CN107784234A - Privacy recognition methods and device based on ear line - Google Patents

Privacy recognition methods and device based on ear line Download PDF

Info

Publication number
CN107784234A
CN107784234A CN201610751856.1A CN201610751856A CN107784234A CN 107784234 A CN107784234 A CN 107784234A CN 201610751856 A CN201610751856 A CN 201610751856A CN 107784234 A CN107784234 A CN 107784234A
Authority
CN
China
Prior art keywords
user
ear line
privacy
line information
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610751856.1A
Other languages
Chinese (zh)
Inventor
黄勤波
郭泉
李晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610751856.1A priority Critical patent/CN107784234A/en
Publication of CN107784234A publication Critical patent/CN107784234A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Social Psychology (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present invention provides a kind of privacy recognition methods based on ear line, and this method includes:When answering action of user is detected, gathers the ear line information of the user;In the ear line information and preset ear line information matches, the user is determined to trust user, and privacy voice is played for the user.The embodiment of the present invention also provides a kind of privacy identification device based on ear line simultaneously.

Description

Privacy recognition methods and device based on ear line
Technical field
The present embodiments relate to a kind of privacy identification technology, more particularly to a kind of privacy recognition methods based on ear line and Device.
Background technology
With the development of the society, intelligent terminal is increasingly received by people, while people also increasingly tend to The simplification of operation.Mobile phone is widely used by people already as a kind of intelligent terminal.
Ear recognition received state as a kind of new biometrics identification technology, its theory and application research at nearly 2 years Inside and outside scholar more pays close attention to.Ear recognition problem based on still image can be divided into three classes according to the difference of input picture:Base Ear recognition in two dimensional image, the ear recognition based on 3D and the identification of ear line.When human ear is squeezed in certain material (such as glass) Ear line can be left when upper.Equally, ear line can also be used as a kind of biological characteristic.Its application is concentrated mainly in crime survey.Ear Line feature generally is extracted to obtain at helix, anthelix, tragus, antitragus.Ear line recognition principle and fingerprint recognition are similar, All it is to form biometrics password by recording a series of geometric properties.Mobile phone using front camera or is then thermal imaging accessory To catch ear line from two angles, so as to realize identification.
With the continuous development of communication apparatus, communication security problem is increasingly valued by the people.Ear line and DNA, fingerprint Equally, it is a kind of identification code of human identity, specific monomer uniqueness.Using ear line recognition and encryption technology, carried out in user During communication, sensitive information is protected, relieves worry of the user to information security.Therefore, it is a kind of by ear line to need offer badly Method applied to privacy identification protecting.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provide a kind of privacy recognition methods based on ear line and Device, ear line is combined with the privacy identification of terminal device, there is provided safer privacy information protection, lift user's body Test.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
A kind of privacy recognition methods based on ear line, methods described include:
When answering action of user is detected, gathers the ear line information of the user;
In the ear line information and preset ear line information matches, determine that the user is the user to trust user Play privacy voice.
Method as described above, wherein, it is described to determine that the user is that methods described also includes after trusting user:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
Method as described above, wherein, methods described also includes:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is described User plays the privacy voice.
Method as described above, wherein, after the ear line information of the collection user, methods described also includes:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;Press According to privacy voice described in default processing rule process.
Method as described above, wherein, it is described according to default processing rule process incoming call or voice, including:
Default prompting message is played to incoming call user;Or play and forge voice.
A kind of privacy identification device based on ear line, described device include:
Acquisition module, for detecting when answering action of user, gather the ear line information of the user;
Processing module, in the ear line information and preset ear line information matches, determining that the user uses to trust Family, privacy voice is played for the user.
Device as described above, wherein, the processing module is additionally operable to:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
Device as described above, wherein, the processing module is additionally operable to:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is described User plays the privacy voice.
Device as described above, wherein, the processing module is additionally operable to:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;Press According to privacy voice described in default processing rule process.
Device as described above, wherein, the processing module is specifically used for:
Default prompting message is played to incoming call user;Or play and forge voice.
