CN108733690A - Image data recording method, device and electronic equipment - Google Patents

Image data recording method, device and electronic equipment Download PDF

Info

Publication number
CN108733690A
CN108733690A CN201710252448.6A CN201710252448A CN108733690A CN 108733690 A CN108733690 A CN 108733690A CN 201710252448 A CN201710252448 A CN 201710252448A CN 108733690 A CN108733690 A CN 108733690A
Authority
CN
China
Prior art keywords
image data
storage
content characteristic
memory locations
storage mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710252448.6A
Other languages
Chinese (zh)
Other versions
CN108733690B (en
Inventor
董行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN202210033807.XA priority Critical patent/CN114491128A/en
Priority to CN201710252448.6A priority patent/CN108733690B/en
Publication of CN108733690A publication Critical patent/CN108733690A/en
Application granted granted Critical
Publication of CN108733690B publication Critical patent/CN108733690B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Library & Information Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A kind of image data recording method of the application offer, device and electronic equipment, this method include:Identify the content characteristic in image data;The corresponding storage mode of described image data is determined based on the content characteristic;It is stored up according to the storage mode, stores described image data.The technical solution of the application can determine the storage mode of image data with content characteristic based on view data, so as to improve the storage efficiency of image data.

Description

Image data recording method, device and electronic equipment
Technical field
This application involves a kind of technical field of image processing more particularly to image data recording method, device and electronics to set It is standby.
Background technology
By configuring camera on intelligent terminal, such as mobile phone, user can be made to pass through camera application program whenever and wherever possible Photo is shot, captured photo would generally be automatically stored in photograph album application program.In mobile phone by other users in use, Any photo in camera application program can all be viewed by other users.For a user, some photos may be not want to allow What other people saw, therefore, the photo of need for confidentiality how is identified and stored, is the prior art technical issues that need to address.
Invention content
In view of this, the application provides a kind of new technical solution, it can be ensured that be related to the image data of individual privacy The user with specified permission is allowed to access.
To achieve the above object, it is as follows to provide technical solution by the application:
According to the first aspect of the application, it is proposed that a kind of image data recording method, including:
Identify the content characteristic in image data;
The corresponding storage mode of described image data is determined based on the content characteristic;
Based on the storage mode, described image data are stored.
According to the second aspect of the application, it is proposed that a kind of image data read method, method include:
Detect need authentication with preset memory locations corresponding data access request;
Obtain verification mode corresponding with the preset memory locations;
With the verification mode, verification information input by user is detected;
Based on verification result, judge whether user has permission carry out data access.
According to the third aspect of the application, it is proposed that a kind of image data storage apparatus, including:
Feature identification unit, for identification content characteristic in image data;
Storage mode determination unit, described in the content characteristic for being recognized based on the feature identification unit is determined The corresponding storage mode of image data, wherein the storage mode includes kept secure;
Storage unit, if being the kept secure for the storage mode that the storage mode determination unit determines, By described image data storage to the preset memory locations for needing authentication.
According to the fourth aspect of the application, it is proposed that a kind of image data reading device, including:
First detection unit, for detecting that the data access corresponding with preset memory locations for needing authentication is asked It asks;
Acquiring unit, the data access request for being detected in response to the first detection unit, acquisition and institute State the corresponding verification mode of preset memory locations;
Second detection unit, the verification mode for being got with the acquiring unit, detection is input by user to test Demonstrate,prove information;
Judging unit judges whether user has permission if the verification result for being obtained based on the second detection unit Carry out data access.
According to the 5th of the application the aspect, it is proposed that a kind of computer readable storage medium, the storage medium are stored with Computer program, the computer program are used to execute the image data recording method that above-mentioned first aspect proposes or above-mentioned the The image data read method that two aspects propose.
