CN107229875A - Terminal method for secret protection and system - Google Patents

Terminal method for secret protection and system Download PDF

Info

Publication number
CN107229875A
CN107229875A CN201710404138.1A CN201710404138A CN107229875A CN 107229875 A CN107229875 A CN 107229875A CN 201710404138 A CN201710404138 A CN 201710404138A CN 107229875 A CN107229875 A CN 107229875A
Authority
CN
China
Prior art keywords
video
picture
user
copy
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710404138.1A
Other languages
Chinese (zh)
Inventor
李炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Ittrich Network Technology Co Ltd
Original Assignee
Shenzhen City Ittrich Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Ittrich Network Technology Co Ltd filed Critical Shenzhen City Ittrich Network Technology Co Ltd
Priority to CN201710404138.1A priority Critical patent/CN107229875A/en
Priority to PCT/CN2017/101602 priority patent/WO2018218806A1/en
Publication of CN107229875A publication Critical patent/CN107229875A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention provides a kind of terminal method for secret protection and system, methods described comprises the following steps:Determine the picture and video protected the need for user's selection;The picture and video are set to stealth mode;The attribute of the picture and video is arranged to copy.The technical scheme that the present invention is provided has the advantages that user experience is high.

Description

Terminal method for secret protection and system
Technical field
The present invention relates to the communications field, more particularly to a kind of terminal method for secret protection and system.
Background technology
The picture and video that smart mobile phone belongs in people's common equipment used in everyday, smart mobile phone generally have privacy It is required that, as long as existing smart mobile phone is unlocked, the copy of its picture is not restricted by, and this causes going out for similar Nude Picture Scandal event Existing, user experience is low.
The content of the invention
A kind of terminal method for secret protection is provided, the low shortcoming of prior art user Experience Degree is which solved.
On the one hand there is provided a kind of terminal method for secret protection, methods described comprises the following steps:
Determine the picture and video protected the need for user's selection;
The picture and video are set to stealth mode;
The attribute of the picture and video is arranged to copy.
Optionally, methods described also includes:
User is identified by bio-identification module, is such as identified by, it is allowed to which user is to the picture and the category of video Property modification.
Optionally, methods described also includes:
The copy request of the picture and video is such as detected, then triggering alarm, records the copy time.
Second aspect includes there is provided a kind of terminal intimacy protection system, methods described:
Touch control unit, for determining picture and video that user protects the need for selecting;
Setting unit, for the picture and video to be set into stealth mode;
Control unit, for being arranged to the attribute of the picture and video to copy.
Optionally, the system also includes:
Control unit, for user to be identified by bio-identification module, is such as identified by, it is allowed to which user is to the figure The attribute modification of piece and video.
Optionally, the system also includes:
Control unit, the copy for such as detecting the picture and video is asked, then triggering alarm, when recording the copy Between.
The third aspect is stored thereon with computer program there is provided a kind of computer-readable recording medium, and the program is processed Device realizes above-mentioned terminal method for secret protection when performing.
There is provided a kind of terminal, including one or more processors, memory, transceiver, and one or many for fourth aspect Individual program, one or more of programs are stored in the memory, and are configured by one or more of processing Device is performed, and described program includes the instruction for being used to perform the step in above-mentioned terminal method for secret protection.
The technical scheme that the specific embodiment of the invention is provided determines the picture and video protected the need for user's selection, will The picture and video are set to stealth mode, the attribute of the picture and video are arranged to copy, so it has foundation Picture and video are arranged to copy by user's selection, facilitate the advantage of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
A kind of flow chart for terminal method for secret protection that Fig. 1 provides for the present invention.
A kind of structure chart for terminal intimacy protection system that Fig. 2 provides for the present invention.
A kind of hardware architecture diagram for terminal that Fig. 3 provides for the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Refering to Fig. 1, a kind of flow for terminal method for secret protection that Fig. 1 provides for the first better embodiment of the invention Figure, this method is completed by terminal, and this method is as shown in figure 1, comprise the following steps:
Step S101, determine the picture and video protected the need for user's selection;
Step S102, the picture and video be set to stealth mode;
Step S103, the attribute of the picture and video is arranged to copy.
The technical scheme that the specific embodiment of the invention is provided determines the picture and video protected the need for user's selection, will The picture and video are set to stealth mode, the attribute of the picture and video are arranged to copy, so it has foundation Picture and video are arranged to copy by user's selection, facilitate the advantage of user.
Optionally, it can also include after above-mentioned steps S103:
User is identified by bio-identification module, is such as identified by, it is allowed to which user is to the picture and the category of video Property modification.
Optionally, it can also include after above-mentioned steps S103:
The copy request of the picture and video is such as detected, then triggering alarm, records the copy time.
Refering to Fig. 2, a kind of terminal intimacy protection system that Fig. 2 provides for the second better embodiment of the invention, the system As shown in Fig. 2 including:
Touch control unit 201, for determining picture and video that user protects the need for selecting;
Setting unit 202, for the picture and video to be set into stealth mode;
Control unit 203, for being arranged to the attribute of the picture and video to copy.
The technical scheme that the specific embodiment of the invention is provided determines the picture and video protected the need for user's selection, will The picture and video are set to stealth mode, the attribute of the picture and video are arranged to copy, so it has foundation Picture and video are arranged to copy by user's selection, facilitate the advantage of user.
Optionally, said system can also include:
Control unit 203, for user to be identified by bio-identification module, is such as identified by, it is allowed to user couple The attribute modification of the picture and video.
Optionally, said system can also include:
Control unit 203, the copy for such as detecting the picture and video is asked, then triggering alarm, records the copy Time.
It should be noted that for foregoing each method embodiment or embodiment, in order to be briefly described, therefore by its all table State as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement Limitation because according to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, people in the art Member should also know that embodiment or embodiment described in the specification belong to preferred embodiment, involved action and list Necessary to the member not necessarily present invention.
The specific embodiment of the invention also provides a kind of computer-readable recording medium, is stored thereon with computer program, The program realizes above-mentioned terminal method for secret protection when being executed by processor.
The specific embodiment of the invention also provides a kind of terminal, as shown in figure 3, including one or more processors 302, depositing Reservoir 301, transceiver 303, and one or more programs, one or more of programs are stored in the memory, And it is configured by one or more of computing devices, described program includes being used to perform above-mentioned terminal method for secret protection In step instruction.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
Step in present invention method can be sequentially adjusted, merged and deleted according to actual needs.
Unit in device of the embodiment of the present invention can be combined, divided and deleted according to actual needs.This area Not be the same as Example and the feature of non-be the same as Example described in this specification can be combined or combined by technical staff.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be with Realized with hardware, or firmware is realized, or combinations thereof mode is realized.When implemented in software, can be by above-mentioned functions It is stored in computer-readable medium or is transmitted as one or more instructions on computer-readable medium or code.Meter Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another Any medium of individual place transmission computer program.Storage medium can be any usable medium that computer can be accessed.With Exemplified by this but it is not limited to:Computer-readable medium can include random access memory (Random Access Memory, RAM), read-only storage (Read-Only Memory, ROM), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read- Only Memory, CD-ROM) or other optical disc storages, magnetic disk storage medium or other magnetic storage apparatus or can be used in Carry or storage with instruction or data structure form desired program code and can by computer access any other Medium.In addition.Any connection can be suitably turn into computer-readable medium.If for example, software is to use coaxial cable, light Fine optical cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio and The wireless technology of microwave etc is transmitted from website, server or other remote sources, then coaxial cable, optical fiber cable, double The wireless technology of twisted wire, DSL or such as infrared ray, wireless and microwave etc be included in belonging to medium it is fixing in.Such as this hair Used in bright, disk (Disk) and dish (disc) include compressing laser disc (CD), laser disc, laser disc, Digital Versatile Disc (DVD), Floppy disk and Blu-ray Disc, the replicate data of the usual magnetic of which disk, and dish is then with laser come optical replicate data.Group above Conjunction should also be as being included within the protection domain of computer-readable medium.
In a word, the preferred embodiment of technical solution of the present invention is the foregoing is only, is not intended to limit the present invention's Protection domain.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., should be included in Within protection scope of the present invention.

