CN107103245B (en) File authority management method and device
CN103186761B (en) The fingerprint encryption method and its communication terminal of secret file
CN106022039A (en) Secure storage system and storage method of electronic information
CN105429949B (en) The method for pushing and supplying system of password
CN105429761A (en) Key generation method and device
CN102867157B (en) Mobile terminal and data guard method
CN105786974B (en) A kind of computer data storage inquiry system
CN106713618A (en) Processing method of identifying code and mobile terminal
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
US20160314720A1 (en) Information encryption system and information encryption method using optical character recognition
EP2835997A1 (en) Cell phone data encryption method and decryption method
CN105871892A (en) File cloud storage security solution method and system
US20210351927A1 (en) System, method and computer program product for mitigating customer onboarding risk
CN103927470A (en) File encryption and decryption system and method based on iris recognition
JP7105495B2 (en) Segmented key authenticator
US11328080B2 (en) Cryptographic key management
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN106529232A (en) Startup method and device
CN105303085A (en) File sharing method and sharing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180216