According to the 6th of the application the aspect, it is proposed that a kind of electronic equipment, the electronic equipment include:
Processor;Memory for storing the processor-executable instruction;
Wherein, the processor, for identification content characteristic in image data;Described in content characteristic determination The corresponding storage mode of image data, wherein the storage mode includes kept secure;If the storage mode is the secrecy Storage, by described image data storage to the preset memory locations for needing authentication;Alternatively,
The processor, for detect need authentication with preset memory locations corresponding data access request;It obtains Take verification mode corresponding with the preset memory locations;With the verification mode, verification information input by user is detected;It is based on Verification result, judges whether user has permission carry out data access.
By above technical scheme as it can be seen that having increased a large amount of needs newly by network or the camera modes such as take pictures within the short time When the image data of storage, the application can determine the storage mode of image data with content characteristic based on view data, when depositing When storage mode is kept secure, image data can be stored to the preset memory locations for needing authentication, so as to carry The storage efficiency of the image data of high need for confidentiality;The default storage position of authentication is needed since image data is stored in It sets, it is thus ensured that the image data of need for confidentiality is not seen by other people.
Description of the drawings
Figure 1A shows the signal of the picture used in the image data recording method of one exemplary embodiment of the application Figure;
Figure 1B shows the flow diagram of the image data recording method of one exemplary embodiment of the application;
Fig. 2A shows the scene of the flow diagram of the image data recording method of the application another exemplary embodiment Figure;
Fig. 2 B show the flow diagram of the image data recording method of the application another exemplary embodiment;
Fig. 3 shows the flow diagram of the image data recording method of the another exemplary embodiment of the application;
Fig. 4 shows the flow diagram of the image data recording method of the application another exemplary embodiment;
Fig. 5 shows the structural schematic diagram of the image data storage apparatus of one exemplary embodiment of the application;
Fig. 6 shows the structural schematic diagram of the image data reading device of one exemplary embodiment of the application;
Fig. 7 shows the structural schematic diagram of the electronic equipment of one exemplary embodiment of the application.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of consistent device and method of some aspects be described in detail in claims, the application.
It is the purpose only merely for description specific embodiment in term used in this application, is not intended to be limiting the application. It is also intended to including majority in the application and "an" of singulative used in the attached claims, " described " and "the" Form, unless context clearly shows that other meanings.It is also understood that term "and/or" used herein refers to and wraps Containing one or more associated list items purposes, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from In the case of the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
The application provides a kind of image data recording method, including:
Identify the content characteristic in image data;
The corresponding storage mode of image data is determined based on content characteristic;
According to storage mode, image data is stored.
The embodiment of the present application can determine the storage mode of image data with content characteristic based on view data, so as to Improve the storage efficiency of image data.
For the application is further described, the following example is provided:
Figure 1A shows the signal of the picture used in the image data recording method of one exemplary embodiment of the application Figure.Object described herein for example can be dress ornament, the including but not limited to gauze kerchief worn on a woman's head of user's head wearing, user's face The bikini etc. that the sunglasses of wearing, user wear, the privileged site of human body can be covered by above-mentioned object.In another implementation In example, content characteristic may be the gesture of user preset, the content characteristic of picture be determined by the identification of gesture, for example, such as Shown in Figure 1A, when stretching out the picture of the gesture of " V " font expression triumph in user, if detecting " V " font, being somebody's turn to do " V " font can It is considered as the content characteristic of picture.It in one embodiment, can be based in the prior art about the method for image recognition identification picture In content characteristic.
Figure 1B shows the flow diagram of the image data recording method of one exemplary embodiment of the application;The present embodiment It can apply on an electronic device, be realized in such a way that application program or software are installed on an electronic device, such as Figure 1B institutes Show, includes the following steps:
Step 101, the content characteristic in image data is identified.
In one embodiment, image data (Image Data) is the gray value of each pixel (pixel) indicated with numerical value Set, the figure on photographic device (for example, video camera, the portable devices such as smart mobile phone for being equipped with camera) can be passed through As sensor collects static picture, or the picture of each frame in video file, the exhibition by way of picture Show and is checked to user.
In one embodiment, content characteristic can be the mesh with specific shape or specific distribution rule for needing to identify Mark the characteristics of image of object.
Step 102, the corresponding storage mode of image data is determined based on content characteristic, wherein the storage mode includes Kept secure.
In one embodiment, storage mode may include kept secure and normal storage.For the picture number of kept secure According to needing just check by authentication;It is any to start application program or soft for the image data of normal storage The use of part can check per family.
It in one embodiment, can be taking human as setting correspondence, such as to a variety of corresponding mesh of different content feature Different storage modes is arranged in mark object, for example, the corresponding object of content characteristic is gauze kerchief worn on a woman's head, if determining gauze kerchief worn on a woman's head by image recognition Face is covered, then picture can be with normal storage, if determining that gauze kerchief worn on a woman's head does not cover in face by image recognition, picture needs to protect Close storage, if the corresponding object of content characteristic is the glasses of face position, picture need for confidentiality storage.It needs to illustrate It is that corresponding storage mode, the application couple can be arranged to the picture with different content feature according to its specific requirements in user This is not limited.
According to another embodiment of the application, in this step, the corresponding secrecy of image data is first determined based on content characteristic Grade (that is, first security classification), then storage mode is determined based on security classification.Content characteristic and the corresponding of security classification are closed System, can preset.
Step 103, if storage mode is kept secure, by image data storage to the default storage for needing authentication Position;For example, if storage mode is kept secure, image data is stored into the default file folder for needing authentication.
In one embodiment, default file folder can be one in memory space associated with application program or software A file.In one embodiment, default file folder can be associated with coded lock or fingerprint authentication module, passes through unlock Coded lock or fingerprint authentication module are to needing the user for accessing default file folder to carry out authentication.
In the present embodiment, when having increased the figures of a large amount of needs storages newly by network or the camera modes such as take pictures in the short time When as data, the application can determine the storage mode of image data with content characteristic based on view data, when storage mode is When kept secure, image data can be stored to the preset memory locations for needing authentication, need to protect so as to improve The storage efficiency of close image data, it is ensured that the image data of need for confidentiality is not seen by other people.
In above-mentioned Figure 1B illustrated embodiments, default store path can be the secure storage section of hard disk, store path For the store path of secure storage section, with reference to Fig. 2A and Fig. 2 B by taking default store path corresponds to default file folder as an example It illustrates.
Fig. 2A shows the scene of the flow diagram of the image data recording method of the application another exemplary embodiment Figure, as shown in Figure 2 A, default file folder includes " gauze kerchief worn on a woman's head ", " sunglasses ", " bikini " three sub-folders, that is, sub-folder 21, sub-folder 22, sub-folder 23, storage need for confidentiality includes " sunglasses " content characteristic in " sunglasses " 21 sub-folder Picture, in " gauze kerchief worn on a woman's head " sub-folder 22 storage need for confidentiality include " gauze kerchief worn on a woman's head " content characteristic picture, " bikini " son Store need for confidentiality in file 23 includes the picture of " bikini " content characteristic.In addition, in default file folder, may be used also Be stored with it is unfiled in above-mentioned sub-folder but the picture of need for confidentiality storage, for example, picture 24 and picture 25.It needs Illustrate, picture described herein is to describe image data, image data and picture from the visual angle of user It can be considered equivalent concept in this application.
Fig. 2 B show the flow diagram of the image data recording method of the application another exemplary embodiment;This implementation Example on the basis of above-mentioned Figure 1B illustrated embodiments, with how by image data storage to needing the default file of authentication to press from both sides In for illustrate, as shown in Figure 2 B, image data recording method includes the following steps:
Step 201, the content characteristic in image data is identified.
Step 202, the corresponding storage mode of image data is determined based on content characteristic.
The associated description of step 201 and step 202 may refer to the description of above-mentioned Figure 1B illustrated embodiments, herein no longer in detail It states.
Step 203, if storage mode is kept secure, it is based on content characteristic, determines that image data is needing authentication Default file folder in whether there is corresponding sub-folder, and if it exists, execute step 204, if being not present, execute step 208.