Privacy recognition methods and device provided in an embodiment of the present invention based on ear line, by detecting that answering for user is dynamic When making, the ear line information of the user is gathered;In the ear line information and preset ear line information matches, determine that the user is Trust user, privacy voice is played for the user, wherein, privacy voice includes privacy phone and privacy audio.It so, it is possible Privacy phone and privacy audio are judged in action is answered, if detecting it is private data, Temporarily Closed receiver It is outer to put and earphone interface, after passing through by the detection of ear line, then for user broadcasting private data is connect, it is both user-friendly, and not Reveal vestige, serve good camouflage effectiveness.Greatly improve Consumer's Experience.
Brief description of the drawings
In accompanying drawing (it is not necessarily drawn to scale), similar reference phase described in different views As part.Similar reference numerals with different letter suffix can represent the different examples of similar component.Accompanying drawing with example and Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention one provides;
Fig. 2 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention two provides;
Fig. 3 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention three provides;
Fig. 4 is the structural representation for the privacy identification device based on ear line that the embodiment of the present invention one provides;
Fig. 5 is the structural representation for the privacy identification device based on ear line that the embodiment of the present invention two provides.
Embodiment
In various embodiments of the present invention, the operation that receives calls of user is simplified by ear line identification technology:Gyroscope and plus Speed meter monitors that " answering " acts, and ear line recognition and verification identity simultaneously unlocks, mobile phone automatic connection.Further, because ear line is known Other technology can also distinguish the left and right ear of same person, also can be by identifying that left and right ear is adapted to different volumes.Further, if It was found that ear line and preset ear line data are inconsistent, mobile phone can be locked, carries out antitheft processing.With preferable operational consistency And security, there is the unexistent advantage of other biological characteristics.
Fig. 1 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention one provides.As shown in figure 1, this The privacy recognition methods based on ear line that embodiment provides can specifically be performed by intelligent terminal, specifically, the present embodiment The method of offer can include:
Step 101, when answering action of user is detected, gather the ear line information of the user.
In the present embodiment, the operation that user receives calls can be simplified by ear line identification technology:Detecting incoming call When, the action of user's " answering " is monitored by gyroscope and accelerometer, ear line recognition and verification identity simultaneously unlocks, mobile phone automatic connection.
, it is necessary to first preset trust user's ear line on intelligent terminal, and can be further preset in practical application Privacy contact data and privacy audio, only when privacy contact is sent a telegram here or plays the speech audio of privacy, just use this The privacy recognition methods based on ear line that embodiment provides is authenticated to the identity of user.
, can be with temporal limitation loudspeaker and ear in the privacy speech audio for detecting privacy contact incoming call or sending Machine audio output.
Step 102, in the ear line information and during preset ear line information matches, determine that the user to trust user, is The user plays privacy voice.
It should be noted that the privacy voice includes privacy incoming call and privacy speech audio.
It should be noted that when the ear line information mismatches with the preset ear line information, determine that the user is Non-trusted user;According to default processing rule process privacy incoming call or privacy speech audio;It is specifically, described according to default processing Rule process privacy is sent a telegram here or privacy speech audio is:Default prompting message is played to incoming call user;Or play and forge language Sound.Further, if it is necessary, antitheft processing can also be carried out to intelligent terminal, such as lock machine, clear data. The present embodiment is not specifically limited to this.
Specifically, in actual applications, the difference of the left and right Er Er lines of user can also be directed to, sets different broadcasting sounds Amount, i.e. it is determined that the user for trust user after, the volume value that prestores corresponding with the ear line information can also be obtained; Privacy phone is connected for the user or play privacy speech audio according to the volume value that prestores.
After acceleration sensor detects and answers action, gather the ear line information of current listening user, and with preset ear line Information is matched, if matching, obtains the volume value that prestores corresponding with the ear line information, the interim volume that adjusts is described pre- Volume value is deposited, it is necessary to which explanation, the volume value that prestores are served only for this call or the broadcasting of this privacy voice;If do not obtain The volume value that prestores corresponding with the ear line information is got, then connects privacy electricity according to the volume value of system default for the user Words play privacy speech audio.In actual applications, after this privacy end of conversation or this privacy speech play terminate, Volume value is reduced to the volume value of system default.
It is understood that if the ear line information of current listening user mismatches with preset ear line information, institute is equally determined It is non-trusted user to state user;According to default processing rule process privacy incoming call or privacy speech audio, i.e. play default remind Information is to incoming call user;Or play and forge voice, if it is necessary, antitheft processing can also be carried out to intelligent terminal, Such as lock machine, clear data.