Claims (8)

1. a kind of terminal method for secret protection, it is characterised in that methods described comprises the following steps:
Determine the picture and video protected the need for user's selection;
The picture and video are set to stealth mode;
The attribute of the picture and video is arranged to copy.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
User is identified by bio-identification module, is such as identified by, it is allowed to which user repaiies to the attribute of the picture and video Change.
3. according to the method described in claim 1, it is characterised in that methods described also includes:
The copy request of the picture and video is such as detected, then triggering alarm, records the copy time.
4. a kind of terminal intimacy protection system, it is characterised in that methods described includes:
Touch control unit, for determining picture and video that user protects the need for selecting;
Setting unit, for the picture and video to be set into stealth mode;
Control unit, for being arranged to the attribute of the picture and video to copy.
5. system according to claim 4, it is characterised in that
Described control unit, for user to be identified by bio-identification module, is such as identified by, it is allowed to which user is to the figure The attribute modification of piece and video.
6. system according to claim 4, it is characterised in that
Described control unit, the copy for such as detecting the picture and video is asked, then triggering alarm, when recording the copy Between.
7. a kind of computer-readable recording medium, is stored thereon with computer program, realized such as when the program is executed by processor Terminal method for secret protection described in claim 1-3 any one.
8. a kind of terminal, it is characterised in that including one or more processors, memory, transceiver, and one or more journeys Sequence, one or more of programs are stored in the memory, and are configured to be held by one or more of processors OK, described program includes the instruction for being used to perform the step in the terminal method for secret protection described in 1-3 any one.
CN201710404138.1A 2017-06-01 2017-06-01 Terminal method for secret protection and system Pending CN107229875A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710404138.1A CN107229875A (en) 2017-06-01 2017-06-01 Terminal method for secret protection and system
PCT/CN2017/101602 WO2018218806A1 (en) 2017-06-01 2017-09-13 Terminal privacy protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710404138.1A CN107229875A (en) 2017-06-01 2017-06-01 Terminal method for secret protection and system

Publications (1)

Publication Number Publication Date
CN107229875A true CN107229875A (en) 2017-10-03

Family

ID=59933583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710404138.1A Pending CN107229875A (en) 2017-06-01 2017-06-01 Terminal method for secret protection and system

Country Status (2)

Country Link
CN (1) CN107229875A (en)
WO (1) WO2018218806A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992765A (en) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 A kind of picture hidden method and device
CN108595569A (en) * 2018-04-13 2018-09-28 Oppo广东移动通信有限公司 File path clone method, file path reproducing unit and mobile terminal
CN111935435A (en) * 2020-07-28 2020-11-13 深圳市鼎盛光电有限公司 Video file encryption method and device, digital television equipment and storage medium
CN112926089A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Data risk prevention and control method, device and equipment based on privacy protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080256647A1 (en) * 2004-10-13 2008-10-16 Electronics And Telecommunications Research Instit System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN103533172A (en) * 2013-10-22 2014-01-22 陕西高新实业有限公司 Method for storing and managing photo information of mobile phone
CN104462900A (en) * 2014-12-05 2015-03-25 来安县新元机电设备设计有限公司 Method and system for protecting private pictures in mobile terminal
CN105574423A (en) * 2014-10-09 2016-05-11 中兴通讯股份有限公司 Terminal device and file management method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080256647A1 (en) * 2004-10-13 2008-10-16 Electronics And Telecommunications Research Instit System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN103533172A (en) * 2013-10-22 2014-01-22 陕西高新实业有限公司 Method for storing and managing photo information of mobile phone
CN105574423A (en) * 2014-10-09 2016-05-11 中兴通讯股份有限公司 Terminal device and file management method thereof
CN104462900A (en) * 2014-12-05 2015-03-25 来安县新元机电设备设计有限公司 Method and system for protecting private pictures in mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992765A (en) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 A kind of picture hidden method and device
CN108595569A (en) * 2018-04-13 2018-09-28 Oppo广东移动通信有限公司 File path clone method, file path reproducing unit and mobile terminal
CN111935435A (en) * 2020-07-28 2020-11-13 深圳市鼎盛光电有限公司 Video file encryption method and device, digital television equipment and storage medium
CN111935435B (en) * 2020-07-28 2022-12-20 深圳市鼎盛光电有限公司 Video file encryption method and device, digital television equipment and storage medium
CN112926089A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Data risk prevention and control method, device and equipment based on privacy protection

Also Published As

Publication number Publication date
WO2018218806A1 (en) 2018-12-06

Similar Documents

Publication Publication Date Title
CN107229875A (en) Terminal method for secret protection and system
CN107158700A (en) Organizing method and system of the online game based on positioning
CN107105482A (en) Terminal wifi connection control methods and system
CN107070729A (en) Main equipment elects method and system in network linking
CN107135108A (en) The update method and system of network connection list
CN107180109A (en) Location-based Condom recommends method and system
CN107146081A (en) Terminal quick payment method and system based on positioning
CN107196821A (en) The method of calibration and system of time delay in network link
CN106998394A (en) The method to set up and system of particular contact prompting
CN107204897A (en) The fault detection method and system of network link
CN107096222A (en) Location path method and system for planning in game
CN107103565A (en) Network meal-ordering method and system based on positioning
CN107249177A (en) The reminding method and system of children's wrist-watch position in terminal
CN106973169A (en) The information-reading method and system of short message
CN107231477A (en) The information-reading method and system of wechat
CN107148001A (en) Wechat friend invitation method and system based on positioning
CN107096228A (en) Player's grasping means based on positioning and system in fighting landlord
CN107181814A (en) The positioning sharing method and system of the bound device of terminal
CN106971550A (en) The detection method and system of intelligent transportation map Bridge
CN106973072A (en) Network link encryption method and system based on terminal
CN107155183A (en) The data ciphering method and system of smart home
CN107194647A (en) Take out the method and system for planning in path
CN107277841A (en) The system of selection of terminal network connection and system
CN107101646A (en) The application process and system positioned in self-driving
CN107197195A (en) The sharing method and system of cross-platform destination

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003

RJ01 Rejection of invention patent application after publication