In one embodiment, a default store path corresponding with default file folder is similar, and sub-folder also corresponds to one Store path.
In one embodiment, default file folder in can include at least one sub-folder, each sub-folder with it is interior It is corresponding to hold feature
Step 204, image data is stored into sub-folder.
It is corresponding to above-mentioned steps 203, if the content characteristic in picture is " gauze kerchief worn on a woman's head ", which can be stored and arrive " head In yarn " sub-folder, if the content characteristic in picture is " sunglasses ", which can be stored and arrive " sunglasses " sub-folder In, if the content characteristic in picture is " bikini ", which can be stored into " bikini " sub-folder.
Step 205, whether include goal-selling object in detection image data, if it includes goal-selling to detect in picture Object executes step 206, if not including goal-selling object in picture, flow terminates.
In one embodiment, image recognition algorithm identification goal-selling object corresponding with goal-selling object, example can be used Such as, when object is face, it can identify in picture whether include face by face recognition algorithms in the prior art, this Application is no longer described in detail.
Step 206, from first the presets list, determine the corresponding security classification of goal-selling object (that is, second secrecy etc. Grade), first the presets list is for recording the corresponding security classification of different goal-selling objects.
In one embodiment, security classification can be default file folder in hide image data, default file folder in Not hide image data.Different goal-selling objects can correspond to different security classifications, for example, using goal-selling object as face For human eye, the corresponding security classification of face of Zhang San needs to hide picture in default file folder, and the human eye of Li Si corresponds to Security classification need not hide picture, etc. in default file folder.First the presets list is as shown in table 1.
Table 1
Face Security classification
Zhang San It hides
Li Si It does not hide
In one embodiment, first the presets list can record the feature of the goal-selling object of multiple and different users and every The corresponding security classification of feature of one goal-selling object.It should be noted that user can self-defined setting this is first default The corresponding security classification of goal-selling object included in list.
Step 207, if security classification indicates to need hide image data, the hide image data in sub-folder, flow Terminate.
In one embodiment, image data can be hidden based on the method in the prior art about hide image data, So as to ensure that image data is not visible in sub-folder.
Step 208, if not finding corresponding sub-folder in default file folder based on content characteristic, image data is stored In being pressed from both sides to default file, flow terminates.
If for example, the sub-folder about " sunglasses " is not arranged for default file in pressing from both sides, and the content characteristic in picture is " ink Mirror " is determining that then there is still a need for deposit for the picture when needing include the picture progress kept secure of " sunglasses " based on content characteristic It stores up in default file folder.In the application other embodiment, content characteristic can also be voluntarily selected according to user configuration, user Mapping relations between file, such as be configured to sunglasses product and be placed in clothing file.
In the present embodiment, image data is stored by the corresponding sub-folder into default file folder based on content characteristic, it can To carry out fining classification to image data, user is facilitated to check picture;When security classification indicates to need hide image data, The hide image data in sub-folder, after default file double-layered quilt disabled user opens, since image data is hidden, to Duplicate protection can be played to the privacy of user.
Fig. 3 shows the flow diagram of the image data recording method of the another exemplary embodiment of the application;This implementation Example is on the basis of above-mentioned Figure 1B illustrated embodiments, how will be in picture storage to the default file folder for needing authentication Example illustrates, as shown in figure 3, including the following steps:
Step 301, from more than two fixed reference feature templates, the fixed reference feature mould to match with image data is determined Plate, wherein fixed reference feature template is used to record the content characteristic of different goal-selling objects.
In one embodiment, image recognition can be passed through by acquiring the image with the closely related clothing of privacy of user Technology obtains fixed reference feature template, and closely related clothing is, for example, with privacy of user:Sunglasses, gauze kerchief worn on a woman's head and bikini etc., Middle clothing can be considered a realization method of the goal-selling object in the application.It should be noted that fixed reference feature template can be with It is arranged based on the actual demand of user, the application is not limited the particular content of fixed reference feature template.
Step 302, the corresponding content characteristic of the fixed reference feature template to match with image data is determined as image data Content characteristic.
For example, if the corresponding content characteristic of fixed reference feature template " gauze kerchief worn on a woman's head " matches with picture, picture can be determined Content characteristic is " gauze kerchief worn on a woman's head ".
Step 303, storage mode corresponding with content characteristic is searched in second the presets list, second the presets list is used for Record the corresponding storage mode of different content feature.
Second the presets list is for example shown in table 2, it may include the content characteristic of the pre-set object of user and each The corresponding storage mode of a content characteristic.
Table 2
Content characteristic Storage mode
Gauze kerchief worn on a woman's head Kept secure
Sunglasses Kept secure
Bikini Normal storage
Step 304, if storage mode is kept secure, by image data storage to needing the default file of authentication to press from both sides In.
The description of step 304 may refer to the description of above-mentioned Figure 1B illustrated embodiments, and this will not be detailed here.
In the present embodiment, since fixed reference feature template can be arranged according to demand of the user to individual privacy, no Same user can have different fixed reference feature templates, and it is special to can be obtained different contents by different fixed reference feature templates Sign, so as to ensure that the secret protection to different user has more specific aim.
Fig. 4 shows the flow diagram of the image data read method of one exemplary embodiment of the application;Such as Fig. 4 institutes Show, includes the following steps:
Step 401, the data access request corresponding with preset memory locations for needing authentication is detected.
Step 402, verification mode corresponding with preset memory locations is obtained.
In one embodiment, verification mode may include:Fingerprint authentication, password authentification and pattern verification etc., specifically Verification mode can be arranged by user.In another embodiment, verification mode can be what user's opposing electronic device was made Default gesture is to needing the user for accessing default file folder to carry out authentication.
Step 403, with the verification mode, verification information input by user is detected.
Corresponding with above-mentioned steps 401, verification information may include the biological information of user, for example, user setting Verification mode is fingerprint authentication, when the processor of electronic equipment detects the triggering of default file double-layered quilt, can start fingerprint and recognize Module is demonstrate,proved, the finger print information of user is acquired by fingerprint authentication module, is the verification described in the present embodiment by finger print information Information.User setting verification mode is iris verification, can when the processor of electronic equipment detects the triggering of default file double-layered quilt To open iris line authentication module, the iris information of user is acquired by iris authentication module, is the present embodiment by iris information Described in verification information.User setting verification mode is face verification, when the processor of electronic equipment detects default file When double-layered quilt triggers, camera can be started, the face characteristic of user is acquired by camera, is the present embodiment by face characteristic Described in verification information.For another example after application program launching, user is detected in direction initialization by acceleration transducer (for example, vertical direction) shakes the number of mobile phone, if the number for shaking mobile phone reaches preset times, the authentication of user is logical It crosses, default file folder can be accessed by the user.
Step 404, it is based on verification result, judges whether user has permission carry out data access.
Wherein, the image data in default file folder can both be located in the sub-folder under default file folder, also may be used To be stored directly in default file folder.Default file folder included in sub-folder and for be stored in default file folder institute Including sub-folder in image data can be found in Fig. 2A.
Image data read method provided in this embodiment allows user's access preset to store by way of authentication Protect that user's is hidden so as to ensure that the image data of preset memory locations will not be viewed by other disabled users in position It is private.
Fig. 5 shows the structural schematic diagram of the image data storage apparatus of one exemplary embodiment of the application, such as Fig. 5 institutes Show, which may include:Feature identification unit 51, determination unit 52, storage unit 53.Wherein:
Feature identification unit 51, for identification content characteristic in image data;
Storage mode determination unit 52, the content characteristic recognized for feature based recognition unit 51 determine image data Corresponding storage mode, wherein the storage mode includes kept secure;
Storage unit 53 stores picture if determining that storage mode is kept secure for storage mode determination unit 52 To the preset memory locations for needing authentication.
In one embodiment, storage unit 53 includes:
Determination subelement 531 determines image data in the default storage position for needing authentication for being based on content characteristic Set corresponding store path;
Storing sub-units 532, for image data to be stored the store path determined to determination subelement 531.
In one embodiment, preset memory locations are the secure storage section of hard disk, and store path is secure storage section Store path.
In one embodiment, device may also include:
Security classification determination unit 54, if including goal-selling object for detecting in image data, from the first default row In table, determine that the corresponding security classification of goal-selling object, first the presets list respectively correspond to for recording different goal-selling objects Security classification.
In one embodiment, device may also include:
Processing unit 55 is hidden, if indicating to need hidden image for the security classification that security classification determination unit 54 determines Data, the hide image data in the sub-folder of determination subelement 531.
In one embodiment, storage unit 53 can be additionally used in:
If not finding the corresponding store path of preset memory locations based on content characteristic, image data storage is deposited to default Storage space is set.
In one embodiment, feature identification unit 51 is particularly used in:
From more than two fixed reference feature templates, the fixed reference feature template to match with image data is determined;
The content that the corresponding content characteristic of the fixed reference feature template to match with image data is determined as to image data is special Sign.
In one embodiment, storage mode determination unit 52 is particularly used in:
Storage mode corresponding with content characteristic is searched in second the presets list, second the presets list is for recording difference The corresponding storage mode of content characteristic.
Fig. 6 shows the structural schematic diagram of the image data reading device of one exemplary embodiment of the application, the picture number May include according to storage device:First detection unit 61, acquiring unit 62, second detection unit 63, judging unit 64;Wherein,
First detection unit 61, for detecting that the data access corresponding with preset memory locations for needing authentication is asked It asks;
Acquiring unit 62, the data access request for being detected in response to first detection unit 61 are obtained and are deposited with default Storage space sets corresponding verification mode;
Second detection unit 63, the verification mode for being got with acquiring unit 62 detect verification letter input by user Breath;
Judging unit 64 judges whether user has permission if the verification result for being obtained based on second detection unit 63 Carry out data access.
The embodiment of the present application also provides a kind of computer readable storage medium, and the storage medium is stored with computer journey Sequence, the method that the computer program is used to execute the storage picture that any illustrated embodiments of above-mentioned Figure 1B-Fig. 3 provide, alternatively, The image data read method provided for executing above-mentioned embodiment illustrated in fig. 4.
Corresponding to the image data recording method that any illustrated embodiments of above-mentioned Figure 1B-Fig. 3 provide, the application also proposed The schematic configuration diagram of the electronic equipment of an exemplary embodiment shown in Fig. 7 according to the application.Referring to FIG. 7, in hardware layer Face, the electronic equipment may include processor, internal bus, network interface, memory and nonvolatile memory, be also possible to certainly Including the required hardware of other business.Processor in nonvolatile memory from reading in corresponding computer program to memory Then it runs, the image data storage apparatus of above-mentioned embodiment illustrated in fig. 5 is realized on logic level.Certainly, in addition to software reality Except existing mode, other realization methods, such as the mode etc. of logical device or software and hardware combining is not precluded in the application, That is the executive agent of following process flow is not limited to each logic unit, can also be hardware or logical device.
Further, the corresponding image data read method provided with above-mentioned embodiment illustrated in fig. 4, embodiment illustrated in fig. 7 Processor in the electronic equipment of offer can also realize that the image data of embodiment illustrated in fig. 6 reads dress on logic level again It sets.
It should be noted that system, device, module or unit that above-described embodiment illustrates, it specifically can be by calculating movement Piece or entity are realized, or are realized by the product with certain function.It is a kind of typically to realize that equipment is computer, computer Concrete form can be that personal computer, laptop computer, cellular phone, camera phone, smart phone, individual digital help Reason, media player, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or The combination of arbitrary several equipment in these equipment.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the application Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or Person's adaptive change follows the general principle of the application and includes the undocumented common knowledge in the art of the application Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following Claim is pointed out.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process of element, method, commodity or equipment.
The foregoing is merely the preferred embodiments of the application, not limiting the application, all essences in the application With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of the application protection god.

Claims (15)

1. a kind of image data recording method, which is characterized in that the method includes:
Identify the content characteristic in image data;
The corresponding storage mode of described image data is determined based on the content characteristic;
According to the storage mode, described image data are stored.
2. according to the method described in claim 1, it is characterized in that, described according to the storage mode, storage described image number According to, including:
If the storage mode is kept secure, by described image data storage to the preset memory locations for needing authentication.
3. according to the method described in claim 2, it is characterized in that, it is described by the storage of described image data to needing authentication Preset memory locations, including:
Based on the content characteristic, determine described image data on the corresponding storage road of preset memory locations for needing authentication Diameter;
It will be in the storage to the store path of described image data.
4. according to the method described in claim 3, it is characterized in that, the preset memory locations are the secure storage areas of hard disk Domain, the store path are the store path of the secure storage section.
5. according to the method described in claim 3, it is characterized in that, the method further includes:
If detecting in described image data and determining the goal-selling object from first the presets list comprising goal-selling object Corresponding security classification, described first the presets list is for recording the corresponding security classification of different goal-selling objects.
6. according to the method described in claim 5, it is characterized in that, the method further includes:
If the security classification indicates to need to hide described image data, described image data are hidden in the store path.
7. according to the method described in claim 3, it is characterized in that, the method further includes:
If not finding the corresponding store path of the preset memory locations based on the content characteristic, described image data are stored To the preset memory locations.
8. according to the method described in claim 1, it is characterized in that, it is described identification image data in content characteristic, including:
From more than two fixed reference feature templates, the fixed reference feature template with described image data match is determined, wherein institute State content characteristic of the fixed reference feature template for recording different goal-selling objects;
Content characteristic corresponding with the fixed reference feature template of described image data match is determined as in described image data Hold feature.
9. according to the method described in claim 1, it is characterized in that, described determine described image data based on the content characteristic Corresponding storage mode, including:
Storage mode corresponding with the content characteristic is searched in second the presets list, described second the presets list is for recording The corresponding storage mode of different content feature.
10. a kind of image data read method, which is characterized in that the method further includes:
Detect need authentication with preset memory locations corresponding data access request;
Obtain verification mode corresponding with the preset memory locations;
With the verification mode, verification information input by user is detected;
Based on verification result, judge whether user has permission carry out data access.
11. according to the method described in claim 10, it is characterized in that, the verification information includes the biological characteristic letter of user Breath.
12. a kind of image data storage apparatus, which is characterized in that described device includes:
Feature identification unit, for identification content characteristic in image data;
Storage mode determination unit, for determining described image based on the content characteristic that the feature identification unit recognizes The corresponding storage mode of data, wherein the storage mode includes kept secure;
Storage unit will be described if determining that the storage mode is the kept secure for the storage mode determination unit Image data is stored to the preset memory locations for needing authentication.
13. a kind of image data reading device, which is characterized in that described device includes:
First detection unit, for detecting the data access request corresponding with preset memory locations for needing authentication;
Acquiring unit, the data access request for being detected in response to the first detection unit, obtain with it is described pre- If the corresponding verification mode of storage location;
Second detection unit, the verification mode for being got with the acquiring unit detect verification letter input by user Breath;
Judging unit judges whether user has permission progress if the verification result for being obtained based on the second detection unit Data access.
14. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the meter Calculation machine program be used to execute the claims the 1-8 any image data recording method or the claims 9 or Image data read method described in person 10.
15. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Processor;Memory for storing the processor-executable instruction;
Wherein, the processor, for identification content characteristic in image data;Described image is determined based on the content characteristic The corresponding storage mode of data, wherein the storage mode includes kept secure;It is deposited if the storage mode is the secrecy Storage, by described image data storage to the preset memory locations for needing authentication;Alternatively,
The processor, for detect need authentication with preset memory locations corresponding data access request;Obtain with The corresponding verification mode of the preset memory locations;With the verification mode, verification information input by user is detected;Based on verification As a result, judging whether user has permission carry out data access.
CN201710252448.6A 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment Active CN108733690B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210033807.XA CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment
CN201710252448.6A CN108733690B (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710252448.6A CN108733690B (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202210033807.XA Division CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN108733690A true CN108733690A (en) 2018-11-02
CN108733690B CN108733690B (en) 2022-02-18

Family

ID=63925118

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201710252448.6A Active CN108733690B (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment
CN202210033807.XA Pending CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202210033807.XA Pending CN114491128A (en) 2017-04-18 2017-04-18 Image data storage method and device and electronic equipment

Country Status (1)

Country Link
CN (2) CN108733690B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN113742793A (en) * 2021-08-13 2021-12-03 北京海泰方圆科技股份有限公司 PIN code input method, device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140380064A1 (en) * 2011-11-28 2014-12-25 Cleversafe, Inc. Deleting encoded data slices in a dispersed storage network
CN104504505A (en) * 2014-12-12 2015-04-08 北京航天新风机械设备有限责任公司 Data acquisition system based on process
CN105678114A (en) * 2014-11-17 2016-06-15 深圳桑菲消费通信有限公司 Image preview method and device
CN105760817A (en) * 2016-01-28 2016-07-13 深圳泰首智能技术有限公司 Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140380064A1 (en) * 2011-11-28 2014-12-25 Cleversafe, Inc. Deleting encoded data slices in a dispersed storage network
CN105678114A (en) * 2014-11-17 2016-06-15 深圳桑菲消费通信有限公司 Image preview method and device
CN104504505A (en) * 2014-12-12 2015-04-08 北京航天新风机械设备有限责任公司 Data acquisition system based on process
CN106529307A (en) * 2015-09-10 2017-03-22 青岛海信移动通信技术股份有限公司 Photo encryption method and device
CN105760817A (en) * 2016-01-28 2016-07-13 深圳泰首智能技术有限公司 Method and device for recognizing, authenticating, unlocking and encrypting storage space by using human face
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN113742793A (en) * 2021-08-13 2021-12-03 北京海泰方圆科技股份有限公司 PIN code input method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114491128A (en) 2022-05-13
CN108733690B (en) 2022-02-18

Similar Documents

Publication Publication Date Title
CN107844748B (en) Auth method, device, storage medium and computer equipment
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
JP4531374B2 (en) Information holding device
ES2768252T3 (en) Image recognition apparatus and procedure
US20140380446A1 (en) Method and apparatus for protecting browser private information
CN108959884B (en) Human authentication verification device and method
CN107506634A (en) Display methods, device, storage medium and the terminal of data
CN109074435A (en) For providing the electronic equipment and method of user information
CN108733690A (en) Image data recording method, device and electronic equipment
Sudeep et al. An overview of biometrics and face spoofing detection
CN107705398A (en) service providing method, device, storage medium and computing device
WO2015184894A2 (en) Method and device for implementing multi-user login mode
JP6311237B2 (en) Collation device and collation method, collation system, and computer program
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
Mohamed Security of Multifactor Authentication Model to Improve Authentication Systems
KR20060009311A (en) Smart card that stores invisible signatures
CN104778775A (en) Book management system capable with functions of returning, identification and image analysis
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
KR101648823B1 (en) Display device and method aiming to protect access to audiovisual documents recorded in storage means
CN109376517A (en) User anthority identifying method and device
JP7336553B2 (en) Process execution device, process execution method and process execution program
CN113744366B (en) Credential photo generation method, system and computer readable storage medium
US11810401B1 (en) Methods and systems for enhancing user liveness detection
Roscoe et al. Unconventional mechanisms for biometric data acquisition via side-channels
US11961315B1 (en) Methods and systems for enhancing detection of a fraudulent identity document in an image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant