CN107784234A - Privacy recognition methods and device based on ear line - Google Patents
Privacy recognition methods and device based on ear line Download PDFInfo
- Publication number
- CN107784234A CN107784234A CN201610751856.1A CN201610751856A CN107784234A CN 107784234 A CN107784234 A CN 107784234A CN 201610751856 A CN201610751856 A CN 201610751856A CN 107784234 A CN107784234 A CN 107784234A
- Authority
- CN
- China
- Prior art keywords
- user
- ear line
- privacy
- line information
- voice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Social Psychology (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present invention provides a kind of privacy recognition methods based on ear line, and this method includes:When answering action of user is detected, gathers the ear line information of the user;In the ear line information and preset ear line information matches, the user is determined to trust user, and privacy voice is played for the user.The embodiment of the present invention also provides a kind of privacy identification device based on ear line simultaneously.
Description
Technical field
The present embodiments relate to a kind of privacy identification technology, more particularly to a kind of privacy recognition methods based on ear line and
Device.
Background technology
With the development of the society, intelligent terminal is increasingly received by people, while people also increasingly tend to
The simplification of operation.Mobile phone is widely used by people already as a kind of intelligent terminal.
Ear recognition received state as a kind of new biometrics identification technology, its theory and application research at nearly 2 years
Inside and outside scholar more pays close attention to.Ear recognition problem based on still image can be divided into three classes according to the difference of input picture:Base
Ear recognition in two dimensional image, the ear recognition based on 3D and the identification of ear line.When human ear is squeezed in certain material (such as glass)
Ear line can be left when upper.Equally, ear line can also be used as a kind of biological characteristic.Its application is concentrated mainly in crime survey.Ear
Line feature generally is extracted to obtain at helix, anthelix, tragus, antitragus.Ear line recognition principle and fingerprint recognition are similar,
All it is to form biometrics password by recording a series of geometric properties.Mobile phone using front camera or is then thermal imaging accessory
To catch ear line from two angles, so as to realize identification.
With the continuous development of communication apparatus, communication security problem is increasingly valued by the people.Ear line and DNA, fingerprint
Equally, it is a kind of identification code of human identity, specific monomer uniqueness.Using ear line recognition and encryption technology, carried out in user
During communication, sensitive information is protected, relieves worry of the user to information security.Therefore, it is a kind of by ear line to need offer badly
Method applied to privacy identification protecting.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provide a kind of privacy recognition methods based on ear line and
Device, ear line is combined with the privacy identification of terminal device, there is provided safer privacy information protection, lift user's body
Test.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
A kind of privacy recognition methods based on ear line, methods described include:
When answering action of user is detected, gathers the ear line information of the user;
In the ear line information and preset ear line information matches, determine that the user is the user to trust user
Play privacy voice.
Method as described above, wherein, it is described to determine that the user is that methods described also includes after trusting user:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
Method as described above, wherein, methods described also includes:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is described
User plays the privacy voice.
Method as described above, wherein, after the ear line information of the collection user, methods described also includes:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;Press
According to privacy voice described in default processing rule process.
Method as described above, wherein, it is described according to default processing rule process incoming call or voice, including:
Default prompting message is played to incoming call user;Or play and forge voice.
A kind of privacy identification device based on ear line, described device include:
Acquisition module, for detecting when answering action of user, gather the ear line information of the user;
Processing module, in the ear line information and preset ear line information matches, determining that the user uses to trust
Family, privacy voice is played for the user.
Device as described above, wherein, the processing module is additionally operable to:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
Device as described above, wherein, the processing module is additionally operable to:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is described
User plays the privacy voice.
Device as described above, wherein, the processing module is additionally operable to:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;Press
According to privacy voice described in default processing rule process.
Device as described above, wherein, the processing module is specifically used for:
Default prompting message is played to incoming call user;Or play and forge voice.
Privacy recognition methods and device provided in an embodiment of the present invention based on ear line, by detecting that answering for user is dynamic
When making, the ear line information of the user is gathered;In the ear line information and preset ear line information matches, determine that the user is
Trust user, privacy voice is played for the user, wherein, privacy voice includes privacy phone and privacy audio.It so, it is possible
Privacy phone and privacy audio are judged in action is answered, if detecting it is private data, Temporarily Closed receiver
It is outer to put and earphone interface, after passing through by the detection of ear line, then for user broadcasting private data is connect, it is both user-friendly, and not
Reveal vestige, serve good camouflage effectiveness.Greatly improve Consumer's Experience.
Brief description of the drawings
In accompanying drawing (it is not necessarily drawn to scale), similar reference phase described in different views
As part.Similar reference numerals with different letter suffix can represent the different examples of similar component.Accompanying drawing with example and
Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention one provides;
Fig. 2 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention two provides;
Fig. 3 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention three provides;
Fig. 4 is the structural representation for the privacy identification device based on ear line that the embodiment of the present invention one provides;
Fig. 5 is the structural representation for the privacy identification device based on ear line that the embodiment of the present invention two provides.
Embodiment
In various embodiments of the present invention, the operation that receives calls of user is simplified by ear line identification technology:Gyroscope and plus
Speed meter monitors that " answering " acts, and ear line recognition and verification identity simultaneously unlocks, mobile phone automatic connection.Further, because ear line is known
Other technology can also distinguish the left and right ear of same person, also can be by identifying that left and right ear is adapted to different volumes.Further, if
It was found that ear line and preset ear line data are inconsistent, mobile phone can be locked, carries out antitheft processing.With preferable operational consistency
And security, there is the unexistent advantage of other biological characteristics.
Fig. 1 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention one provides.As shown in figure 1, this
The privacy recognition methods based on ear line that embodiment provides can specifically be performed by intelligent terminal, specifically, the present embodiment
The method of offer can include:
Step 101, when answering action of user is detected, gather the ear line information of the user.
In the present embodiment, the operation that user receives calls can be simplified by ear line identification technology:Detecting incoming call
When, the action of user's " answering " is monitored by gyroscope and accelerometer, ear line recognition and verification identity simultaneously unlocks, mobile phone automatic connection.
, it is necessary to first preset trust user's ear line on intelligent terminal, and can be further preset in practical application
Privacy contact data and privacy audio, only when privacy contact is sent a telegram here or plays the speech audio of privacy, just use this
The privacy recognition methods based on ear line that embodiment provides is authenticated to the identity of user.
, can be with temporal limitation loudspeaker and ear in the privacy speech audio for detecting privacy contact incoming call or sending
Machine audio output.
Step 102, in the ear line information and during preset ear line information matches, determine that the user to trust user, is
The user plays privacy voice.
It should be noted that the privacy voice includes privacy incoming call and privacy speech audio.
It should be noted that when the ear line information mismatches with the preset ear line information, determine that the user is
Non-trusted user;According to default processing rule process privacy incoming call or privacy speech audio;It is specifically, described according to default processing
Rule process privacy is sent a telegram here or privacy speech audio is:Default prompting message is played to incoming call user;Or play and forge language
Sound.Further, if it is necessary, antitheft processing can also be carried out to intelligent terminal, such as lock machine, clear data.
The present embodiment is not specifically limited to this.
Specifically, in actual applications, the difference of the left and right Er Er lines of user can also be directed to, sets different broadcasting sounds
Amount, i.e. it is determined that the user for trust user after, the volume value that prestores corresponding with the ear line information can also be obtained;
Privacy phone is connected for the user or play privacy speech audio according to the volume value that prestores.
After acceleration sensor detects and answers action, gather the ear line information of current listening user, and with preset ear line
Information is matched, if matching, obtains the volume value that prestores corresponding with the ear line information, the interim volume that adjusts is described pre-
Volume value is deposited, it is necessary to which explanation, the volume value that prestores are served only for this call or the broadcasting of this privacy voice;If do not obtain
The volume value that prestores corresponding with the ear line information is got, then connects privacy electricity according to the volume value of system default for the user
Words play privacy speech audio.In actual applications, after this privacy end of conversation or this privacy speech play terminate,
Volume value is reduced to the volume value of system default.
It is understood that if the ear line information of current listening user mismatches with preset ear line information, institute is equally determined
It is non-trusted user to state user;According to default processing rule process privacy incoming call or privacy speech audio, i.e. play default remind
Information is to incoming call user;Or play and forge voice, if it is necessary, antitheft processing can also be carried out to intelligent terminal,
Such as lock machine, clear data.
Illustrate the privacy recognition methods based on ear line that the present embodiment provides below in conjunction with the accompanying drawings.
Fig. 2 is the flow chart for the privacy recognition methods based on ear line that the embodiment of the present invention two provides, as shown in Fig. 2 this
The method that embodiment provides specifically includes:
Step 1:Preset trust user's ear line, and the machine has preset privacy contact data and privacy audio.
Step 2:If detect the incoming call of the privacy contact described in step 1 or have the broadcasting of privacy audio.Normal talking
With non-privacy audio not by this Row control.
If detecting in this step is the privacy contact incoming call of step 1 or has the broadcasting of privacy audio, interim to limit
Loudspeaker processed and earpiece audio output.
Step 3:Acceleration sensor, which has detected, answers/listens to action, is transferred to step 4.
Step 4:The ear line data of listening user are gathered, and are matched with the preset ear line data of step 1, if mirror
Fixed non-trusted user, then go to step 6, otherwise go to step 7.
Step 5:Non-trusted user is accredited as by ear line, if privacy is conversed, then plays specific remind to logical automatically
Talk about other side;If privacy audio, then play and forge audio concealment realAudio information;If it is necessary, antitheft processing is carried out,
Such as lock machine, clear data.
Step 6:Auto-pickup privacy phone plays privacy audio.
In addition, in the present embodiment, it can also further be directed to left and right ear and set different volumes, as shown in figure 3, the party
Method specifically includes:
Step 1:Preset trust user's ear line;
Step 2:Different volume values is set for different ear lines;
Step 3:Acceleration sensor, which has detected, answers action;
Step 4:The ear line data of current listening user are collected, and are matched with the data of step 2;If it have found
Step 5 is then gone to, otherwise goes to step 6;
Step 5:If step 4 finds the ear line data of correlation and corresponding volume value, interim to adjust volume;This sound
Amount is served only for this call and this secondary audio program plays;
Step 6:If step 4 does not find related ear line data and corresponding volume is set, system default is taken
Volume value;
Step 7:Terminate if this end of conversation and this secondary audio program play;
Step 8:Reduce volume system default volume value for before.
The privacy recognition methods based on ear line that the present embodiment provides, can to privacy phone and privacy audio answer it is dynamic
In work, if it is private data to detect, Temporarily Closed receiver is put outside and earphone interface, after being passed through by the detection of ear line, then
Private data is played, it is so, both user-friendly, make no sign again, serve good camouflage effectiveness.Greatly improve use
Experience at family.
Fig. 4 is the privacy identification device based on ear line that the embodiment of the present invention one provides.As shown in figure 4, the present embodiment carries
The device of confession can be arranged in intelligent terminal, such as smart mobile phone, tablet personal computer, specifically, what the present embodiment provided
Device includes:Acquisition module 11 and processing module 12.
Wherein, acquisition module 11, for detecting when answering action of user, the ear line information of the user is gathered;
Processing module 12, in the ear line information and preset ear line information matches, determining the user to trust
User, privacy voice is played for the user.
Further, the processing module 12 is additionally operable to:Obtain the volume value that prestores corresponding with the ear line information;According to
The volume value that prestores plays privacy voice for the user.
Further, handled module 12 is additionally operable to:After this end of conversation or this speech play terminate, by volume
Value is reduced to the volume value of system default.
Further, the processing module 12 is additionally operable to:If the volume that prestores corresponding with the ear line information is not got
Value, then play privacy voice according to the volume value of system default for the user.
Further, the processing module 12 is additionally operable to:Mismatched in the ear line information and the preset ear line information
When, it is non-trusted user to determine the user;Privacy voice is played according to default processing rule process.
Specifically, the processing module 12 is specifically used for:Default prompting message is played to incoming call user;Or play pseudo-
Make voice.
In another feasible embodiment, as shown in figure 5, the identification dress of the privacy based on ear line that the present embodiment provides
Acceleration sensor, ear line scanning extraction module, ear line identification module and ear line local data module can also be included by putting.
Wherein, acceleration sensor module is used for the action that receives calls for identifying user, with reference to ear line identification module identification mirror
After determining user identity, make being handled differently for a step;Ear line scans extraction module and ear line identification module, is swept to complete ear line
Retouch, and ear line information transmission is identified into module to ear line, for verifying user identity or identification left and right ear;Ear line local data mould
Block is used for the ear line data for gathering owner or associated user in advance, is owner or trust user for identifying.
The privacy identification device based on ear line that the present embodiment provides, available for the technical side for performing above method embodiment
Case, its implementing principle and technical effect is similar, and here is omitted.
In actual applications, the acquisition module 11 and processing module 12 can identify dress by the privacy for being based on ear line
In putting central processing unit (Central Processing Unit, CPU), microprocessor (Micro Processor Unit,
MPU), digital signal processor (Digital Signal Processor, DSP) or field programmable gate array (Field
Programmable Gate Array, FPGA) etc. realize.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware
Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage
The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (10)
1. a kind of privacy recognition methods based on ear line, it is characterised in that methods described includes:
When answering action of user is detected, gathers the ear line information of the user;
In the ear line information and preset ear line information matches, determine that the user to trust user, plays for the user
Privacy voice.
2. according to the method for claim 1, it is characterised in that described after the determination user is trusts user
Method also includes:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
3. according to the method for claim 2, it is characterised in that methods described also includes:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is the user
Play the privacy voice.
4. according to the method for claim 1, it is characterised in that described after the ear line information of the collection user
Method also includes:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;According to pre-
If handle privacy voice described in rule process.
5. according to the method for claim 4, it is characterised in that it is described to handle rule process incoming call or voice according to default,
Including:
Default prompting message is played to incoming call user;Or play and forge voice.
6. a kind of privacy identification device based on ear line, it is characterised in that described device includes:
Acquisition module, for detecting when answering action of user, gather the ear line information of the user;
Processing module, in the ear line information and preset ear line information matches, it to be to trust user to determine the user, is
The user plays privacy voice.
7. device according to claim 6, it is characterised in that the processing module is additionally operable to:
Obtain the volume value that prestores corresponding with the ear line information;
According to the volume value that prestores the privacy voice is played for the user.
8. device according to claim 7, it is characterised in that the processing module is additionally operable to:
If not getting the volume value that prestores corresponding with the ear line information, the volume value according to system default is the user
Play the privacy voice.
9. device according to claim 6, it is characterised in that the processing module is additionally operable to:
When the ear line information mismatches with the preset ear line information, it is non-trusted user to determine the user;According to pre-
If handle privacy voice described in rule process.
10. device according to claim 9, it is characterised in that the processing module is specifically used for:
Default prompting message is played to incoming call user;Or play and forge voice.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610751856.1A CN107784234A (en) | 2016-08-29 | 2016-08-29 | Privacy recognition methods and device based on ear line |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610751856.1A CN107784234A (en) | 2016-08-29 | 2016-08-29 | Privacy recognition methods and device based on ear line |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107784234A true CN107784234A (en) | 2018-03-09 |
Family
ID=61441380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610751856.1A Pending CN107784234A (en) | 2016-08-29 | 2016-08-29 | Privacy recognition methods and device based on ear line |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107784234A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108391205A (en) * | 2018-03-30 | 2018-08-10 | 广东欧珀移动通信有限公司 | Left and right acoustic channels switching method and apparatus, readable storage medium storing program for executing, terminal |
CN108537148A (en) * | 2018-03-26 | 2018-09-14 | 广东欧珀移动通信有限公司 | The acquisition of electronic equipment use information, analysis method and device, storage medium, electronic equipment |
CN109753777A (en) * | 2018-12-29 | 2019-05-14 | 上海瑾盛通信科技有限公司 | A kind of personal identification method, device, storage medium and mobile terminal |
WO2020063771A1 (en) * | 2018-09-30 | 2020-04-02 | 奇酷互联网络科技(深圳)有限公司 | Incoming call processing method, mobile terminal and computer-readable storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1882999A (en) * | 2003-11-18 | 2006-12-20 | 皇家飞利浦电子股份有限公司 | User aware audio playing apparatus and method |
CN101369805A (en) * | 2008-09-28 | 2009-02-18 | 西北工业大学 | Method for self-adjusting sound volume of sound source equipment in pervasive computation surroundings |
CN105791548A (en) * | 2016-02-25 | 2016-07-20 | 努比亚技术有限公司 | Voice information broadcast device and method |
-
2016
- 2016-08-29 CN CN201610751856.1A patent/CN107784234A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1882999A (en) * | 2003-11-18 | 2006-12-20 | 皇家飞利浦电子股份有限公司 | User aware audio playing apparatus and method |
CN101369805A (en) * | 2008-09-28 | 2009-02-18 | 西北工业大学 | Method for self-adjusting sound volume of sound source equipment in pervasive computation surroundings |
CN105791548A (en) * | 2016-02-25 | 2016-07-20 | 努比亚技术有限公司 | Voice information broadcast device and method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537148A (en) * | 2018-03-26 | 2018-09-14 | 广东欧珀移动通信有限公司 | The acquisition of electronic equipment use information, analysis method and device, storage medium, electronic equipment |
CN108391205A (en) * | 2018-03-30 | 2018-08-10 | 广东欧珀移动通信有限公司 | Left and right acoustic channels switching method and apparatus, readable storage medium storing program for executing, terminal |
WO2020063771A1 (en) * | 2018-09-30 | 2020-04-02 | 奇酷互联网络科技(深圳)有限公司 | Incoming call processing method, mobile terminal and computer-readable storage medium |
CN109753777A (en) * | 2018-12-29 | 2019-05-14 | 上海瑾盛通信科技有限公司 | A kind of personal identification method, device, storage medium and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6649411B2 (en) | Method and apparatus for enabling a touch screen display of a mobile device | |
CN103401987B (en) | A kind of mobile terminal incoming call sound method for secret protection and system | |
CN104850827B (en) | Fingerprint identification method and device | |
WO2020037795A1 (en) | Voice recognition method, wearable device and electronic device | |
TWI706270B (en) | Identity recognition method, device and computer readable storage medium | |
CN109167894A (en) | Camera control method, device, mobile terminal and storage medium | |
CN107784234A (en) | Privacy recognition methods and device based on ear line | |
CN104899490A (en) | Terminal positioning method and user terminal | |
EP3951628A1 (en) | User identity recognition-based display method and electronic device | |
CN110069229B (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN108206892B (en) | Method and device for protecting privacy of contact person, mobile terminal and storage medium | |
CN105187667A (en) | Incoming call processing method and device | |
CN104933419A (en) | Method and device for obtaining iris images and iris identification equipment | |
CN105827793B (en) | A kind of speech-oriented output method and mobile terminal | |
CN107197098A (en) | A kind of call control method and electronic equipment | |
CN105933512B (en) | A kind of safety call method, device and mobile terminal | |
CN105100368B (en) | Information processing method and device | |
CN106572235A (en) | Method and apparatus unlocking mobile phone, and terminal | |
CN109451143B (en) | Call method and mobile terminal | |
CN107203964A (en) | Image processing method and device | |
CN108446665B (en) | Face recognition method and mobile terminal | |
CN112367432B (en) | Data viewing method based on double verification | |
CN113709024B (en) | Data transmission method, medium and electronic device thereof | |
US20220350928A1 (en) | Information processing system, information processing method, program, and user interface | |
CN113676440B (en) | Authority negotiation method and device in communication process and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180309 |
|
WD01 | Invention patent application deemed withdrawn after publication |