Illustrate the privacy recognition methods based on ear line that the present embodiment provides below in conjunction with the accompanying drawings.
Fig. 2 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention two provides, as shown in Fig. 2 this The method that embodiment provides specifically includes:
Step 1:Preset trust user's ear line, and the machine has preset privacy contact data and privacy audio.
Step 2:If detect the incoming call of the privacy contact described in step 1 or have the broadcasting of privacy audio.Normal talking With non-privacy audio not by this Row control.
If detecting in this step is the privacy contact incoming call of step 1 or has the broadcasting of privacy audio, interim to limit Loudspeaker processed and earpiece audio output.
Step 3:Acceleration sensor, which has detected, answers/listens to action, is transferred to step 4.
Step 4:The ear line data of listening user are gathered, and are matched with the preset ear line data of step 1, if mirror Fixed non-trusted user, then go to step 6, otherwise go to step 7.
Step 5:Non-trusted user is accredited as by ear line, if privacy is conversed, then plays specific remind to logical automatically Talk about other side;If privacy audio, then play and forge audio concealment realAudio information;If it is necessary, antitheft processing is carried out, Such as lock machine, clear data.
Step 6:Auto-pickup privacy phone plays privacy audio.
In addition, in the present embodiment, it can also further be directed to left and right ear and set different volumes, as shown in figure 3, the party Method specifically includes:
Step 1:Preset trust user's ear line;
Step 2:Different volume values is set for different ear lines;
Step 3:Acceleration sensor, which has detected, answers action;
Step 4:The ear line data of current listening user are collected, and are matched with the data of step 2;If it have found Step 5 is then gone to, otherwise goes to step 6;
Step 5:If step 4 finds the ear line data of correlation and corresponding volume value, interim to adjust volume;This sound Amount is served only for this call and this secondary audio program plays;
Step 6:If step 4 does not find related ear line data and corresponding volume is set, system default is taken Volume value;
Step 7:Terminate if this end of conversation and this secondary audio program play;
Step 8:Reduce volume system default volume value for before.
The privacy recognition methods based on ear line that the present embodiment provides, can to privacy phone and privacy audio answer it is dynamic In work, if it is private data to detect, Temporarily Closed receiver is put outside and earphone interface, after being passed through by the detection of ear line, then Private data is played, it is so, both user-friendly, make no sign again, serve good camouflage effectiveness.Greatly improve use Experience at family.
Fig. 4 is the privacy identification device based on ear line that the embodiment of the present invention one provides.As shown in figure 4, the present embodiment carries The device of confession can be arranged in intelligent terminal, such as smart mobile phone, tablet personal computer, specifically, what the present embodiment provided Device includes:Acquisition module 11 and processing module 12.
Wherein, acquisition module 11, for detecting when answering action of user, the ear line information of the user is gathered;
Processing module 12, in the ear line information and preset ear line information matches, determining the user to trust User, privacy voice is played for the user.
Further, the processing module 12 is additionally operable to:Obtain the volume value that prestores corresponding with the ear line information;According to The volume value that prestores plays privacy voice for the user.
Further, handled module 12 is additionally operable to:After this end of conversation or this speech play terminate, by volume Value is reduced to the volume value of system default.
Further, the processing module 12 is additionally operable to:If the volume that prestores corresponding with the ear line information is not got Value, then play privacy voice according to the volume value of system default for the user.
Further, the processing module 12 is additionally operable to:Mismatched in the ear line information and the preset ear line information When, it is non-trusted user to determine the user;Privacy voice is played according to default processing rule process.
Specifically, the processing module 12 is specifically used for:Default prompting message is played to incoming call user;Or play pseudo- Make voice.
In another feasible embodiment, as shown in figure 5, the identification dress of the privacy based on ear line that the present embodiment provides Acceleration sensor, ear line scanning extraction module, ear line identification module and ear line local data module can also be included by putting.
Wherein, acceleration sensor module is used for the action that receives calls for identifying user, with reference to ear line identification module identification mirror After determining user identity, make being handled differently for a step;Ear line scans extraction module and ear line identification module, is swept to complete ear line Retouch, and ear line information transmission is identified into module to ear line, for verifying user identity or identification left and right ear;Ear line local data mould Block is used for the ear line data for gathering owner or associated user in advance, is owner or trust user for identifying.
The privacy identification device based on ear line that the present embodiment provides, available for the technical side for performing above method embodiment Case, its implementing principle and technical effect is similar, and here is omitted.
In actual applications, the acquisition module 11 and processing module 12 can identify dress by the privacy for being based on ear line In putting central processing unit (Central Processing Unit, CPU), microprocessor (Micro Processor Unit, MPU), digital signal processor (Digital Signal Processor, DSP) or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realize.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (10)

