CN108733690A - Image data recording method, device and electronic equipment - Google Patents
Image data recording method, device and electronic equipment Download PDFInfo
- Publication number
- CN108733690A CN108733690A CN201710252448.6A CN201710252448A CN108733690A CN 108733690 A CN108733690 A CN 108733690A CN 201710252448 A CN201710252448 A CN 201710252448A CN 108733690 A CN108733690 A CN 108733690A
- Authority
- CN
- China
- Prior art keywords
- image data
- storage
- content characteristic
- memory locations
- storage mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Library & Information Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
A kind of image data recording method of the application offer, device and electronic equipment, this method include:Identify the content characteristic in image data;The corresponding storage mode of described image data is determined based on the content characteristic;It is stored up according to the storage mode, stores described image data.The technical solution of the application can determine the storage mode of image data with content characteristic based on view data, so as to improve the storage efficiency of image data.
Description
Technical field
This application involves a kind of technical field of image processing more particularly to image data recording method, device and electronics to set
It is standby.
Background technology
By configuring camera on intelligent terminal, such as mobile phone, user can be made to pass through camera application program whenever and wherever possible
Photo is shot, captured photo would generally be automatically stored in photograph album application program.In mobile phone by other users in use,
Any photo in camera application program can all be viewed by other users.For a user, some photos may be not want to allow
What other people saw, therefore, the photo of need for confidentiality how is identified and stored, is the prior art technical issues that need to address.
Invention content
In view of this, the application provides a kind of new technical solution, it can be ensured that be related to the image data of individual privacy
The user with specified permission is allowed to access.
To achieve the above object, it is as follows to provide technical solution by the application:
According to the first aspect of the application, it is proposed that a kind of image data recording method, including:
Identify the content characteristic in image data;
The corresponding storage mode of described image data is determined based on the content characteristic;
Based on the storage mode, described image data are stored.
According to the second aspect of the application, it is proposed that a kind of image data read method, method include:
Detect need authentication with preset memory locations corresponding data access request;
Obtain verification mode corresponding with the preset memory locations;
With the verification mode, verification information input by user is detected;
Based on verification result, judge whether user has permission carry out data access.
According to the third aspect of the application, it is proposed that a kind of image data storage apparatus, including:
Feature identification unit, for identification content characteristic in image data;
Storage mode determination unit, described in the content characteristic for being recognized based on the feature identification unit is determined
The corresponding storage mode of image data, wherein the storage mode includes kept secure;
Storage unit, if being the kept secure for the storage mode that the storage mode determination unit determines,
By described image data storage to the preset memory locations for needing authentication.
According to the fourth aspect of the application, it is proposed that a kind of image data reading device, including:
First detection unit, for detecting that the data access corresponding with preset memory locations for needing authentication is asked
It asks;
Acquiring unit, the data access request for being detected in response to the first detection unit, acquisition and institute
State the corresponding verification mode of preset memory locations;
Second detection unit, the verification mode for being got with the acquiring unit, detection is input by user to test
Demonstrate,prove information;
Judging unit judges whether user has permission if the verification result for being obtained based on the second detection unit
Carry out data access.
According to the 5th of the application the aspect, it is proposed that a kind of computer readable storage medium, the storage medium are stored with
Computer program, the computer program are used to execute the image data recording method that above-mentioned first aspect proposes or above-mentioned the
The image data read method that two aspects propose.
According to the 6th of the application the aspect, it is proposed that a kind of electronic equipment, the electronic equipment include:
Processor;Memory for storing the processor-executable instruction;
Wherein, the processor, for identification content characteristic in image data;Described in content characteristic determination
The corresponding storage mode of image data, wherein the storage mode includes kept secure;If the storage mode is the secrecy
Storage, by described image data storage to the preset memory locations for needing authentication;Alternatively,
The processor, for detect need authentication with preset memory locations corresponding data access request;It obtains
Take verification mode corresponding with the preset memory locations;With the verification mode, verification information input by user is detected;It is based on
Verification result, judges whether user has permission carry out data access.
By above technical scheme as it can be seen that having increased a large amount of needs newly by network or the camera modes such as take pictures within the short time
When the image data of storage, the application can determine the storage mode of image data with content characteristic based on view data, when depositing
When storage mode is kept secure, image data can be stored to the preset memory locations for needing authentication, so as to carry
The storage efficiency of the image data of high need for confidentiality;The default storage position of authentication is needed since image data is stored in
It sets, it is thus ensured that the image data of need for confidentiality is not seen by other people.
Description of the drawings
Figure 1A shows the signal of the picture used in the image data recording method of one exemplary embodiment of the application
Figure;
Figure 1B shows the flow diagram of the image data recording method of one exemplary embodiment of the application;
Fig. 2A shows the scene of the flow diagram of the image data recording method of the application another exemplary embodiment
Figure;
Fig. 2 B show the flow diagram of the image data recording method of the application another exemplary embodiment;
Fig. 3 shows the flow diagram of the image data recording method of the another exemplary embodiment of the application;
Fig. 4 shows the flow diagram of the image data recording method of the application another exemplary embodiment;
Fig. 5 shows the structural schematic diagram of the image data storage apparatus of one exemplary embodiment of the application;
Fig. 6 shows the structural schematic diagram of the image data reading device of one exemplary embodiment of the application;
Fig. 7 shows the structural schematic diagram of the electronic equipment of one exemplary embodiment of the application.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of consistent device and method of some aspects be described in detail in claims, the application.
It is the purpose only merely for description specific embodiment in term used in this application, is not intended to be limiting the application.
It is also intended to including majority in the application and "an" of singulative used in the attached claims, " described " and "the"
Form, unless context clearly shows that other meanings.It is also understood that term "and/or" used herein refers to and wraps
Containing one or more associated list items purposes, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from
In the case of the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determination ".
The application provides a kind of image data recording method, including:
Identify the content characteristic in image data;
The corresponding storage mode of image data is determined based on content characteristic;
According to storage mode, image data is stored.
The embodiment of the present application can determine the storage mode of image data with content characteristic based on view data, so as to
Improve the storage efficiency of image data.
For the application is further described, the following example is provided:
Figure 1A shows the signal of the picture used in the image data recording method of one exemplary embodiment of the application
Figure.Object described herein for example can be dress ornament, the including but not limited to gauze kerchief worn on a woman's head of user's head wearing, user's face
The bikini etc. that the sunglasses of wearing, user wear, the privileged site of human body can be covered by above-mentioned object.In another implementation
In example, content characteristic may be the gesture of user preset, the content characteristic of picture be determined by the identification of gesture, for example, such as
Shown in Figure 1A, when stretching out the picture of the gesture of " V " font expression triumph in user, if detecting " V " font, being somebody's turn to do " V " font can
It is considered as the content characteristic of picture.It in one embodiment, can be based in the prior art about the method for image recognition identification picture
In content characteristic.
Figure 1B shows the flow diagram of the image data recording method of one exemplary embodiment of the application;The present embodiment
It can apply on an electronic device, be realized in such a way that application program or software are installed on an electronic device, such as Figure 1B institutes
Show, includes the following steps:
Step 101, the content characteristic in image data is identified.
In one embodiment, image data (Image Data) is the gray value of each pixel (pixel) indicated with numerical value
Set, the figure on photographic device (for example, video camera, the portable devices such as smart mobile phone for being equipped with camera) can be passed through
As sensor collects static picture, or the picture of each frame in video file, the exhibition by way of picture
Show and is checked to user.
In one embodiment, content characteristic can be the mesh with specific shape or specific distribution rule for needing to identify
Mark the characteristics of image of object.
Step 102, the corresponding storage mode of image data is determined based on content characteristic, wherein the storage mode includes
Kept secure.
In one embodiment, storage mode may include kept secure and normal storage.For the picture number of kept secure
According to needing just check by authentication;It is any to start application program or soft for the image data of normal storage
The use of part can check per family.
