CN105335642B - The processing method and processing system of picture - Google Patents
The processing method and processing system of picture Download PDFInfo
- Publication number
- CN105335642B CN105335642B CN201510717913.XA CN201510717913A CN105335642B CN 105335642 B CN105335642 B CN 105335642B CN 201510717913 A CN201510717913 A CN 201510717913A CN 105335642 B CN105335642 B CN 105335642B
- Authority
- CN
- China
- Prior art keywords
- picture
- photo
- encryption
- portrait
- administrative staff
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000005034 decoration Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The present invention provides a kind of processing method and processing system of picture, including:The picture library of storage picture is opened, the picture includes common photo and encryption photo;Gather the biological information of active user;Judge whether it is administrative staff according to the biological information of the active user;If administrative staff, then picture library is opened, and show the common photo and encryption photo;If not administrative staff, then into the authority interface of visitor, and receive the password of visitor's input;Power list, and the picture in the picture library according to the tax power list display are assigned according to corresponding to the password obtains it, including:Normal picture and/or encryption picture.The present invention is by the biological information to active user or inputs the judgement of password, and different image content is presented to file to identical picture library, have classification display, it is with strong points and can limited discretion the advantages of, can meet the needs of sharing and maintaining secrecy simultaneously.
Description
Technical field
The invention belongs to the processing method and processing system of the storage security fields of computer, more particularly to a kind of picture.
Background technology
The popularization of intelligent terminal, brought great convenience and enjoyment for the life of user, such as, can at any time with
Ground being taken pictures or recording a video, at the time of to record or share fine.
However, in individual privacy today of increasing concern, the improper processing to the picture such as photo or the map file of download,
May be then that user brings great puzzlement.
At present, to the method for the secrecy processing of picture, mainly by being carried out to management software to the picture library for storing picture
Whole encryptions, such as by mobile phone house keeper's application program, picture library is encrypted.However, there is following lack in current method
Fall into:
(1) whole pictures are encrypted by encipheror, not targetedly;
(2) can not be balanced between sharing and maintaining secrecy, i.e. the mandate that user can not be restricted;And
(3) if not selecting to hide photo, once mobile phone holder wants decryption, there is target, crack generally only
It is matter of time.
The content of the invention
In view of this, it is an object of the invention to provide a kind of processing method of picture and processing system, can solve existing
There is photo in technology unfiled, photo hiding with showing the skill that can not be balanced without specific aim and between sharing and maintaining secrecy
Art problem.
In order to solve the above technical problems, the embodiments of the invention provide a kind of processing method of picture, including:
The picture library of storage picture is opened, the picture includes common photo and encryption photo;
Gather the biological information of active user;
Judge whether it is administrative staff according to the biological information of the active user;
If administrative staff, then picture library is opened, and show the common photo and encryption photo;
If not administrative staff, then into the authority interface of visitor, and receive the password of visitor's input;And
Power list, and the figure in the picture library according to the tax power list display are assigned according to corresponding to the password obtains it
Piece, including:Normal picture and/or encryption picture.
In order to solve the above technical problems, the embodiments of the invention provide a kind of processing system of picture, including:
Picture library, for storing picture, the picture includes common photo and encryption photo;
Acquisition module, for gathering the biological information of active user;
Feature judge module, for judging whether it is administrative staff according to the biological information of the active user;
Display module, for when active user is administrative staff, opening picture library and showing the common photo and encryption
Photo;
Authority module, for when active user is not administrative staff, into the authority interface of visitor, and receiving the trip
The password of visitor's input;And
The display module, it is additionally operable to assign power list according to corresponding to the password obtains it, and power row is assigned according to described
Table shows the picture in the picture library, including:Normal picture and/or encryption picture.
Relative to prior art, the processing method and processing system of picture provided by the invention, by active user's
Biological information or the judgement for inputting password, different image contents is presented to file to identical picture library, has classification aobvious
Show, it is with strong points and can limited discretion the advantages of, can meet the needs of sharing and maintaining secrecy simultaneously.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the processing method for the picture that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the processing method for the picture that the embodiment of the present invention two provides;
Fig. 3 is the judgement schematic flow sheet for privacy picture that the embodiment of the present invention two provides;
Fig. 4 is the module diagram of the processing system for the picture that the embodiment of the present invention three provides;
Fig. 5 is the module diagram of the processing system for the picture that the embodiment of the present invention four provides.
Embodiment
Refer to the schema in accompanying drawing, wherein identical element numbers represent identical component, principle of the invention be with
Implement to illustrate in an appropriate computing ring mirror.The following description is based on exemplified specific implementation of the invention
Example, it is not construed as the limitation present invention other specific embodiments not detailed herein.
The principle of the invention illustrates that it is not represented as a kind of limitation, those skilled in the art can with above-mentioned word
Solve plurality of step as described below and operation also may be implemented among hardware.
The processing method and processing system of picture of the invention provided by the invention, it can be applied to smart mobile phone, digital phase
In the terminal devices such as machine, do not enumerate one by one herein.
Embodiment one
Referring to Fig. 1, it show the schematic flow sheet of the processing method of picture provided in an embodiment of the present invention.
The processing method of the picture, applied in terminal device, it the treating method comprises:
In step S101, the picture library of storage picture is opened, the picture includes common photo and encryption photo.
It is understood that the encryption photo refers to encrypt what is formed to privacy photo, the password generally use of encryption
The biological information of administrative staff, the biological information include iris information, face information, finger print information, palmmprint letter
Breath, and/or audio-frequency information.That is, support administrative staff hand held terminal equipment, towards the terminal device when or between speaking
It can complete to decrypt, i.e., it is convenient and quick.
In step s 102, the biological information of active user is gathered.
Specifically, the realization of the collection, typically carried out while user is using the terminal device, quickly again
It is convenient, including any of following or a variety of combination the step of the collection:
(1) iris information, the face information of user is gathered by camera;
(2) finger print information, the palmprint information of user are gathered by touch point, for example is arranged on the major key or camera of mobile phone
On tripper;And/or
(3) audio-frequency information of user is gathered by microphone.
Wherein, by taking iris information as an example, it is described by camera gather user iris information the step of, specifically include:
(1.1) eye image of user is gathered;
(1.2) Iris Location and normalized are carried out to the eye image, to generate iris image;
(1.3) iris feature point is extracted from the iris image;And
(1.4) the iris feature point is encoded, to generate iris information.
In step s 103, judge whether it is administrative staff according to the biological information of the active user.
Wherein, if administrative staff, then step S104 is performed, if not administrative staff, then perform step S105.
Specifically, the judgement includes:
(1) cryptographic libraries of administrative staff are preset, the cryptographic libraries include the various biological characteristics letter of the administrative staff
Breath, the biological information include iris information, face information, finger print information, palmprint information, and/or audio-frequency information;
(2) the biological nature information of the active user and the biological information in the cryptographic libraries are contrasted, and is generated
Matching degree;
(3) judge whether the matching degree is more than preset matching threshold value;
(4) when more than the preset matching threshold value, it is judged as administrative staff, wherein the administrative staff are usually terminal
The owner of equipment;Or
(5) when no more than the preset matching threshold value, it is judged as visitor, wherein the visitor is relative with administrative staff,
Specifically include:Authorized visitor, that is, know the cipher;Visitor without mandate, that is, be unaware of password.
In addition, this step is also understood that be that the encryption photo in step S101 is decrypted, if successful decryption,
It is then administrative staff, if decryption failure, is not administrative staff, but visitor.
In step S104, when active user is administrative staff, picture library is opened, and show the common photo and encryption
Photo.
In step S105, when active user is not administrative staff, into the authority interface of visitor, and the trip is received
The password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
In step s 106, power list is assigned according to corresponding to the password obtains it, and list display is weighed according to described assign
Picture in the picture library, including:Normal picture and/or encryption picture.
As shown in the tax power list of table 1, when input password 0001, whole photos can be checked, including common photo with
Encrypt photo;When inputting password 0002, common photo can be checked, but the authority photo of encryption can not be checked;It is close when inputting
During code 0003, encryption photo can be checked, but common photo can not be checked.
Table 1 assigns power list
Password | The authority of common photo | Encrypt the authority of photo |
0001 | It is | It is |
0002 | It is | It is no |
0003 | It is no | It is |
The processing method of picture provided by the invention, by the biological information to active user or input sentencing for password
It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion
Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
Embodiment two
Referring to Fig. 2, it show the schematic flow sheet of the processing method of picture provided in an embodiment of the present invention.Wherein, Fig. 2
The step identical with Fig. 1 is still started into line label using the label of S1 beginnings, the step different from Fig. 1 with S2, is distinguished with showing.
The processing method of the picture, applied in terminal device, it the treating method comprises:
In step s 201, the picture in picture library is classified, the picture in picture library is divided according to level of security
Class, form normal picture and privacy picture.
Referring to Fig. 3, it show the judgement schematic flow sheet of privacy picture.To illustrate the picture root in picture library
Classified according to level of security, form the specific steps of normal picture and privacy picture, including:
In step S301, the content of photo current is obtained.
In step s 302, judge whether photo current belongs to word class picture.
Wherein, if word class picture, then step S303 is performed, if not word class picture then performs step S306.
In step S303, judge whether include predetermined keyword in word.
Wherein, if comprising the predetermined keyword, step S304 is performed, if not including the predetermined keyword, is held
Row step S305.
It is understood that the predetermined keyword, such as secrecy, top-secret, secret or contract.
In step s 304, the level of security of photo current is arranged to high, and is categorized into privacy picture.
In step S305, the level of security of photo current is arranged to low, and be categorized into normal picture.
In step S306, continue to judge whether the photo current belongs to portrait class picture.
It is understood that can be by setting the ratio of face or body in picture to judge whether to belong to portrait class
Picture.For example when the ratio of the body of people exceedes the 25% of picture, it is judged as portrait class picture.
In step S307, the bare ratio of portrait in picture is counted.
In step S308, judge whether the bare ratio exceedes default bare threshold value.
Wherein, if the bare ratio exceedes default bare threshold value, step S304 is performed;If the bare ratio is not
More than default bare threshold value, then step S309 is performed.
In step S309, continue to judge whether the portrait matches with default encryption portrait.
Wherein, if matching, step S304 is performed, if mismatching, performs step S305.
It is understood that for step S304, when the picture belongs in word class picture and word comprising pre-
If during keyword, the picture belong to portrait class picture and portrait with it is default encryption portrait match when and the picture category
In portrait class picture and when wherein the bare ratio of portrait exceedes default bare threshold value, step S304 is performed.
For step S305, when the picture, which belongs to, does not include predetermined keyword in word class picture and word,
When the picture belongs to portrait class picture and portrait and default encryption portrait mismatch and the picture belongs to portrait class figure
When the bare ratio of piece and wherein portrait is no more than default bare threshold value, step S305 is performed.
In step S202, the privacy picture is encrypted to form encryption figure by the biological information of management
Piece.
It is understood that the encryption photo refers to encrypt what is formed to privacy photo, the password generally use of encryption
The biological information of administrative staff, the biological information include iris information, face information, finger print information, palmmprint letter
Breath, and/or audio-frequency information.That is, support administrative staff hand held terminal equipment, towards the terminal device when or between speaking
It can complete to decrypt, i.e., it is convenient and quick.
In step S101, the picture library of storage picture is opened, the picture includes common photo and encryption photo.
In step s 102, the biological information of active user is gathered.
The biological information, including:The iris information of user, face information, finger print information, palmprint information, and/or
Audio-frequency information.
In step s 103, judge whether it is administrative staff according to the biological information of the active user.
Wherein, if administrative staff then perform step S104, if not administrative staff then perform step S105.
It is understood that the administrative staff are usually the owner of terminal device;The visitor is relative with administrative staff,
Including:Authorized visitor, that is, know the cipher;Visitor without mandate, that is, be unaware of password.
In addition, this step is also understood that be that encryption photo is decrypted, if successful decryption, for administrative staff,
If decryption failure, is not administrative staff, but visitor.
In step S104, when active user is administrative staff, picture library is opened, and show the common photo and encryption
Photo.
In step S105, when active user is not administrative staff, into the authority interface of visitor, and the trip is received
The password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
In step S203, judge whether the password is correct.
Wherein, if password is correct, step S106 is performed, if password bad, performs step S204.
In step s 106, power list is assigned according to corresponding to the password obtains it, and list display is weighed according to described assign
Picture in the picture library, including:Normal picture and/or encryption picture.
In step S204, the encryption photo in the picture library is deleted.
The step of deletion, specifically includes:
(1) errors number of inputted password is counted;
(2) contrast whether the errors number exceedes default danger threshold;And
(3) when errors number exceedes default danger threshold, the encryption photo in the picture library is deleted.
It is understood that it is a certain picture library that if the target of active user, which has confirmed that, cracked according to software is decoded,
Simply matter of time is generally successfully cracked, so by presetting a danger threshold, when more than danger threshold, directly to encryption
Photo carries out damage operation, to ensure the safety of privacy.
The processing method of picture provided by the invention, by the biological information to active user or input sentencing for password
It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion
Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
Embodiment three
Referring to Fig. 4, it show the module diagram of the processing system of picture provided in an embodiment of the present invention.
The processing system 400 of the picture, applied in terminal device, the processing system 400 includes:Picture library 41, adopt
Collect module 42, feature judge module 43, authority module 44 and display module 45.
Picture library 41, for storing picture, the picture includes common photo and encryption photo.
It is understood that the encryption photo refers to encrypt what is formed to privacy photo, the password generally use of encryption
The biological information of administrative staff, the biological information include iris information, face information, finger print information, palmmprint letter
Breath, and/or audio-frequency information.That is, support administrative staff hand held terminal equipment, towards the terminal device when or between speaking
It can complete to decrypt, i.e., it is convenient and quick.
Acquisition module 42, for gathering the biological information of active user.
Specifically, the realization of the acquisition function, typically carried out while user is using the terminal device, soon
Fast and convenient, the acquisition module includes any of following or a variety of combination:Image submodule 421, touch-control submodule
422, and/or audio submodule 423.
Wherein, the shooting submodule 421, iris information, face information for head collection user.The touch-control submodule
Block 422, for gathering finger print information, the palmprint information of user, for example it is arranged on the major key of mobile phone or the tripper of camera.
The audio submodule 423, for gathering the audio-frequency information of user.
Again exemplified by imaging submodule 421 to the collection of iris information, specifically include:Gather the eye image of user;It is right
The eye image carries out Iris Location and normalized, to generate iris image;Iris is extracted from the iris image
Characteristic point;The iris feature point is encoded, to generate iris information.
Feature judge module 43, the acquisition module 42 is connected to, for believing according to the biological characteristic of the active user
Breath judges whether it is administrative staff.
Wherein, the feature judge module 43 includes:Cryptographic libraries 431, matched sub-block 432, judging submodule 433, with
And result submodule 434.
Specifically, the cryptographic libraries 431, for the various biological informations of preservation management personnel, the biology is special
Reference breath includes iris information, face information, finger print information, palmprint information, and/or audio-frequency information.The matched sub-block
432, for contrasting the biological nature information of the active user and the biological information in the cryptographic libraries, and generate matching
Degree.The judging submodule 433, for judging whether the matching degree is more than preset matching threshold value.The result submodule
434, for when more than the preset matching threshold value, being judged as administrative staff;And work as and be not more than the preset matching threshold value
When, it is judged as visitor.
Wherein, the administrative staff are usually the owner of terminal device, and the visitor is relative with administrative staff, specific bag
Include:Authorized visitor, that is, know the cipher;Visitor without mandate, that is, be unaware of password.
In addition, the feature judge module 43 is it is also understood that it is that the encryption photo in picture library is decrypted to be, if solution
Close success, then it is administrative staff, if decryption failure, is not administrative staff, but visitor.
Authority module 44, the feature judge module 43 is connected to, for when active user is not administrative staff, entering
The authority interface of visitor, and receive the password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
Display module 45, the feature judge module 43 is connected to, for when active user is administrative staff, opening figure
Storehouse, and show the common photo and encryption photo;The authority module 44 is also attached to, for being visitor as active user
When, power list, and the picture in the picture library according to the tax power list display, bag are assigned according to corresponding to the password obtains it
Include:Normal picture and/or encryption picture.
For example assign power:First password, 0001, it can check whole photos, including common photo and encryption corresponding to authority
Photo;Second password, when 0002, common photo can be checked corresponding to authority, but the authority photo of encryption can not be checked;3rd
Password, 0003, encryption photo can be checked corresponding to authority, but common photo can not be checked.
The processing system of picture provided by the invention, by the biological information to active user or input sentencing for password
It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion
Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
Example IV
Referring to Fig. 5, it show the module diagram of the processing system of picture provided in an embodiment of the present invention.Wherein, Fig. 5
Still started with identical module in Fig. 4 using the label of 4 beginnings, the module different from Fig. 4 with 5 into line label, distinguished with showing.
The processing system 500 of the picture, applied in terminal device, the processing system includes:Sort module 51, add
Close module 52, picture library 41, acquisition module 42, feature judge module 43, authority module 44 and display module 45.
Sort module 51, be connected to picture library 41, for classifying to the picture in picture library, to the picture in picture library according to
Level of security is classified, and forms normal picture and privacy picture.
Wherein, the sort module 51, including:Word classify submodule 511 and portrait classification submodule 512, for from
Filter out privacy picture in the picture library, and it is low that remaining picture is arranged into level of security, and it is classified to normal picture.
Wherein, the word classification submodule 511, for belonging to word class picture when photo current, and includes default pass
During keyword, the level of security of photo current is arranged to high, and be categorized into privacy picture.
The portrait classification submodule 512, for whether belonging to portrait class picture, and portrait in picture when photo current
When bare ratio exceedes default exposed threshold value, the level of security of photo current is arranged to high, and be categorized into privacy picture;And
When whether photo current belongs to portrait class picture, and whether the portrait matches with default encryption portrait, by photo current
Level of security be arranged to high, and be categorized into privacy picture.
Encrypting module 52, the sort module 51 is connected to, for the biological information by management to the privacy
Picture is encrypted to form encryption picture.
Picture library 41, the sort module 51 and encrypting module 52 are connected to, for storing picture, the picture includes common
Photo and encryption photo.
Acquisition module 42, for gathering the biological information of active user.
Feature judge module 43, the acquisition module 42 is connected to, for believing according to the biological characteristic of the active user
Breath judges whether it is administrative staff.
In addition, it is deciphering module that the feature judge module 43, which is also understood that, it is that the encryption photo in picture library is carried out
Decryption, it is not administrative staff if decryption fails for administrative staff if successful decryption, but visitor.
Display module 45, the feature judge module 43 is connected to, for when active user is administrative staff, opening figure
Storehouse, and show the common photo and encryption photo.
Authority module 44, the feature judge module 43 is connected to, for when active user is not administrative staff, entering
The authority interface of visitor, and receive the password of visitor's input.
It is understood that the password includes:Specify the biological characteristic, and/or clear-text passwords of user.
Password judge module 53, the authority module 44 is connected to, for judging whether the password is correct.
Wherein, if password is correct, step S106 is performed, if password bad, performs step S204.
Display module 45, the password judge module 53 is also attached to, for being obtained when password is correct according to the password
Take and power list is assigned corresponding to it, and the picture in the picture library according to the tax power list display, including:Normal picture and/or
Encrypt picture.
Statistical module 54, the password judge module 53 is connected to, for counting the errors number of inputted password.
Contrast module 55, the statistical module 54 is connected to, for contrasting whether the errors number exceedes default danger
Threshold value.
Removing module 56, the contrast module 55 and picture library 41 are connected to, for exceeding default danger threshold when errors number
During value, the encryption photo in the picture library is deleted.
The processing system of picture provided by the invention, by the biological information to active user or input sentencing for password
It is disconnected, different image contents is presented to file to identical picture library, there is classification display, with strong points and can limited discretion
Advantage, can meet the needs of sharing and maintaining secrecy simultaneously.
The processing method and processing system of picture provided in an embodiment of the present invention belong to same design, and it implements process
Refer to specification in full, here is omitted.
In summary, although the present invention is disclosed above with preferred embodiment, above preferred embodiment simultaneously is not used to limit
The system present invention, one of ordinary skill in the art, without departing from the spirit and scope of the present invention, it can make various changes and profit
Decorations, therefore protection scope of the present invention is defined by the scope that claim defines.
Claims (8)
- A kind of 1. processing method of picture, it is characterised in that including:Picture in picture library is classified according to level of security, forms normal picture and privacy picture, wherein, according to face or Ratio of the body in picture judges whether photo current belongs to portrait class picture, if portrait class picture, then judge picture The bare ratio of middle portrait;When bare ratio, which exceedes, presets exposed threshold value, the level of security of photo current is arranged to high, and It is categorized into privacy picture;The privacy picture is encrypted to form encryption picture by the biological information of administrative staff;The picture library of storage picture is opened, the storage picture includes common photo and encryption photo;Gather the biological information of active user;Judge whether it is administrative staff according to the biological information of the active user;If administrative staff, then picture library is opened, and show the common photo and encryption photo;If not administrative staff, then into the authority interface of visitor, and receive the password of visitor's input;AndPower list, and the picture in the picture library according to the tax power list display are assigned according to corresponding to the password obtains it, Including:Normal picture and/or encryption picture.
- 2. processing method as claimed in claim 1, it is characterised in that the picture in picture library is carried out according to level of security Classification, normal picture and privacy picture are formed, is specifically included:Judge whether photo current belongs to word class picture;If word class picture, then judge whether include predetermined keyword in word;AndWhen comprising predetermined keyword, the level of security of photo current is arranged to high, and be categorized into privacy picture.
- 3. processing method as claimed in claim 1, it is characterised in that the picture in picture library is carried out according to level of security Classification, normal picture and privacy picture are formed, is specifically included:Judge whether photo current belongs to portrait class picture;If portrait class picture, then judge whether the portrait matches with default encryption portrait;AndIf matching, the level of security of photo current is arranged to high, and be categorized into privacy picture.
- 4. processing method as claimed in claim 1, it is characterised in that it is described if not administrative staff, then into the power of visitor Boundary, and the password of visitor's input is received, also include afterwards:The errors number of the inputted password of statistics;Contrast whether the errors number exceedes default danger threshold;AndWhen errors number exceedes default danger threshold, the encryption photo in the picture library is deleted.
- A kind of 5. processing system of picture, it is characterised in that including:Sort module, for classifying to the picture in picture library according to level of security, form normal picture and privacy picture;Wherein described sort module specifically includes:Portrait classification submodule, for whether belonging to portrait class picture when photo current, And when the bare ratio of portrait exceedes default exposed threshold value in picture, the level of security of photo current is arranged to high, and classify To privacy picture;Encrypting module, the privacy picture is encrypted to form encryption figure for the biological information by administrative staff Piece;Picture library, for storing picture, the storage picture includes common photo and encryption photo;Acquisition module, for gathering the biological information of active user;Feature judge module, for judging whether it is administrative staff according to the biological information of the active user;Display module, for when active user is administrative staff, opening picture library and showing the common photo and encryption photo;Authority module, for when active user is not administrative staff, into the authority interface of visitor, and it to be defeated to receive the visitor The password entered;AndThe display module, it is additionally operable to assign power list according to corresponding to the password obtains it, and list is weighed according to the tax and shown Show the picture in the picture library, including:Normal picture and/or encryption picture.
- 6. processing system as claimed in claim 5, it is characterised in that the sort module, specifically include:Word is classified submodule, for belonging to word class picture when photo current, and during comprising predetermined keyword, by photo current Level of security be arranged to high, and be categorized into privacy picture.
- 7. processing system as claimed in claim 5, it is characterised in that the portrait classification submodule, be additionally operable to currently to scheme Whether piece belongs to portrait class picture, and when whether the portrait matches with default encryption portrait, by the safe level of photo current It is not arranged to high, and is categorized into privacy picture.
- 8. processing system as claimed in claim 5, it is characterised in that also include:Statistical module, for counting the errors number of inputted password;Contrast module, for contrasting whether the errors number exceedes default danger threshold;AndRemoving module, for when errors number exceedes default danger threshold, deleting the encryption photo in the picture library.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510717913.XA CN105335642B (en) | 2015-10-28 | 2015-10-28 | The processing method and processing system of picture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510717913.XA CN105335642B (en) | 2015-10-28 | 2015-10-28 | The processing method and processing system of picture |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105335642A CN105335642A (en) | 2016-02-17 |
CN105335642B true CN105335642B (en) | 2018-02-16 |
Family
ID=55286162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510717913.XA Expired - Fee Related CN105335642B (en) | 2015-10-28 | 2015-10-28 | The processing method and processing system of picture |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105335642B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106126991B (en) * | 2016-06-24 | 2019-06-28 | 北京金山安全软件有限公司 | Information protection processing method and device and terminal equipment |
CN106293394B (en) * | 2016-07-29 | 2019-07-12 | 广州华多网络科技有限公司 | A kind of method and electronic equipment of picture sharing |
CN106709367B (en) * | 2016-12-12 | 2021-10-15 | 上海豹云网络信息服务有限公司 | Device and method for limiting picture sliding browsing for mobile terminal |
CN108551550A (en) * | 2018-04-09 | 2018-09-18 | 平安科技(深圳)有限公司 | Image control, the filming control method of camera applications, device and electronic equipment |
CN108647528A (en) * | 2018-04-25 | 2018-10-12 | 上海与德科技有限公司 | A kind of photo processing method, device, terminal and storage medium |
CN109885707A (en) * | 2019-02-01 | 2019-06-14 | 北京字节跳动网络技术有限公司 | The method for refreshing of picture, device, terminal device and storage medium in picture library |
CN111241508A (en) * | 2019-12-31 | 2020-06-05 | 航天信息股份有限公司 | Method and device for generating picture library authorization code and method and device for using picture library authorization code |
CN112804445B (en) * | 2020-12-30 | 2022-08-26 | 维沃移动通信有限公司 | Display method and device and electronic equipment |
CN112653713A (en) * | 2021-01-22 | 2021-04-13 | 深圳市房多多网络科技有限公司 | Image downloading protection method and device and computing equipment |
CN113838547A (en) * | 2021-09-28 | 2021-12-24 | 湖南康凯信息技术有限公司 | Intelligent medical service management system based on intelligent terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104077517A (en) * | 2014-06-30 | 2014-10-01 | 惠州Tcl移动通信有限公司 | Mobile terminal user mode start method and system based on iris identification |
CN104463017A (en) * | 2014-12-22 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104933342A (en) * | 2015-06-18 | 2015-09-23 | 广东欧珀移动通信有限公司 | Picture viewing method and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514286A (en) * | 2013-09-30 | 2014-01-15 | 鸿富锦精密工业(深圳)有限公司 | Friend recommending system and method |
-
2015
- 2015-10-28 CN CN201510717913.XA patent/CN105335642B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104077517A (en) * | 2014-06-30 | 2014-10-01 | 惠州Tcl移动通信有限公司 | Mobile terminal user mode start method and system based on iris identification |
CN104463017A (en) * | 2014-12-22 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104933342A (en) * | 2015-06-18 | 2015-09-23 | 广东欧珀移动通信有限公司 | Picture viewing method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105335642A (en) | 2016-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105335642B (en) | The processing method and processing system of picture | |
RU2718226C2 (en) | Biometric data safe handling systems and methods | |
CN105354509B (en) | The processing method and processing system of picture | |
CN105260669B (en) | The transmission method and Transmission system of photo | |
CN101958892B (en) | Electronic data protection method, device and system based on face recognition | |
US11184173B2 (en) | Secure distributed information system | |
CN107103245B (en) | File authority management method and device | |
CN103186761B (en) | The fingerprint encryption method and its communication terminal of secret file | |
CN106022039A (en) | Secure storage system and storage method of electronic information | |
CN105429949B (en) | The method for pushing and supplying system of password | |
CN105429761A (en) | Key generation method and device | |
CN102867157B (en) | Mobile terminal and data guard method | |
CN105786974B (en) | A kind of computer data storage inquiry system | |
CN106713618A (en) | Processing method of identifying code and mobile terminal | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
US20160314720A1 (en) | Information encryption system and information encryption method using optical character recognition | |
EP2835997A1 (en) | Cell phone data encryption method and decryption method | |
CN105871892A (en) | File cloud storage security solution method and system | |
US20210351927A1 (en) | System, method and computer program product for mitigating customer onboarding risk | |
CN103927470A (en) | File encryption and decryption system and method based on iris recognition | |
JP7105495B2 (en) | Segmented key authenticator | |
US11328080B2 (en) | Cryptographic key management | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment | |
CN106529232A (en) | Startup method and device | |
CN105303085A (en) | File sharing method and sharing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180216 |