1. a kind of privacy recognition methods based on ear line, it is characterised in that methods described includes:
When answering action of user is detected, gathers the ear line information of the user;
In the ear line information and preset ear line information matches, determine that the user to trust user, plays for the user Privacy voice.
2. according to the method for claim 1, it is characterised in that described after the determination user is trusts user Method also includes:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
3. according to the method for claim 2, it is characterised in that methods described also includes:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is the user Play the privacy voice.
4. according to the method for claim 1, it is characterised in that described after the ear line information of the collection user Method also includes:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;According to pre- If handle privacy voice described in rule process.
5. according to the method for claim 4, it is characterised in that it is described to handle rule process incoming call or voice according to default, Including:
Default prompting message is played to incoming call user;Or play and forge voice.
6. a kind of privacy identification device based on ear line, it is characterised in that described device includes:
Acquisition module, for detecting when answering action of user, gather the ear line information of the user;
Processing module, in the ear line information and preset ear line information matches, it to be to trust user to determine the user, is The user plays privacy voice.
7. device according to claim 6, it is characterised in that the processing module is additionally operable to:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
8. device according to claim 7, it is characterised in that the processing module is additionally operable to:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is the user Play the privacy voice.
9. device according to claim 6, it is characterised in that the processing module is additionally operable to:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;According to pre- If handle privacy voice described in rule process.
10. device according to claim 9, it is characterised in that the processing module is specifically used for:
Default prompting message is played to incoming call user;Or play and forge voice.
CN201610751856.1A 2016-08-29 2016-08-29 Privacy recognition methods and device based on ear line Pending CN107784234A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610751856.1A CN107784234A (en) 2016-08-29 2016-08-29 Privacy recognition methods and device based on ear line

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610751856.1A CN107784234A (en) 2016-08-29 2016-08-29 Privacy recognition methods and device based on ear line

Publications (1)

Publication Number Publication Date
CN107784234A true CN107784234A (en) 2018-03-09

Family

ID=61441380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610751856.1A Pending CN107784234A (en) 2016-08-29 2016-08-29 Privacy recognition methods and device based on ear line

Country Status (1)

Country Link
CN (1) CN107784234A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391205A (en) * 2018-03-30 2018-08-10 广东欧珀移动通信有限公司 Left and right acoustic channels switching method and apparatus, readable storage medium storing program for executing, terminal
CN108537148A (en) * 2018-03-26 2018-09-14 广东欧珀移动通信有限公司 The acquisition of electronic equipment use information, analysis method and device, storage medium, electronic equipment
CN109753777A (en) * 2018-12-29 2019-05-14 上海瑾盛通信科技有限公司 A kind of personal identification method, device, storage medium and mobile terminal
WO2020063771A1 (en) * 2018-09-30 2020-04-02 奇酷互联网络科技(深圳)有限公司 Incoming call processing method, mobile terminal and computer-readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882999A (en) * 2003-11-18 2006-12-20 皇家飞利浦电子股份有限公司 User aware audio playing apparatus and method
CN101369805A (en) * 2008-09-28 2009-02-18 西北工业大学 Method for self-adjusting sound volume of sound source equipment in pervasive computation surroundings
CN105791548A (en) * 2016-02-25 2016-07-20 努比亚技术有限公司 Voice information broadcast device and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882999A (en) * 2003-11-18 2006-12-20 皇家飞利浦电子股份有限公司 User aware audio playing apparatus and method
CN101369805A (en) * 2008-09-28 2009-02-18 西北工业大学 Method for self-adjusting sound volume of sound source equipment in pervasive computation surroundings
CN105791548A (en) * 2016-02-25 2016-07-20 努比亚技术有限公司 Voice information broadcast device and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537148A (en) * 2018-03-26 2018-09-14 广东欧珀移动通信有限公司 The acquisition of electronic equipment use information, analysis method and device, storage medium, electronic equipment
CN108391205A (en) * 2018-03-30 2018-08-10 广东欧珀移动通信有限公司 Left and right acoustic channels switching method and apparatus, readable storage medium storing program for executing, terminal
WO2020063771A1 (en) * 2018-09-30 2020-04-02 奇酷互联网络科技(深圳)有限公司 Incoming call processing method, mobile terminal and computer-readable storage medium
CN109753777A (en) * 2018-12-29 2019-05-14 上海瑾盛通信科技有限公司 A kind of personal identification method, device, storage medium and mobile terminal

Similar Documents

Publication Publication Date Title
JP6649411B2 (en) Method and apparatus for enabling a touch screen display of a mobile device
CN103401987B (en) A kind of mobile terminal incoming call sound method for secret protection and system
CN104850827B (en) Fingerprint identification method and device
WO2020037795A1 (en) Voice recognition method, wearable device and electronic device
TWI706270B (en) Identity recognition method, device and computer readable storage medium
CN109167894A (en) Camera control method, device, mobile terminal and storage medium
CN107784234A (en) Privacy recognition methods and device based on ear line
CN104899490A (en) Terminal positioning method and user terminal
EP3951628A1 (en) User identity recognition-based display method and electronic device
CN110069229B (en) Screen sharing method, mobile terminal and computer readable storage medium
CN108206892B (en) Method and device for protecting privacy of contact person, mobile terminal and storage medium
CN105187667A (en) Incoming call processing method and device
CN104933419A (en) Method and device for obtaining iris images and iris identification equipment
CN105827793B (en) A kind of speech-oriented output method and mobile terminal
CN107197098A (en) A kind of call control method and electronic equipment
CN105933512B (en) A kind of safety call method, device and mobile terminal
CN105100368B (en) Information processing method and device
CN106572235A (en) Method and apparatus unlocking mobile phone, and terminal
CN109451143B (en) Call method and mobile terminal
CN107203964A (en) Image processing method and device
CN108446665B (en) Face recognition method and mobile terminal
CN112367432B (en) Data viewing method based on double verification
CN113709024B (en) Data transmission method, medium and electronic device thereof
US20220350928A1 (en) Information processing system, information processing method, program, and user interface
CN113676440B (en) Authority negotiation method and device in communication process and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180309

WD01 Invention patent application deemed withdrawn after publication