It in one embodiment, can be taking human as setting correspondence, such as to a variety of corresponding mesh of different content feature
Different storage modes is arranged in mark object, for example, the corresponding object of content characteristic is gauze kerchief worn on a woman's head, if determining gauze kerchief worn on a woman's head by image recognition
Face is covered, then picture can be with normal storage, if determining that gauze kerchief worn on a woman's head does not cover in face by image recognition, picture needs to protect
Close storage, if the corresponding object of content characteristic is the glasses of face position, picture need for confidentiality storage.It needs to illustrate
It is that corresponding storage mode, the application couple can be arranged to the picture with different content feature according to its specific requirements in user
This is not limited.
According to another embodiment of the application, in this step, the corresponding secrecy of image data is first determined based on content characteristic
Grade (that is, first security classification), then storage mode is determined based on security classification.Content characteristic and the corresponding of security classification are closed
System, can preset.
Step 103, if storage mode is kept secure, by image data storage to the default storage for needing authentication
Position;For example, if storage mode is kept secure, image data is stored into the default file folder for needing authentication.
In one embodiment, default file folder can be one in memory space associated with application program or software
A file.In one embodiment, default file folder can be associated with coded lock or fingerprint authentication module, passes through unlock
Coded lock or fingerprint authentication module are to needing the user for accessing default file folder to carry out authentication.
In the present embodiment, when having increased the figures of a large amount of needs storages newly by network or the camera modes such as take pictures in the short time
When as data, the application can determine the storage mode of image data with content characteristic based on view data, when storage mode is
When kept secure, image data can be stored to the preset memory locations for needing authentication, need to protect so as to improve
The storage efficiency of close image data, it is ensured that the image data of need for confidentiality is not seen by other people.
In above-mentioned Figure 1B illustrated embodiments, default store path can be the secure storage section of hard disk, store path
For the store path of secure storage section, with reference to Fig. 2A and Fig. 2 B by taking default store path corresponds to default file folder as an example
It illustrates.
Fig. 2A shows the scene of the flow diagram of the image data recording method of the application another exemplary embodiment
Figure, as shown in Figure 2 A, default file folder includes " gauze kerchief worn on a woman's head ", " sunglasses ", " bikini " three sub-folders, that is, sub-folder
21, sub-folder 22, sub-folder 23, storage need for confidentiality includes " sunglasses " content characteristic in " sunglasses " 21 sub-folder
Picture, in " gauze kerchief worn on a woman's head " sub-folder 22 storage need for confidentiality include " gauze kerchief worn on a woman's head " content characteristic picture, " bikini " son
Store need for confidentiality in file 23 includes the picture of " bikini " content characteristic.In addition, in default file folder, may be used also
Be stored with it is unfiled in above-mentioned sub-folder but the picture of need for confidentiality storage, for example, picture 24 and picture 25.It needs
Illustrate, picture described herein is to describe image data, image data and picture from the visual angle of user
It can be considered equivalent concept in this application.
Fig. 2 B show the flow diagram of the image data recording method of the application another exemplary embodiment;This implementation
Example on the basis of above-mentioned Figure 1B illustrated embodiments, with how by image data storage to needing the default file of authentication to press from both sides
In for illustrate, as shown in Figure 2 B, image data recording method includes the following steps:
Step 201, the content characteristic in image data is identified.
Step 202, the corresponding storage mode of image data is determined based on content characteristic.
The associated description of step 201 and step 202 may refer to the description of above-mentioned Figure 1B illustrated embodiments, herein no longer in detail
It states.
Step 203, if storage mode is kept secure, it is based on content characteristic, determines that image data is needing authentication
Default file folder in whether there is corresponding sub-folder, and if it exists, execute step 204, if being not present, execute step 208.
In one embodiment, a default store path corresponding with default file folder is similar, and sub-folder also corresponds to one
Store path.
In one embodiment, default file folder in can include at least one sub-folder, each sub-folder with it is interior
It is corresponding to hold feature
Step 204, image data is stored into sub-folder.
It is corresponding to above-mentioned steps 203, if the content characteristic in picture is " gauze kerchief worn on a woman's head ", which can be stored and arrive " head
In yarn " sub-folder, if the content characteristic in picture is " sunglasses ", which can be stored and arrive " sunglasses " sub-folder
In, if the content characteristic in picture is " bikini ", which can be stored into " bikini " sub-folder.
