CN107229875A - Terminal method for secret protection and system - Google Patents
Terminal method for secret protection and system Download PDFInfo
- Publication number
- CN107229875A CN107229875A CN201710404138.1A CN201710404138A CN107229875A CN 107229875 A CN107229875 A CN 107229875A CN 201710404138 A CN201710404138 A CN 201710404138A CN 107229875 A CN107229875 A CN 107229875A
- Authority
- CN
- China
- Prior art keywords
- video
- picture
- user
- copy
- attribute
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention provides a kind of terminal method for secret protection and system, methods described comprises the following steps:Determine the picture and video protected the need for user's selection;The picture and video are set to stealth mode;The attribute of the picture and video is arranged to copy.The technical scheme that the present invention is provided has the advantages that user experience is high.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of terminal method for secret protection and system.
Background technology
The picture and video that smart mobile phone belongs in people's common equipment used in everyday, smart mobile phone generally have privacy
It is required that, as long as existing smart mobile phone is unlocked, the copy of its picture is not restricted by, and this causes going out for similar Nude Picture Scandal event
Existing, user experience is low.
The content of the invention
A kind of terminal method for secret protection is provided, the low shortcoming of prior art user Experience Degree is which solved.
On the one hand there is provided a kind of terminal method for secret protection, methods described comprises the following steps:
Determine the picture and video protected the need for user's selection;
The picture and video are set to stealth mode;
The attribute of the picture and video is arranged to copy.
Optionally, methods described also includes:
User is identified by bio-identification module, is such as identified by, it is allowed to which user is to the picture and the category of video
Property modification.
Optionally, methods described also includes:
The copy request of the picture and video is such as detected, then triggering alarm, records the copy time.
Second aspect includes there is provided a kind of terminal intimacy protection system, methods described:
Touch control unit, for determining picture and video that user protects the need for selecting;
Setting unit, for the picture and video to be set into stealth mode;
Control unit, for being arranged to the attribute of the picture and video to copy.
Optionally, the system also includes:
Control unit, for user to be identified by bio-identification module, is such as identified by, it is allowed to which user is to the figure
The attribute modification of piece and video.
Optionally, the system also includes:
Control unit, the copy for such as detecting the picture and video is asked, then triggering alarm, when recording the copy
Between.
The third aspect is stored thereon with computer program there is provided a kind of computer-readable recording medium, and the program is processed
Device realizes above-mentioned terminal method for secret protection when performing.
There is provided a kind of terminal, including one or more processors, memory, transceiver, and one or many for fourth aspect
Individual program, one or more of programs are stored in the memory, and are configured by one or more of processing
Device is performed, and described program includes the instruction for being used to perform the step in above-mentioned terminal method for secret protection.
The technical scheme that the specific embodiment of the invention is provided determines the picture and video protected the need for user's selection, will
The picture and video are set to stealth mode, the attribute of the picture and video are arranged to copy, so it has foundation
Picture and video are arranged to copy by user's selection, facilitate the advantage of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
A kind of flow chart for terminal method for secret protection that Fig. 1 provides for the present invention.
A kind of structure chart for terminal intimacy protection system that Fig. 2 provides for the present invention.
A kind of hardware architecture diagram for terminal that Fig. 3 provides for the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Refering to Fig. 1, a kind of flow for terminal method for secret protection that Fig. 1 provides for the first better embodiment of the invention
Figure, this method is completed by terminal, and this method is as shown in figure 1, comprise the following steps:
Step S101, determine the picture and video protected the need for user's selection;
Step S102, the picture and video be set to stealth mode;
Step S103, the attribute of the picture and video is arranged to copy.
The technical scheme that the specific embodiment of the invention is provided determines the picture and video protected the need for user's selection, will
The picture and video are set to stealth mode, the attribute of the picture and video are arranged to copy, so it has foundation
Picture and video are arranged to copy by user's selection, facilitate the advantage of user.
Optionally, it can also include after above-mentioned steps S103:
User is identified by bio-identification module, is such as identified by, it is allowed to which user is to the picture and the category of video
Property modification.
Optionally, it can also include after above-mentioned steps S103:
The copy request of the picture and video is such as detected, then triggering alarm, records the copy time.
Refering to Fig. 2, a kind of terminal intimacy protection system that Fig. 2 provides for the second better embodiment of the invention, the system
As shown in Fig. 2 including:
Touch control unit 201, for determining picture and video that user protects the need for selecting;
Setting unit 202, for the picture and video to be set into stealth mode;
Control unit 203, for being arranged to the attribute of the picture and video to copy.
The technical scheme that the specific embodiment of the invention is provided determines the picture and video protected the need for user's selection, will
The picture and video are set to stealth mode, the attribute of the picture and video are arranged to copy, so it has foundation
Picture and video are arranged to copy by user's selection, facilitate the advantage of user.
Optionally, said system can also include:
Control unit 203, for user to be identified by bio-identification module, is such as identified by, it is allowed to user couple
The attribute modification of the picture and video.
Optionally, said system can also include:
Control unit 203, the copy for such as detecting the picture and video is asked, then triggering alarm, records the copy
Time.
It should be noted that for foregoing each method embodiment or embodiment, in order to be briefly described, therefore by its all table
State as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement
Limitation because according to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, people in the art
Member should also know that embodiment or embodiment described in the specification belong to preferred embodiment, involved action and list
Necessary to the member not necessarily present invention.
The specific embodiment of the invention also provides a kind of computer-readable recording medium, is stored thereon with computer program,
The program realizes above-mentioned terminal method for secret protection when being executed by processor.
The specific embodiment of the invention also provides a kind of terminal, as shown in figure 3, including one or more processors 302, depositing
Reservoir 301, transceiver 303, and one or more programs, one or more of programs are stored in the memory,
And it is configured by one or more of computing devices, described program includes being used to perform above-mentioned terminal method for secret protection
In step instruction.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
Step in present invention method can be sequentially adjusted, merged and deleted according to actual needs.
Unit in device of the embodiment of the present invention can be combined, divided and deleted according to actual needs.This area
Not be the same as Example and the feature of non-be the same as Example described in this specification can be combined or combined by technical staff.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be with
Realized with hardware, or firmware is realized, or combinations thereof mode is realized.When implemented in software, can be by above-mentioned functions
It is stored in computer-readable medium or is transmitted as one or more instructions on computer-readable medium or code.Meter
Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another
Any medium of individual place transmission computer program.Storage medium can be any usable medium that computer can be accessed.With
Exemplified by this but it is not limited to:Computer-readable medium can include random access memory (Random Access Memory,
RAM), read-only storage (Read-Only Memory, ROM), EEPROM (Electrically
Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-
Only Memory, CD-ROM) or other optical disc storages, magnetic disk storage medium or other magnetic storage apparatus or can be used in
Carry or storage with instruction or data structure form desired program code and can by computer access any other
Medium.In addition.Any connection can be suitably turn into computer-readable medium.If for example, software is to use coaxial cable, light
Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and
The wireless technology of microwave etc is transmitted from website, server or other remote sources, then coaxial cable, optical fiber cable, double
The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in belonging to medium it is fixing in.Such as this hair
Used in bright, disk (Disk) and dish (disc) include compressing laser disc (CD), laser disc, laser disc, Digital Versatile Disc (DVD),
Floppy disk and Blu-ray Disc, the replicate data of the usual magnetic of which disk, and dish is then with laser come optical replicate data.Group above
Conjunction should also be as being included within the protection domain of computer-readable medium.
In a word, the preferred embodiment of technical solution of the present invention is the foregoing is only, is not intended to limit the present invention's
Protection domain.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., should be included in
Within protection scope of the present invention.
Claims (8)
1. a kind of terminal method for secret protection, it is characterised in that methods described comprises the following steps:
Determine the picture and video protected the need for user's selection;
The picture and video are set to stealth mode;
The attribute of the picture and video is arranged to copy.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
User is identified by bio-identification module, is such as identified by, it is allowed to which user repaiies to the attribute of the picture and video
Change.
3. according to the method described in claim 1, it is characterised in that methods described also includes:
The copy request of the picture and video is such as detected, then triggering alarm, records the copy time.
4. a kind of terminal intimacy protection system, it is characterised in that methods described includes:
Touch control unit, for determining picture and video that user protects the need for selecting;
Setting unit, for the picture and video to be set into stealth mode;
Control unit, for being arranged to the attribute of the picture and video to copy.
5. system according to claim 4, it is characterised in that
Described control unit, for user to be identified by bio-identification module, is such as identified by, it is allowed to which user is to the figure
The attribute modification of piece and video.
6. system according to claim 4, it is characterised in that
Described control unit, the copy for such as detecting the picture and video is asked, then triggering alarm, when recording the copy
Between.
7. a kind of computer-readable recording medium, is stored thereon with computer program, realized such as when the program is executed by processor
Terminal method for secret protection described in claim 1-3 any one.
8. a kind of terminal, it is characterised in that including one or more processors, memory, transceiver, and one or more journeys
Sequence, one or more of programs are stored in the memory, and are configured to be held by one or more of processors
OK, described program includes the instruction for being used to perform the step in the terminal method for secret protection described in 1-3 any one.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710404138.1A CN107229875A (en) | 2017-06-01 | 2017-06-01 | Terminal method for secret protection and system |
PCT/CN2017/101602 WO2018218806A1 (en) | 2017-06-01 | 2017-09-13 | Terminal privacy protection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710404138.1A CN107229875A (en) | 2017-06-01 | 2017-06-01 | Terminal method for secret protection and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107229875A true CN107229875A (en) | 2017-10-03 |
Family
ID=59933583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710404138.1A Pending CN107229875A (en) | 2017-06-01 | 2017-06-01 | Terminal method for secret protection and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107229875A (en) |
WO (1) | WO2018218806A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107992765A (en) * | 2017-11-28 | 2018-05-04 | 珠海格力电器股份有限公司 | A kind of picture hidden method and device |
CN108595569A (en) * | 2018-04-13 | 2018-09-28 | Oppo广东移动通信有限公司 | File path clone method, file path reproducing unit and mobile terminal |
CN111935435A (en) * | 2020-07-28 | 2020-11-13 | 深圳市鼎盛光电有限公司 | Video file encryption method and device, digital television equipment and storage medium |
CN112926089A (en) * | 2021-03-25 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Data risk prevention and control method, device and equipment based on privacy protection |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080256647A1 (en) * | 2004-10-13 | 2008-10-16 | Electronics And Telecommunications Research Instit | System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint |
CN103186761A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint encryption method of private file and communication terminal |
CN103533172A (en) * | 2013-10-22 | 2014-01-22 | 陕西高新实业有限公司 | Method for storing and managing photo information of mobile phone |
CN104462900A (en) * | 2014-12-05 | 2015-03-25 | 来安县新元机电设备设计有限公司 | Method and system for protecting private pictures in mobile terminal |
CN105574423A (en) * | 2014-10-09 | 2016-05-11 | 中兴通讯股份有限公司 | Terminal device and file management method thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
-
2017
- 2017-06-01 CN CN201710404138.1A patent/CN107229875A/en active Pending
- 2017-09-13 WO PCT/CN2017/101602 patent/WO2018218806A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080256647A1 (en) * | 2004-10-13 | 2008-10-16 | Electronics And Telecommunications Research Instit | System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint |
CN103186761A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint encryption method of private file and communication terminal |
CN103533172A (en) * | 2013-10-22 | 2014-01-22 | 陕西高新实业有限公司 | Method for storing and managing photo information of mobile phone |
CN105574423A (en) * | 2014-10-09 | 2016-05-11 | 中兴通讯股份有限公司 | Terminal device and file management method thereof |
CN104462900A (en) * | 2014-12-05 | 2015-03-25 | 来安县新元机电设备设计有限公司 | Method and system for protecting private pictures in mobile terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107992765A (en) * | 2017-11-28 | 2018-05-04 | 珠海格力电器股份有限公司 | A kind of picture hidden method and device |
CN108595569A (en) * | 2018-04-13 | 2018-09-28 | Oppo广东移动通信有限公司 | File path clone method, file path reproducing unit and mobile terminal |
CN111935435A (en) * | 2020-07-28 | 2020-11-13 | 深圳市鼎盛光电有限公司 | Video file encryption method and device, digital television equipment and storage medium |
CN111935435B (en) * | 2020-07-28 | 2022-12-20 | 深圳市鼎盛光电有限公司 | Video file encryption method and device, digital television equipment and storage medium |
CN112926089A (en) * | 2021-03-25 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Data risk prevention and control method, device and equipment based on privacy protection |
Also Published As
Publication number | Publication date |
---|---|
WO2018218806A1 (en) | 2018-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107229875A (en) | Terminal method for secret protection and system | |
CN107158700A (en) | Organizing method and system of the online game based on positioning | |
CN107105482A (en) | Terminal wifi connection control methods and system | |
CN107070729A (en) | Main equipment elects method and system in network linking | |
CN107135108A (en) | The update method and system of network connection list | |
CN107180109A (en) | Location-based Condom recommends method and system | |
CN107146081A (en) | Terminal quick payment method and system based on positioning | |
CN107196821A (en) | The method of calibration and system of time delay in network link | |
CN106998394A (en) | The method to set up and system of particular contact prompting | |
CN107204897A (en) | The fault detection method and system of network link | |
CN107096222A (en) | Location path method and system for planning in game | |
CN107103565A (en) | Network meal-ordering method and system based on positioning | |
CN107249177A (en) | The reminding method and system of children's wrist-watch position in terminal | |
CN106973169A (en) | The information-reading method and system of short message | |
CN107231477A (en) | The information-reading method and system of wechat | |
CN107148001A (en) | Wechat friend invitation method and system based on positioning | |
CN107096228A (en) | Player's grasping means based on positioning and system in fighting landlord | |
CN107181814A (en) | The positioning sharing method and system of the bound device of terminal | |
CN106971550A (en) | The detection method and system of intelligent transportation map Bridge | |
CN106973072A (en) | Network link encryption method and system based on terminal | |
CN107155183A (en) | The data ciphering method and system of smart home | |
CN107194647A (en) | Take out the method and system for planning in path | |
CN107277841A (en) | The system of selection of terminal network connection and system | |
CN107101646A (en) | The application process and system positioned in self-driving | |
CN107197195A (en) | The sharing method and system of cross-platform destination |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171003 |
|
RJ01 | Rejection of invention patent application after publication |