Step 205, whether include goal-selling object in detection image data, if it includes goal-selling to detect in picture
Object executes step 206, if not including goal-selling object in picture, flow terminates.
In one embodiment, image recognition algorithm identification goal-selling object corresponding with goal-selling object, example can be used
Such as, when object is face, it can identify in picture whether include face by face recognition algorithms in the prior art, this
Application is no longer described in detail.
Step 206, from first the presets list, determine the corresponding security classification of goal-selling object (that is, second secrecy etc.
Grade), first the presets list is for recording the corresponding security classification of different goal-selling objects.
In one embodiment, security classification can be default file folder in hide image data, default file folder in
Not hide image data.Different goal-selling objects can correspond to different security classifications, for example, using goal-selling object as face
For human eye, the corresponding security classification of face of Zhang San needs to hide picture in default file folder, and the human eye of Li Si corresponds to
Security classification need not hide picture, etc. in default file folder.First the presets list is as shown in table 1.
Table 1
Face | Security classification |
Zhang San | It hides |
Li Si | It does not hide |
… | … |
In one embodiment, first the presets list can record the feature of the goal-selling object of multiple and different users and every
The corresponding security classification of feature of one goal-selling object.It should be noted that user can self-defined setting this is first default
The corresponding security classification of goal-selling object included in list.
Step 207, if security classification indicates to need hide image data, the hide image data in sub-folder, flow
Terminate.
In one embodiment, image data can be hidden based on the method in the prior art about hide image data,
So as to ensure that image data is not visible in sub-folder.
Step 208, if not finding corresponding sub-folder in default file folder based on content characteristic, image data is stored
In being pressed from both sides to default file, flow terminates.
If for example, the sub-folder about " sunglasses " is not arranged for default file in pressing from both sides, and the content characteristic in picture is " ink
Mirror " is determining that then there is still a need for deposit for the picture when needing include the picture progress kept secure of " sunglasses " based on content characteristic
It stores up in default file folder.In the application other embodiment, content characteristic can also be voluntarily selected according to user configuration, user
Mapping relations between file, such as be configured to sunglasses product and be placed in clothing file.
In the present embodiment, image data is stored by the corresponding sub-folder into default file folder based on content characteristic, it can
To carry out fining classification to image data, user is facilitated to check picture;When security classification indicates to need hide image data,
The hide image data in sub-folder, after default file double-layered quilt disabled user opens, since image data is hidden, to
Duplicate protection can be played to the privacy of user.
Fig. 3 shows the flow diagram of the image data recording method of the another exemplary embodiment of the application;This implementation
Example is on the basis of above-mentioned Figure 1B illustrated embodiments, how will be in picture storage to the default file folder for needing authentication
Example illustrates, as shown in figure 3, including the following steps:
Step 301, from more than two fixed reference feature templates, the fixed reference feature mould to match with image data is determined
Plate, wherein fixed reference feature template is used to record the content characteristic of different goal-selling objects.
In one embodiment, image recognition can be passed through by acquiring the image with the closely related clothing of privacy of user
Technology obtains fixed reference feature template, and closely related clothing is, for example, with privacy of user:Sunglasses, gauze kerchief worn on a woman's head and bikini etc.,
Middle clothing can be considered a realization method of the goal-selling object in the application.It should be noted that fixed reference feature template can be with
It is arranged based on the actual demand of user, the application is not limited the particular content of fixed reference feature template.
Step 302, the corresponding content characteristic of the fixed reference feature template to match with image data is determined as image data
Content characteristic.
For example, if the corresponding content characteristic of fixed reference feature template " gauze kerchief worn on a woman's head " matches with picture, picture can be determined
Content characteristic is " gauze kerchief worn on a woman's head ".
Step 303, storage mode corresponding with content characteristic is searched in second the presets list, second the presets list is used for
Record the corresponding storage mode of different content feature.
Second the presets list is for example shown in table 2, it may include the content characteristic of the pre-set object of user and each
The corresponding storage mode of a content characteristic.
Table 2
Content characteristic | Storage mode |
Gauze kerchief worn on a woman's head | Kept secure |
Sunglasses | Kept secure |
Bikini | Normal storage |
… | … |
Step 304, if storage mode is kept secure, by image data storage to needing the default file of authentication to press from both sides
In.
The description of step 304 may refer to the description of above-mentioned Figure 1B illustrated embodiments, and this will not be detailed here.
In the present embodiment, since fixed reference feature template can be arranged according to demand of the user to individual privacy, no
Same user can have different fixed reference feature templates, and it is special to can be obtained different contents by different fixed reference feature templates
Sign, so as to ensure that the secret protection to different user has more specific aim.
Fig. 4 shows the flow diagram of the image data read method of one exemplary embodiment of the application;Such as Fig. 4 institutes
Show, includes the following steps:
Step 401, the data access request corresponding with preset memory locations for needing authentication is detected.
Step 402, verification mode corresponding with preset memory locations is obtained.
In one embodiment, verification mode may include:Fingerprint authentication, password authentification and pattern verification etc., specifically
Verification mode can be arranged by user.In another embodiment, verification mode can be what user's opposing electronic device was made
Default gesture is to needing the user for accessing default file folder to carry out authentication.
Step 403, with the verification mode, verification information input by user is detected.
Corresponding with above-mentioned steps 401, verification information may include the biological information of user, for example, user setting
Verification mode is fingerprint authentication, when the processor of electronic equipment detects the triggering of default file double-layered quilt, can start fingerprint and recognize
Module is demonstrate,proved, the finger print information of user is acquired by fingerprint authentication module, is the verification described in the present embodiment by finger print information
Information.User setting verification mode is iris verification, can when the processor of electronic equipment detects the triggering of default file double-layered quilt
To open iris line authentication module, the iris information of user is acquired by iris authentication module, is the present embodiment by iris information
Described in verification information.User setting verification mode is face verification, when the processor of electronic equipment detects default file
When double-layered quilt triggers, camera can be started, the face characteristic of user is acquired by camera, is the present embodiment by face characteristic
Described in verification information.For another example after application program launching, user is detected in direction initialization by acceleration transducer
(for example, vertical direction) shakes the number of mobile phone, if the number for shaking mobile phone reaches preset times, the authentication of user is logical
It crosses, default file folder can be accessed by the user.
Step 404, it is based on verification result, judges whether user has permission carry out data access.
Wherein, the image data in default file folder can both be located in the sub-folder under default file folder, also may be used
To be stored directly in default file folder.Default file folder included in sub-folder and for be stored in default file folder institute
Including sub-folder in image data can be found in Fig. 2A.
Image data read method provided in this embodiment allows user's access preset to store by way of authentication
Protect that user's is hidden so as to ensure that the image data of preset memory locations will not be viewed by other disabled users in position
It is private.
Fig. 5 shows the structural schematic diagram of the image data storage apparatus of one exemplary embodiment of the application, such as Fig. 5 institutes
Show, which may include:Feature identification unit 51, determination unit 52, storage unit 53.Wherein:
Feature identification unit 51, for identification content characteristic in image data;
Storage mode determination unit 52, the content characteristic recognized for feature based recognition unit 51 determine image data
Corresponding storage mode, wherein the storage mode includes kept secure;
Storage unit 53 stores picture if determining that storage mode is kept secure for storage mode determination unit 52
To the preset memory locations for needing authentication.
In one embodiment, storage unit 53 includes:
Determination subelement 531 determines image data in the default storage position for needing authentication for being based on content characteristic
Set corresponding store path;
Storing sub-units 532, for image data to be stored the store path determined to determination subelement 531.
In one embodiment, preset memory locations are the secure storage section of hard disk, and store path is secure storage section
Store path.
In one embodiment, device may also include:
Security classification determination unit 54, if including goal-selling object for detecting in image data, from the first default row
In table, determine that the corresponding security classification of goal-selling object, first the presets list respectively correspond to for recording different goal-selling objects
Security classification.
In one embodiment, device may also include:
Processing unit 55 is hidden, if indicating to need hidden image for the security classification that security classification determination unit 54 determines
Data, the hide image data in the sub-folder of determination subelement 531.
In one embodiment, storage unit 53 can be additionally used in:
If not finding the corresponding store path of preset memory locations based on content characteristic, image data storage is deposited to default
Storage space is set.
In one embodiment, feature identification unit 51 is particularly used in:
From more than two fixed reference feature templates, the fixed reference feature template to match with image data is determined;
The content that the corresponding content characteristic of the fixed reference feature template to match with image data is determined as to image data is special
Sign.
In one embodiment, storage mode determination unit 52 is particularly used in:
Storage mode corresponding with content characteristic is searched in second the presets list, second the presets list is for recording difference
The corresponding storage mode of content characteristic.
Fig. 6 shows the structural schematic diagram of the image data reading device of one exemplary embodiment of the application, the picture number
May include according to storage device:First detection unit 61, acquiring unit 62, second detection unit 63, judging unit 64;Wherein,
First detection unit 61, for detecting that the data access corresponding with preset memory locations for needing authentication is asked
It asks;
Acquiring unit 62, the data access request for being detected in response to first detection unit 61 are obtained and are deposited with default
Storage space sets corresponding verification mode;
Second detection unit 63, the verification mode for being got with acquiring unit 62 detect verification letter input by user
Breath;
Judging unit 64 judges whether user has permission if the verification result for being obtained based on second detection unit 63
Carry out data access.
The embodiment of the present application also provides a kind of computer readable storage medium, and the storage medium is stored with computer journey
Sequence, the method that the computer program is used to execute the storage picture that any illustrated embodiments of above-mentioned Figure 1B-Fig. 3 provide, alternatively,
The image data read method provided for executing above-mentioned embodiment illustrated in fig. 4.
Corresponding to the image data recording method that any illustrated embodiments of above-mentioned Figure 1B-Fig. 3 provide, the application also proposed
The schematic configuration diagram of the electronic equipment of an exemplary embodiment shown in Fig. 7 according to the application.Referring to FIG. 7, in hardware layer
Face, the electronic equipment may include processor, internal bus, network interface, memory and nonvolatile memory, be also possible to certainly
Including the required hardware of other business.Processor in nonvolatile memory from reading in corresponding computer program to memory
Then it runs, the image data storage apparatus of above-mentioned embodiment illustrated in fig. 5 is realized on logic level.Certainly, in addition to software reality
Except existing mode, other realization methods, such as the mode etc. of logical device or software and hardware combining is not precluded in the application,
That is the executive agent of following process flow is not limited to each logic unit, can also be hardware or logical device.
Further, the corresponding image data read method provided with above-mentioned embodiment illustrated in fig. 4, embodiment illustrated in fig. 7
Processor in the electronic equipment of offer can also realize that the image data of embodiment illustrated in fig. 6 reads dress on logic level again
It sets.
It should be noted that system, device, module or unit that above-described embodiment illustrates, it specifically can be by calculating movement
Piece or entity are realized, or are realized by the product with certain function.It is a kind of typically to realize that equipment is computer, computer
Concrete form can be that personal computer, laptop computer, cellular phone, camera phone, smart phone, individual digital help
Reason, media player, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or
The combination of arbitrary several equipment in these equipment.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the application
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or
Person's adaptive change follows the general principle of the application and includes the undocumented common knowledge in the art of the application
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following
Claim is pointed out.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
There is also other identical elements in the process of element, method, commodity or equipment.
The foregoing is merely the preferred embodiments of the application, not limiting the application, all essences in the application
With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of the application protection god.
Claims (15)
1. a kind of image data recording method, which is characterized in that the method includes:
Identify the content characteristic in image data;
The corresponding storage mode of described image data is determined based on the content characteristic;
According to the storage mode, described image data are stored.
2. according to the method described in claim 1, it is characterized in that, described according to the storage mode, storage described image number
According to, including:
If the storage mode is kept secure, by described image data storage to the preset memory locations for needing authentication.
3. according to the method described in claim 2, it is characterized in that, it is described by the storage of described image data to needing authentication
Preset memory locations, including:
Based on the content characteristic, determine described image data on the corresponding storage road of preset memory locations for needing authentication
Diameter;
It will be in the storage to the store path of described image data.
4. according to the method described in claim 3, it is characterized in that, the preset memory locations are the secure storage areas of hard disk
Domain, the store path are the store path of the secure storage section.
5. according to the method described in claim 3, it is characterized in that, the method further includes:
If detecting in described image data and determining the goal-selling object from first the presets list comprising goal-selling object
Corresponding security classification, described first the presets list is for recording the corresponding security classification of different goal-selling objects.
6. according to the method described in claim 5, it is characterized in that, the method further includes:
If the security classification indicates to need to hide described image data, described image data are hidden in the store path.
7. according to the method described in claim 3, it is characterized in that, the method further includes:
If not finding the corresponding store path of the preset memory locations based on the content characteristic, described image data are stored
To the preset memory locations.
8. according to the method described in claim 1, it is characterized in that, it is described identification image data in content characteristic, including:
From more than two fixed reference feature templates, the fixed reference feature template with described image data match is determined, wherein institute
State content characteristic of the fixed reference feature template for recording different goal-selling objects;
Content characteristic corresponding with the fixed reference feature template of described image data match is determined as in described image data
Hold feature.
9. according to the method described in claim 1, it is characterized in that, described determine described image data based on the content characteristic
Corresponding storage mode, including:
Storage mode corresponding with the content characteristic is searched in second the presets list, described second the presets list is for recording
The corresponding storage mode of different content feature.
10. a kind of image data read method, which is characterized in that the method further includes:
Detect need authentication with preset memory locations corresponding data access request;
Obtain verification mode corresponding with the preset memory locations;
With the verification mode, verification information input by user is detected;
Based on verification result, judge whether user has permission carry out data access.
11. according to the method described in claim 10, it is characterized in that, the verification information includes the biological characteristic letter of user
Breath.
12. a kind of image data storage apparatus, which is characterized in that described device includes:
Feature identification unit, for identification content characteristic in image data;
Storage mode determination unit, for determining described image based on the content characteristic that the feature identification unit recognizes
The corresponding storage mode of data, wherein the storage mode includes kept secure;
Storage unit will be described if determining that the storage mode is the kept secure for the storage mode determination unit
Image data is stored to the preset memory locations for needing authentication.
13. a kind of image data reading device, which is characterized in that described device includes:
First detection unit, for detecting the data access request corresponding with preset memory locations for needing authentication;
Acquiring unit, the data access request for being detected in response to the first detection unit, obtain with it is described pre-
If the corresponding verification mode of storage location;
Second detection unit, the verification mode for being got with the acquiring unit detect verification letter input by user
Breath;
Judging unit judges whether user has permission progress if the verification result for being obtained based on the second detection unit
Data access.
14. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the meter
Calculation machine program be used to execute the claims the 1-8 any image data recording method or the claims 9 or
Image data read method described in person 10.
15. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Processor;Memory for storing the processor-executable instruction;
Wherein, the processor, for identification content characteristic in image data;Described image is determined based on the content characteristic
The corresponding storage mode of data, wherein the storage mode includes kept secure;It is deposited if the storage mode is the secrecy
Storage, by described image data storage to the preset memory locations for needing authentication;Alternatively,
The processor, for detect need authentication with preset memory locations corresponding data access request;Obtain with
The corresponding verification mode of the preset memory locations;With the verification mode, verification information input by user is detected;Based on verification
As a result, judging whether user has permission carry out data access.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210033807.XA CN114491128A (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
CN201710252448.6A CN108733690B (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710252448.6A CN108733690B (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210033807.XA Division CN114491128A (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108733690A true CN108733690A (en) | 2018-11-02 |
CN108733690B CN108733690B (en) | 2022-02-18 |
Family
ID=63925118
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710252448.6A Active CN108733690B (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
CN202210033807.XA Pending CN114491128A (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210033807.XA Pending CN114491128A (en) | 2017-04-18 | 2017-04-18 | Image data storage method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN108733690B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659512A (en) * | 2019-09-27 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Picture management method, device, terminal and storage medium |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN113742793A (en) * | 2021-08-13 | 2021-12-03 | 北京海泰方圆科技股份有限公司 | PIN code input method, device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140380064A1 (en) * | 2011-11-28 | 2014-12-25 | Cleversafe, Inc. | Deleting encoded data slices in a dispersed storage network |
CN104504505A (en) * | 2014-12-12 | 2015-04-08 | 北京航天新风机械设备有限责任公司 | Data acquisition system based on process |
CN105678114A (en) * | 2014-11-17 | 2016-06-15 | 深圳桑菲消费通信有限公司 | Image preview method and device |
CN105760817A (en) * | 2016-01-28 | 2016-07-13 | 深圳泰首智能技术有限公司 | Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face |
CN106485164A (en) * | 2016-09-27 | 2017-03-08 | 维沃移动通信有限公司 | A kind of image processing method and mobile terminal |
CN106529307A (en) * | 2015-09-10 | 2017-03-22 | 青岛海信移动通信技术股份有限公司 | Photo encryption method and device |
-
2017
- 2017-04-18 CN CN201710252448.6A patent/CN108733690B/en active Active
- 2017-04-18 CN CN202210033807.XA patent/CN114491128A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140380064A1 (en) * | 2011-11-28 | 2014-12-25 | Cleversafe, Inc. | Deleting encoded data slices in a dispersed storage network |
CN105678114A (en) * | 2014-11-17 | 2016-06-15 | 深圳桑菲消费通信有限公司 | Image preview method and device |
CN104504505A (en) * | 2014-12-12 | 2015-04-08 | 北京航天新风机械设备有限责任公司 | Data acquisition system based on process |
CN106529307A (en) * | 2015-09-10 | 2017-03-22 | 青岛海信移动通信技术股份有限公司 | Photo encryption method and device |
CN105760817A (en) * | 2016-01-28 | 2016-07-13 | 深圳泰首智能技术有限公司 | Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face |
CN106485164A (en) * | 2016-09-27 | 2017-03-08 | 维沃移动通信有限公司 | A kind of image processing method and mobile terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659512A (en) * | 2019-09-27 | 2020-01-07 | Oppo(重庆)智能科技有限公司 | Picture management method, device, terminal and storage medium |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN112231758B (en) * | 2020-11-03 | 2023-11-17 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN113742793A (en) * | 2021-08-13 | 2021-12-03 | 北京海泰方圆科技股份有限公司 | PIN code input method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114491128A (en) | 2022-05-13 |
CN108733690B (en) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107844748B (en) | Auth method, device, storage medium and computer equipment | |
CN108804884B (en) | Identity authentication method, identity authentication device and computer storage medium | |
JP4531374B2 (en) | Information holding device | |
ES2768252T3 (en) | Image recognition apparatus and procedure | |
US20140380446A1 (en) | Method and apparatus for protecting browser private information | |
CN108959884B (en) | Human authentication verification device and method | |
CN107506634A (en) | Display methods, device, storage medium and the terminal of data | |
CN109074435A (en) | For providing the electronic equipment and method of user information | |
CN108733690A (en) | Image data recording method, device and electronic equipment | |
Sudeep et al. | An overview of biometrics and face spoofing detection | |
CN107705398A (en) | service providing method, device, storage medium and computing device | |
WO2015184894A2 (en) | Method and device for implementing multi-user login mode | |
JP6311237B2 (en) | Collation device and collation method, collation system, and computer program | |
US20200201977A1 (en) | Method for authenticating a first user and corresponding first device and system | |
Mohamed | Security of Multifactor Authentication Model to Improve Authentication Systems | |
KR20060009311A (en) | Smart card that stores invisible signatures | |
CN104778775A (en) | Book management system capable with functions of returning, identification and image analysis | |
CN107742073A (en) | Information displaying method, device, computer installation and computer-readable recording medium | |
KR101648823B1 (en) | Display device and method aiming to protect access to audiovisual documents recorded in storage means | |
CN109376517A (en) | User anthority identifying method and device | |
JP7336553B2 (en) | Process execution device, process execution method and process execution program | |
CN113744366B (en) | Credential photo generation method, system and computer readable storage medium | |
US11810401B1 (en) | Methods and systems for enhancing user liveness detection | |
Roscoe et al. | Unconventional mechanisms for biometric data acquisition via side-channels | |
US11961315B1 (en) | Methods and systems for enhancing detection of a fraudulent identity document in an image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |