CN109002728B - Group display control method based on one-key triggering - Google Patents

Group display control method based on one-key triggering Download PDF

Info

Publication number
CN109002728B
CN109002728B CN201810703574.3A CN201810703574A CN109002728B CN 109002728 B CN109002728 B CN 109002728B CN 201810703574 A CN201810703574 A CN 201810703574A CN 109002728 B CN109002728 B CN 109002728B
Authority
CN
China
Prior art keywords
image
social application
group
sound signal
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810703574.3A
Other languages
Chinese (zh)
Other versions
CN109002728A (en
Inventor
向湘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen aichat Technology Co.,Ltd.
Original Assignee
Shenzhen Aichat Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Aichat Technology Co ltd filed Critical Shenzhen Aichat Technology Co ltd
Priority to CN201810703574.3A priority Critical patent/CN109002728B/en
Publication of CN109002728A publication Critical patent/CN109002728A/en
Application granted granted Critical
Publication of CN109002728B publication Critical patent/CN109002728B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A group display control method based on one-key triggering is characterized in that: the first group is created in a social application, and the social application detects touch operation of an image one-key hiding control button arranged on a first group conversation interface of the first group; the social application determines a unique publishing position of each image published on the first group conversation interface aiming at each image published on the first group conversation interface so as to respond to the touch operation of the image one-key hiding control button; after the social application associates the unique posting location of each image with the image, all images posted on the first group conversation interface are transferred to an encrypted folder designated by the social application for the first group, so that all images posted on the first group conversation interface are hidden. By implementing the embodiment of the invention, the risk of leakage of the privacy image published on the group session interface of a certain group can be reduced.

Description

Group display control method based on one-key triggering
Technical Field
The invention relates to the technical field of social contact, in particular to a group display control method based on one-key triggering.
Background
At present, a plurality of groups are generally created on various social applications including WeChat and QQ, and users in a certain group sometimes publish some privacy images on a group session interface. In practice, it is found that when a privacy image is published on a group session interface of a group of a social application, if other people exist around a user device (such as a mobile phone) where the social application is located, the privacy image published on the group session interface is easily stolen by the other people, so that the privacy image is revealed.
Disclosure of Invention
The embodiment of the invention discloses a group display control method based on one-key triggering, which can reduce the risk of leakage of a privacy image published on a group session interface of a certain group.
The group display control method based on one-key triggering comprises the following steps of:
the social application detects a touch operation of an image one-key hiding control button set on a first group conversation interface of the first group;
the social application determines, for each image published on the first group session interface, a unique publication location of the image on the first group session interface in response to a touch operation of the image-on-key hiding control button;
after the social application associates the unique posting location of each image with the image, all images posted on the first group conversation interface are transferred to an encrypted folder designated by the social application for the first group, so that all images posted on the first group conversation interface are hidden.
As an optional implementation manner, in an embodiment of the present invention, the method further includes:
after all images published on the first group conversation interface by the social application are hidden, controlling the image one-key hiding control button arranged on the first group conversation interface to update into an image one-key display control button;
the social application detects touch operation of a current user on the image one-key display control button;
the social application verifies whether the current user belongs to a legal user of the social application, and if yes, the image is transferred to the unique publishing position of the image associated with the image on the first group session interface for publishing aiming at each image transferred to the encrypted folder;
and after all the images in the encrypted folder of the social application are transferred to the first group session interface for publishing, controlling the image one-key display control button to be updated to the image one-key hidden control button.
As an optional implementation manner, in this embodiment of the present invention, after the second group associated with the first group is also created in the social application and the control of the image-on-display control button is updated to the image-on-hiding control button, the method further includes:
the social application detecting an overlay instruction input for any target image published on the first group conversation interface;
the social application prompts any two users which are issued with sound signals on a second group conversation interface of the second group to be selected from the second group associated with the first group according to the covering instruction so as to form a first user pair;
the social application associating the first user pair with the target image and overlaying the target image with a preset non-private image on the first group session interface; wherein the first user pair is used as a first basis for removing the non-private image which covers the target image.
As an optional implementation manner, in an embodiment of the present invention, after the social application overlays the target image with a preset non-private image on the first group conversation interface, the method further includes:
the social application detecting a removal instruction for the non-private image on the first group session interface that has overlaid the target image;
the social application prompts any two users to be selected from the second group according to the removing instruction so as to form a second user pair;
the social application determining whether the selected second user pair is the same as the first user pair serving as a first basis for removing the non-private image that has covered the target image;
if the first group conversation interface is the same as the second group conversation interface, the social application removes the non-privacy image which is covered by the target image on the first group conversation interface so as to redisplay the target image.
As an optional implementation manner, in an embodiment of the present invention, after the social application associates the first user pair with the target image and before the target image is overlaid with a preset non-private image on the first group conversation interface, the method further includes:
the social application prompting selection of a first audio signal posted by the first user to one of the included users from the first group conversation interface and prompting selection of a second audio signal posted by the first user to another of the included users from the first group conversation interface;
the social application synthesizes the selected first sound signal and the second sound signal to obtain a verification sound signal;
the social application associating the verification sound signal with the target image and executing the step of overlaying the target image with a preset non-private image on the first group conversation interface; wherein the verification sound signal serves as a second basis for removing the non-private image that has covered the target image;
after the social application determines that the second user pair is the same as the first user pair that is a first basis for removing the non-private image that has overlaid the target image, and before the social application removes the non-private image that has overlaid the target image on the first group session interface to redisplay the target image, the method further comprises:
the social application prompts to select a third sound signal issued by one user included in the second user pair from the second group conversation interface and prompts to select a fourth sound signal issued by another user included in the second user pair from the second group conversation interface;
the social application synthesizes the selected third sound signal and the selected fourth sound signal to obtain a synthesized sound signal;
the social application determines whether the synthesized sound signal matches the verification sound signal that is a second basis for removing the non-private image that has overlaid the target image, and if so, performs the step of removing the non-private image that has overlaid the target image on the first group conversation interface to redisplay the target image.
As an optional implementation manner, in an embodiment of the present invention, the synthesizing, by the social application, the selected first sound signal and the second sound signal to obtain a verification sound signal includes:
the social application determining an alignment point between the selected first sound signal and the second sound signal; wherein the alignment point refers to a starting position of the synthesis of the first sound signal and the second sound signal;
the social application synthesizes the first sound signal and the second sound signal into a verification sound signal according to the alignment point.
As an optional implementation manner, in an embodiment of the present invention, the determining, by the social application, an alignment point between the first sound signal and the second sound signal includes:
the social application calculates a first time length of the selected first sound signal and a second time length of the second sound signal; wherein the first duration represents a duration of sound of the first sound signal; the second time duration represents a time duration of sound of the second sound signal;
the social application calculating a difference between the first duration and the second duration;
and the social application judges whether the difference value is smaller than or equal to a preset value, if so, any sound signal in the first sound signal and the second sound signal is subjected to periodic scaling to obtain the first sound signal and the second sound signal with the same final duration, and then the first audio frame of the first sound signal and the first audio frame of the second sound signal with the same final duration are used as an alignment point.
As an optional implementation manner, in an embodiment of the present invention, the social application performs periodic scaling on any one of the first sound signal and the second sound signal, including:
if the first time length of the first sound signal is shorter than the second time length of the second sound signal, the social application determines a ratio X of the difference value to the first time length of the first sound signal according to the difference value;
the social application calculates the audio frame number Y of the first sound signal;
the social application calculates a magnification factor Z, which is X (Y/(Y-1));
and the social application amplifies other audio frames except the first audio frame in the first sound signal in an equal proportion according to the amplification factor, so that the final duration of the amplified first sound signal is the same as the second duration of the second sound signal.
As an optional implementation manner, in an embodiment of the present invention, if the difference is greater than the preset value, the method further includes:
the social application respectively samples the first sound signal and the second sound signal by using the same default sampling frequency to obtain a first sampling group and a second sampling group;
the social application generates a cross-correlation group according to the default sampling frequency, the first sampling group, the second sampling group and a cross-correlation weight; wherein the cross-correlation weight is positively correlated with the difference, and the cross-correlation group comprises a plurality of values;
the social application compares the plurality of values in the cross-correlation group to find a maximum value;
the social application uses the audio frame position corresponding to the maximum value as an alignment point.
As an optional implementation manner, in an embodiment of the present invention, the generating, by the social application, a cross-correlation group according to the default sampling frequency, the first sampling group, the second sampling group, and a cross-correlation weight includes:
Figure BDA0001714967270000051
wherein S isn[t]Representing a set of cross-correlations, x [ m ]]Representing the mth sample data in the first sample group, y [ m-t ]]Represents the (m-t) th sampling data in the second sampling group, t represents the offset of time, t is an integer and takes the value from 0 to m, WtAnd representing a window function, wherein n is l f, l is a cross-correlation weight, and f is the default sampling frequency.
As an optional implementation manner, in an embodiment of the present invention, the determining, by the social application, whether the synthesized sound signal matches the verification sound signal as a second criterion for removing the non-privacy image that has covered the target image includes:
the social application determining whether the alignment point between the synthesized sound signal and the verification sound signal as a second criterion for removing the non-private image that has overlaid the target image is the same;
if the two multi-dimensional vectors are the same, the social application judges whether the first multi-dimensional vector corresponding to the voiceprint feature of the synthetic voice signal is matched with the second multi-dimensional vector corresponding to the voiceprint feature of the verification voice signal, and if the two multi-dimensional vectors are matched, the synthetic voice signal is determined to be matched with the verification voice signal; if not, determining that the synthesized voice signal does not match the verification voice signal;
the first multi-dimensional vector corresponding to the voiceprint feature of the synthetic sound signal is composed of a mel-frequency cepstrum coefficient, a linear prediction cepstrum coefficient, a first order difference of the mel-frequency cepstrum coefficient, a first order difference of the linear prediction cepstrum coefficient, energy, a first order difference of the energy and a Gammatone filter cepstrum coefficient.
In the embodiment of the invention, by touching the image one-key hiding control button arranged on the first group session interface of the first group, all images published on the first group session interface can be triggered to be transferred to the encrypted folder appointed by the social application for the first group, so that all images published on the first group session interface are hidden, and the risk of leakage of the privacy image published on the group session interface of one group can be reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a group display control method based on one-key triggering according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another group display control method based on one-touch triggering according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of another group display control method based on one-touch triggering according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating another group display control method based on one-touch triggering according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating another group display control method based on one-touch triggering according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a change of a group session interface of a social application according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, of embodiments of the present invention are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses a group display control method based on one-key triggering, which can reduce the risk of leakage of a privacy image published on a group session interface of a certain group. The following detailed description is made with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a group display control method based on one-key triggering according to an embodiment of the present invention. In the group display control method shown in FIG. 1, a first group is created in a social application, which may include, but is not limited to WeChat, QQ; the social application may be installed on a user device such as a mobile phone, a tablet computer, and the like. As shown in fig. 1, the group display control method may include the steps of:
101. the social application detects a touch operation of a one-touch hidden control button for an image disposed on a first group session interface of a first group.
The touch operation may include a single click, a double click, a slide operation, and the like, and the embodiment of the present invention is not limited.
102. The social application determines, for each image published on the first group session interface, a unique publication location for the image on the first group session interface in response to a touch operation of the image-one-touch hidden control button.
103. After the social application associates the unique posting location of each image with the image, all images posted on the first group conversation interface are transferred to an encrypted folder designated by the social application for the first group, so that all images posted on the first group conversation interface are hidden.
In the group display control method described in fig. 1, by performing touch operation on an image one-key hiding control button provided on a first group session interface of a first group, it may be triggered to transfer all images published on the first group session interface to an encryption folder specified for the first group by a social application, so that all images published on the first group session interface are hidden, and thus, a risk of revealing a privacy image published on a group session interface of a certain group can be reduced.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating another group display control method based on one-key triggering according to an embodiment of the present invention. In the group display control method shown in FIG. 2, the first group is created in a social application, which may include, but is not limited to WeChat, QQ; the social application may be installed on a user device such as a mobile phone, a tablet computer, and the like. As shown in fig. 2, the group display control method may include the steps of:
201. the social application detects a touch operation of a one-touch hidden control button for an image disposed on a first group session interface of a first group.
202. The social application determines, for each image published on the first group session interface, a unique publication location for the image on the first group session interface in response to a touch operation of the image-one-touch hidden control button.
203. After the social application associates the unique posting location of each image with the image, all images posted on the first group conversation interface are transferred to an encrypted folder designated by the social application for the first group, so that all images posted on the first group conversation interface are hidden.
204. After all the images published on the first group conversation interface by the social application are hidden, controlling an image one-key hiding control button arranged on the first group conversation interface to be updated to an image one-key display control button.
205. The social application detects a touch operation of a current user on the image one-key display control button.
206. And the social application verifies whether the current user belongs to a legal user of the social application, and if so, transfers each image transferred to the encrypted folder to the unique publishing position of the image associated with the image on the first group session interface for publishing.
After the image is transferred to the unique publishing position of the image associated with the image on the first group session interface for publishing, the image can be displayed on the unique publishing position of the image associated with the image on the first group session interface.
The social application verifying whether the current user belongs to a legal user of the social application may include the following steps:
the social application collects color information of a face image of a current user;
carrying out binarization processing on color information of a face image of a current user by the social application;
the social application divides the face image of the current user after binarization processing into a plurality of pixel blocks, and performs OR operation on pixel values corresponding to all pixels in each pixel block to obtain an OR operation result of each pixel block to form a down-sampling image of the face image of the current user;
the social application divides the obtained down-sampling image into a plurality of pixel areas, and obtains the characteristic information of each pixel area forming the face image of the current user by summing the OR operation results of all pixel points in each pixel area;
the social application judges whether the face image of the current user is matched with the face image of a legal user stored in advance by the social application according to the characteristic information of each pixel region of the face image of the current user, and if the face image of the current user is matched with the face image of the legal user, the current user is determined to belong to the legal user of the social application; otherwise, if not, determining that the current user does not belong to the legal user of the social application.
As another optional implementation, after the social application determines, according to the feature information of each pixel region of the face image of the current user, that the face image of the current user matches with the face image of a legal user stored in advance by the social application, the following steps may be further performed:
the social application carries out pretreatment on a touched fingerprint image of an image one-key display control button, wherein the pretreatment comprises image segmentation, image enhancement, image binaryzation and thinning treatment on the touched fingerprint image respectively to obtain an input thinned fingerprint image;
the social application extracts fingerprint minutiae from an input thinned fingerprint image, tracks the input thinned fingerprint image, extracts sampling points on ridge lines in the input thinned fingerprint image, extracts convex hulls of the sampling points of the input thinned fingerprint image, and generates input fingerprint characteristics of the convex hulls containing the fingerprint minutiae, the sampling points on all ridge lines and the sampling points;
the social application identifies whether the input fingerprint features are matched with fingerprint features of legal users stored in advance by the social application, and if the input fingerprint features are matched with the fingerprint features of the legal users, the current user is determined to belong to the legal user of the social application; otherwise, if not, determining that the current user does not belong to the legal user of the social application.
207. And after all the images in the encrypted folder of the social application are transferred to the first group session interface for publishing, controlling the image one-key display control button to be updated to the image one-key hidden control button.
In the group display control method described in fig. 2, by performing touch operation on an image one-key hiding control button set on a first group session interface of a first group, it may be triggered to transfer all images published on the first group session interface to an encryption folder specified for the first group by a social application, so that all images published on the first group session interface are hidden, thereby reducing a risk of leakage of a privacy image published on the group session interface of a certain group; in addition, in the group display control method described in fig. 2, only when the current user performing touch operation on the image one-touch display control button belongs to a legal user of the social application, each image transferred to the encrypted folder is transferred to the first group session interface for publication, so that the security of the image displayed on the first group session interface can be improved.
Referring to fig. 3, fig. 3 is a flowchart illustrating a group display control method based on one-key triggering according to an embodiment of the present invention. In the group display control method shown in fig. 3, a first group and a second group associated with the first group are created in a social application. The mapping relationship between the group identifier of the first group and the group identifier of the second group can be established in advance on a group mapping setting interface provided by the social application, and the mapping relationship is used for representing that the first group is associated with the second group. As shown in fig. 3, the group display control method may include the steps of:
wherein, steps 301 to 307 are the same as steps 201 to 207, and are not described in detail in the embodiment of the present invention.
308. The social application detects an override instruction entered for any target image published on a first group conversation interface for a first group.
For example, the target image may be a privacy image, and the embodiment of the present invention is not limited thereto.
309. And the social application prompts any two users which are issued with sound signals on a second group conversation interface of the second group to be selected from the second group associated with the first group according to the covering instruction so as to form a first user pair.
In the embodiment of the present invention, the social application may select, according to the overlay instruction, each user who has issued the audio signal on the second group session interface of the second group from the second group, and pop up a first user pair selection interface, where the first user pair selection interface includes an identifier of each user who has issued the audio signal on the second group session interface of the second group and is selected from the second group; accordingly, the social application can detect the identifications of any two users selected by the current user of the social application from the first user pair selection interface, so that any two users which are published with sound signals on the second group conversation interface of the second group can be selected from the second group, and a first user pair is formed.
The users who issue the sound signals on the second group conversation interface refer to the users who issue the sound signals and can be seen on the second group conversation interface.
310. The social application associates the first user pair with the target image and overlays the target image with a preset non-private image on the first group session interface; wherein the first user pair is used as a first basis for removing the non-privacy image covered by the target image.
The social application associating the first user pair with the target image means that the social application associates the corresponding relationship of the identifiers of the two users in the first user pair with the target image.
In the group display control method described in fig. 3, the risk of leakage of the privacy image published on the group session interface of a certain group can be reduced; in addition, in the group display control method described in fig. 3, the security of the image displayed on the first group session interface may also be improved; in addition, in the group display control method described in fig. 3, the risk of leakage of the privacy image published on the group session interface of a certain group can be reduced based on the cross-group mechanism.
Referring to fig. 4, fig. 4 is a schematic flow chart illustrating another group display control method based on one-key triggering according to an embodiment of the present invention. As shown in fig. 4, the group display control method may include the steps of:
wherein, steps 401 to 410 are the same as steps 301 to 310, and are not described in detail in the embodiments of the present invention.
411. The social application detects a removal instruction for a non-private image overlaid with the target image on the first group session interface.
412. And the social application prompts to select any two users from the second group according to the removing instruction so as to form a second user pair.
In the embodiment of the present invention, the social application may pop up a second user pair selection interface according to the removal instruction, where the second user pair selection interface includes identifiers of all users in the second group; accordingly, the social application may detect the identification of any two users selected by the current user of the social application from the second user pair selection interface, thereby enabling the selection of any two users from the second group to form the second user pair.
413. The social application judges whether the selected second user pair is the same as a first user pair serving as a first basis for removing the non-private image covering the target image or not; if yes, go to step 414; if not, the process is ended.
414. The social application removes the non-private image on the first group session interface that has overlaid the target image to redisplay the target image.
In the method described in fig. 4, only when the second user pair formed by any two users selected from the second group is the same as the first user pair associated with the target image and having a sound signal issued on the second group conversation interface, the non-private image of the target image covered on the first group conversation interface is removed to redisplay the target image; on the contrary, if the second user pair formed by any two users selected from the second group is associated with the target image and the first user pair issued with the sound signal on the second group conversation interface is not the same, the non-private image of the covered target image on the first group conversation interface is not removed, and the target image is still covered. It can be seen that, by implementing the method described in fig. 4, the risk of revealing the privacy image published on the group session interface of a certain group can also be reduced based on the cross-group mechanism.
Referring to fig. 5, fig. 5 is a schematic flow chart illustrating another group display control method based on one-key triggering according to an embodiment of the present invention. As shown in fig. 5, the group display control method may include the steps of:
wherein, steps 501 to 507 are the same as steps 301 to 307, and are not described in detail in the embodiments of the present invention.
508. The social application detects an override instruction entered for any target image published on a first group conversation interface for a first group.
509. And the social application prompts any two users which are issued with sound signals on a second group conversation interface of the second group to be selected from the second group associated with the first group according to the covering instruction so as to form a first user pair.
510. The social application associates the first user pair with the target image, prompts selection of a first sound signal issued by the first user pair to one of the included users from the second group conversation interface, and prompts selection of a second sound signal issued by the first user pair to another of the included users from the second group conversation interface.
The first sound signal issued by one user included in the first user pair may be a voice signal or an ambient sound signal issued by one user included in the first user pair on the second group conversation interface, and the first sound signal issued by another user included in the first user pair may be a voice signal or an ambient sound signal issued by another user included in the first user pair on the second group conversation interface.
511. And the social application synthesizes the selected first sound signal and the second sound signal to obtain a verification sound signal.
As an optional implementation manner, in an implementation of the present invention, before the social application performs step 511, the social application may first determine whether the first sound signal and the second sound signal are both voice signals, and perform step 511 only if the first sound signal and the second sound signal are both voice signals.
For example, the social application may accurately determine whether the first sound signal is a voice signal in the following manner:
the social application carries out fast Fourier transform on the first sound signal to obtain a frequency domain signal;
the social application calculates a spectral amplitude value according to the frequency domain signal;
the social application calculates a probability density from the spectral magnitude values;
the social application calculates the spectral entropy of the first sound signal according to the probability density;
the social application determines whether the first sound signal is a speech signal according to the spectral entropy;
wherein the social application determines whether the first sound signal is a speech signal according to the spectral entropy, and may include:
the social application calculates an energy of the first sound signal;
the social application determines whether the first sound signal is a voice signal according to the energy and the spectral entropy of the first sound signal, namely the social application can calculate a product of the energy of the first sound signal and the spectral entropy of the first sound signal and perform a square-open operation on the product to obtain a square-open value corresponding to the product; and the social application may determine whether the square value corresponding to the product is greater than a preset threshold value, if so, determine that the first sound signal is a speech signal, and if not, determine that the first sound signal is not a speech signal.
512. The social application associates the verification sound signal with the target image, and covers the target image with a preset non-privacy image on the first group session interface; wherein, the first user pair is used as a first basis for removing the non-privacy image covered by the target image; verifying a sound signal as a second criterion for removing the non-private image that has covered the target image.
513. The social application detects a removal instruction for a non-private image overlaid with the target image on the first group session interface.
514. And the social application prompts to select any two users from the second group according to the removing instruction so as to form a second user pair.
515. The social application judges whether the second user pair is the same as the first user pair serving as a first basis for removing the non-private image covering the target image; if yes, go to step 516-step 518; if not, the process is ended.
516. And the social application prompts the third sound signal issued by the second user to the contained user from the second group conversation interface and prompts the fourth sound signal issued by the second user to the contained other user from the second group conversation interface.
517. And the social application synthesizes the selected third sound signal and the selected fourth sound signal to obtain a synthesized sound signal.
518. The social application determines whether the synthesized sound signal matches the verification sound signal as a second basis for removing the non-private image that has covered the target image, and if so, performs step 519; if not, the process is ended.
519. The social application removes the non-private image on the first group session interface that has overlaid the target image to redisplay the target image.
As an alternative implementation, in step 511, the synthesizing, by the social application, the selected first sound signal and the second sound signal to obtain the verification sound signal includes:
the social application determines an alignment point between the selected first sound signal and the second sound signal; wherein, the alignment point refers to a starting position of the synthesis of the first sound signal and the second sound signal; in other words, if the first sound signal and the second sound signal are to be synthesized, it is necessary to find out from which audio frame the synthesis starts, and this audio frame can be understood as the alignment point;
the social application synthesizes the first sound signal and the second sound signal into a verification sound signal according to the alignment point.
As an alternative embodiment, the social application determines an alignment point between the selected first sound signal and the second sound signal, including:
the social application calculates a first time length of the selected first sound signal and a second time length of the second sound signal; wherein the first duration represents a time of sound duration of the first sound signal; the second time duration represents a time duration of sound of the second sound signal;
the social application calculates a difference between the first duration and the second duration;
and judging whether the difference value is smaller than or equal to a preset value or not by the social application, if so, periodically zooming any one of the first sound signal and the second sound signal to obtain the first sound signal and the second sound signal with the same final duration, and taking the first audio frame of the first sound signal and the first audio frame of the second sound signal with the same final duration as an alignment point.
In the embodiment of the present invention, if the difference is smaller than or equal to the predetermined value, it indicates that the difference between the two sound signals (i.e. the first sound signal and the second sound signal) is small, and at this time, one of the sound signals (e.g. the first sound signal) may be scaled periodically, for example, periodically compressing the sound signal with a longer duration (i.e. commonly referred to as fast forwarding), and/or periodically amplifying the sound signal with a shorter duration (i.e. commonly referred to as slow forwarding), so that the final durations of the two sound signals are the same, and then the first audio frames of the two sound signals are aligned as an alignment point.
Wherein, the value range of the preset value can be 0 to 0.1 second.
As an optional implementation, the social application performs periodic scaling on any one of the first sound signal and the second sound signal, including:
if the first time length of the first sound signal is shorter than the second time length of the second sound signal, the social application determines a ratio X of the difference to the first time length of the first sound signal according to the difference;
the social application calculates the audio frame number Y of the first sound signal;
calculating an amplification factor Z, wherein Z is X (Y/(Y-1));
and the social application amplifies the audio frames except the first audio frame in the first sound signal in an equal proportion according to the amplification coefficient, so that the final duration of the amplified first sound signal is the same as the second duration of the second sound signal.
For example, if the first sound signal is 1 second and there are 100 audio frames, each audio frame is 0.01 second, and the second sound signal is 1.1 second, it is necessary to amplify the first sound signal to 1.1 second. The first frame is not moved, the subsequent 99 frames are amplified, and the amplification factor Z is firstly determined to be 0.1 (100/(100-1)) -0.101, namely 10.1%; at this time, in the subsequent 99 frames, each frame needs to be amplified by 10.1%, each amplified frame is 0.01 × 0.01101 (1+ 10.1%), the length of the 99 frames after amplification is 1.09 seconds, and the final duration of the first amplified sound signal is 1.1 seconds after the first frame without motion is added by 0.01 seconds, that is, the final duration of the first amplified sound signal is the same as the second duration of the second sound signal.
In the embodiment of the present invention, if the difference is greater than the preset value, it indicates that the difference between the two sound signals (i.e., the first sound signal and the second sound signal) is large when inputting, and if one of the sound signals is periodically scaled at this time, then relatively serious distortion may be caused after scaling, and a problem may occur in subsequent verification, so that a cross-correlation algorithm may be used to determine the alignment point. That is, when the difference is greater than the preset value, the method further includes:
the social application samples the first sound signal and the second sound signal respectively by using the same default sampling frequency to obtain a first sampling group and a second sampling group;
the social application generates a cross-correlation group according to a default sampling frequency (e.g., 8000Hz to 10000Hz), the first sampling group, the second sampling group and the cross-correlation weight; wherein, the cross-correlation weight is positively correlated with the difference (for example, the cross-correlation weight may be 1.5 times of the difference), and the cross-correlation group includes a plurality of values;
the social application compares a plurality of values in the cross-correlation group to find a maximum value;
the social application uses the audio frame position corresponding to the largest value as the alignment point.
The social application generates a cross-correlation group according to the default sampling frequency, the first sampling group, the second sampling group and the cross-correlation weight, and the method comprises the following steps:
Figure BDA0001714967270000171
wherein S isn[t]Representing a set of cross-correlations, x [ m ]]Representing the mth sample data in the first sample group, y [ m-t ]]Represents the (m-t) th sampling data in the second sampling group, t represents the offset of time, t is an integer and takes the value from 0 to m, WtAnd expressing a window function, wherein n is l and f, l is a cross-correlation weight, and f is a default sampling frequency.
The social application may use the audio frame position corresponding to the maximum numerical value as the alignment point:
after the social application finds the maximum value, it can reverse the m, i.e. which sample data is, according to the above formula (1), and then determine which audio frame the sample data is in, and use the audio frame as the alignment point.
In the embodiment of the invention, after the social application acquires the first sound signal and the second sound signal, the two sound signals are not verified one by one, but the two sound signals are synthesized to obtain the verified sound signal, then the synthesized sound signal is matched with the verified sound signal when the non-private image needs to be removed, and after the sound signals are synthesized, more verifiable parameters (such as whether the alignment points are the same or not, whether voiceprint characteristics are matched or not) are generated.
As an alternative embodiment, in the step 518, the determining, by the social application, whether the synthesized sound signal matches the verification sound signal as the second basis for removing the non-private image covered by the target image includes:
the social application determines whether an alignment point between the synthesized sound signal and a verification sound signal as a second basis for removing the non-private image that has covered the target image is the same; the alignment points are the same, and the content of a mixed frame of two mixed audio frames corresponding to the alignment points (one mixed audio frame belongs to the synthesized sound signal, and the other mixed audio frame belongs to the verification sound signal) is the same, and the frame time of the two mixed audio frames corresponding to the alignment points is also the same;
if the first multi-dimensional vector is the same as the second multi-dimensional vector, the social application judges whether the first multi-dimensional vector corresponding to the voiceprint feature of the synthesized voice signal is matched with the second multi-dimensional vector corresponding to the voiceprint feature of the verified voice signal, and if the first multi-dimensional vector is matched with the second multi-dimensional vector, the synthesized voice signal is matched with the verified voice signal; if not, determining that the synthesized voice signal is not matched with the verification voice signal;
the first multi-dimensional vector corresponding to the voiceprint features of the synthesized sound signal is composed of a Mel frequency cepstrum coefficient, a linear prediction cepstrum coefficient, a first order difference of the Mel frequency cepstrum coefficient, a first order difference of the linear prediction cepstrum coefficient, energy, a first order difference of the energy and a Gammatone filter cepstrum coefficient. In addition, the above embodiment can improve the accuracy of sound matching.
In the method described in fig. 5, the risk of leakage of the privacy image published on the group session interface of a group can be reduced based on the cross-group mechanism.
Referring to fig. 6, fig. 6 is a schematic diagram illustrating a change of a group session interface of a social application according to an embodiment of the present invention. In the first group conversation interface and the second group conversation interface shown in fig. 6, driving different avatars respectively represents different users in a group, and the same avatar represents the same user in the group. As shown in a of fig. 6, the social application may detect an overlay instruction input by a current user of the social application through a touch-down operation for any target image published on the first group conversation interface of the first group; as shown in B of fig. 6, after the social application verifies that the current user belongs to a valid user of the social application, according to the overlay instruction, the social application prompts to select any two users from the second group, where the sound signals are issued on the second group session interface of the second group, so as to form a first user pair; the current user of the social application can hook any two users who issue sound signals on the second group session interface, the two hooked users represent the two selected users, and the two users can form a first user pair; as shown in C in fig. 6, after the social application associates the first user pair with the target image, the target image may be overlaid with a preset non-private image on the first group conversation interface; wherein the first user pair is used as a first basis for removing the non-privacy image covered by the target image. In this way, the risk of leakage of the privacy image published on the group session interface of a certain group can be reduced based on the cross-group mechanism.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by hardware instructions of a program, and the program may be stored in a computer-readable storage medium, where the storage medium includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-Only Memory (CD-ROM), or other Memory, such as a magnetic disk, or a combination thereof, A tape memory, or any other medium readable by a computer that can be used to carry or store data.
The group display control method based on one-key triggering disclosed by the embodiment of the invention is described in detail, a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (9)

1. A group display control method based on one-key triggering, a first group being created in a social application, the method comprising:
the social application detects a touch operation of an image one-key hiding control button set on a first group conversation interface of the first group;
the social application determines, for each image published on the first group session interface, a unique publication location of the image on the first group session interface in response to a touch operation of the image-on-key hiding control button;
after the social application associates the unique posting location of each image with the image, transferring all images posted on the first group conversation interface to an encrypted folder designated by the social application for the first group, so that all images posted on the first group conversation interface are hidden;
the method further comprises the following steps:
after all images published on the first group conversation interface by the social application are hidden, controlling the image one-key hiding control button arranged on the first group conversation interface to update into an image one-key display control button;
the social application detects touch operation of a current user on the image one-key display control button;
the social application verifies whether the current user belongs to a legal user of the social application, and if yes, the image is transferred to the unique publishing position of the image associated with the image on the first group session interface for publishing aiming at each image transferred to the encrypted folder;
after all images in the encrypted folder of the social application are transferred to the first group session interface for publication, controlling the image one-key display control button to update to the image one-key hidden control button;
the social application verifying whether the current user belongs to a valid user of the social application comprises:
the social application collects color information of a face image of a current user;
the social application carries out binarization processing on the color information of the face image of the current user;
the social application divides the face image of the current user after binarization processing into a plurality of pixel blocks, and performs OR operation on pixel values corresponding to all pixels in each pixel block to obtain an OR operation result of each pixel block to form a down-sampling image of the face image of the current user;
the social application divides the obtained down-sampling image into a plurality of pixel areas, and obtains the characteristic information of each pixel area forming the face image of the current user by summing the OR operation results of all pixel points in each pixel area;
the social application judges whether the face image of the current user is matched with the face image of a legal user stored in advance by the social application according to the characteristic information of each pixel region of the face image of the current user;
if the input refined fingerprint image is matched with the input refined fingerprint image, the social application carries out pretreatment on the fingerprint touching image of the image one-key display control button, and the pretreatment comprises image segmentation, image enhancement, image binarization and refinement treatment on the fingerprint touching image respectively to obtain the input refined fingerprint image;
the social application extracts fingerprint minutiae from an input thinned fingerprint image, tracks the input thinned fingerprint image, extracts sampling points on ridge lines in the input thinned fingerprint image, extracts convex hulls of the sampling points of the input thinned fingerprint image, and generates input fingerprint characteristics containing the fingerprint minutiae, all the sampling points on the ridge lines and the convex hulls of the sampling points;
the social application identifies whether the input fingerprint features are matched with fingerprint features of a legal user stored in advance by the social application;
if so, determining that the current user belongs to a legal user of the social application;
and if not, determining that the current user does not belong to a legal user of the social application.
2. The group display control method according to claim 1, wherein a second group associated with the first group is also created in the social application, and after the controlling the image-on-display control button is updated to the image-on-hide control button, the method further comprises:
the social application detecting an overlay instruction input for any target image published on the first group conversation interface;
the social application prompts any two users which are issued with sound signals on a second group conversation interface of the second group to be selected from the second group associated with the first group according to the covering instruction so as to form a first user pair;
the social application associating the first user pair with the target image and overlaying the target image with a preset non-private image on the first group session interface; wherein the first user pair is used as a first basis for removing the non-private image which covers the target image.
3. The group display control method according to claim 2, wherein the social application, after overlaying the target image with a preset non-private image on the first group session interface, further comprises:
the social application detecting a removal instruction for the non-private image on the first group session interface that has overlaid the target image;
the social application prompts any two users to be selected from the second group according to the removing instruction so as to form a second user pair;
the social application determining whether the selected second user pair is the same as the first user pair serving as a first basis for removing the non-private image that has covered the target image;
if the first group conversation interface is the same as the second group conversation interface, the social application removes the non-privacy image which is covered by the target image on the first group conversation interface so as to redisplay the target image.
4. The group display control method according to claim 3, wherein after the social application associates the first user pair with the target image and before overlaying the target image with a preset non-private image on the first group session interface, the method further comprises:
the social application prompting selection of a first audio signal posted by the first user to one of the included users from the first group conversation interface and prompting selection of a second audio signal posted by the first user to another of the included users from the first group conversation interface;
the social application synthesizes the selected first sound signal and the second sound signal to obtain a verification sound signal;
the social application associating the verification sound signal with the target image and executing the step of overlaying the target image with a preset non-private image on the first group conversation interface; wherein the verification sound signal serves as a second basis for removing the non-private image that has covered the target image;
after the social application determines that the second user pair is the same as the first user pair that is a first basis for removing the non-private image that has overlaid the target image, and before the social application removes the non-private image that has overlaid the target image on the first group session interface to redisplay the target image, the method further comprises:
the social application prompts to select a third sound signal issued by one user included in the second user pair from the second group conversation interface and prompts to select a fourth sound signal issued by another user included in the second user pair from the second group conversation interface;
the social application synthesizes the selected third sound signal and the selected fourth sound signal to obtain a synthesized sound signal;
the social application determines whether the synthesized sound signal matches the verification sound signal that is a second basis for removing the non-private image that has overlaid the target image, and if so, performs the step of removing the non-private image that has overlaid the target image on the first group conversation interface to redisplay the target image.
5. The group display control method according to claim 4, wherein the social application synthesizing the selected first sound signal and the second sound signal to obtain a verification sound signal comprises:
the social application determining an alignment point between the selected first sound signal and the second sound signal; wherein the alignment point refers to a starting position of the synthesis of the first sound signal and the second sound signal;
the social application synthesizes the first sound signal and the second sound signal into a verification sound signal according to the alignment point.
6. The group display control method of claim 5, wherein the social application determining the alignment point between the first sound signal and the second sound signal comprises:
the social application calculates a first time length of the selected first sound signal and a second time length of the second sound signal; wherein the first duration represents a duration of sound of the first sound signal; the second time duration represents a time duration of sound of the second sound signal;
the social application calculating a difference between the first duration and the second duration;
and the social application judges whether the difference value is smaller than or equal to a preset value, if so, any sound signal in the first sound signal and the second sound signal is subjected to periodic scaling to obtain the first sound signal and the second sound signal with the same final duration, and then the first audio frame of the first sound signal and the first audio frame of the second sound signal with the same final duration are used as an alignment point.
7. The group display control method of claim 6, wherein the social application periodically scaling either one of the first sound signal and the second sound signal comprises:
if the first time length of the first sound signal is shorter than the second time length of the second sound signal, the social application determines a ratio X of the difference value to the first time length of the first sound signal according to the difference value;
the social application calculates the audio frame number Y of the first sound signal;
the social application calculates a magnification factor Z, which is X (Y/(Y-1));
and the social application amplifies other audio frames except the first audio frame in the first sound signal in an equal proportion according to the amplification factor, so that the final duration of the amplified first sound signal is the same as the second duration of the second sound signal.
8. The group display control method according to claim 6 or 7, wherein if the difference is greater than the predetermined value, the method further comprises:
the social application respectively samples the first sound signal and the second sound signal by using the same default sampling frequency to obtain a first sampling group and a second sampling group;
the social application generates a cross-correlation group according to the default sampling frequency, the first sampling group, the second sampling group and a cross-correlation weight; wherein the cross-correlation weight is positively correlated with the difference, and the cross-correlation group comprises a plurality of values;
the social application compares the plurality of values in the cross-correlation group to find a maximum value;
the social application uses the audio frame position corresponding to the maximum value as an alignment point.
9. The group display control method of claim 8, wherein the social application generating the cross-correlation set according to the default sampling frequency, the first sampling set, the second sampling set, and the cross-correlation weight comprises:
Figure FDA0003140045890000061
wherein S isn[t]Representing a set of cross-correlations, x [ m ]]Representing the mth sample data in the first sample group, y [ m-t ]]Represents the (m-t) th sampling data in the second sampling group, t represents the offset of time, t is an integer and takes the value from 0 to m, WtAnd representing a window function, wherein n is l f, l is a cross-correlation weight, and f is the default sampling frequency.
CN201810703574.3A 2018-07-01 2018-07-01 Group display control method based on one-key triggering Active CN109002728B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810703574.3A CN109002728B (en) 2018-07-01 2018-07-01 Group display control method based on one-key triggering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810703574.3A CN109002728B (en) 2018-07-01 2018-07-01 Group display control method based on one-key triggering

Publications (2)

Publication Number Publication Date
CN109002728A CN109002728A (en) 2018-12-14
CN109002728B true CN109002728B (en) 2021-12-10

Family

ID=64601014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810703574.3A Active CN109002728B (en) 2018-07-01 2018-07-01 Group display control method based on one-key triggering

Country Status (1)

Country Link
CN (1) CN109002728B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455770A (en) * 2013-08-18 2013-12-18 苏州量跃信息科技有限公司 Method and terminal for blanking data contents through touch screen
CN104244075A (en) * 2014-08-29 2014-12-24 形山科技(深圳)有限公司 Media information sharing method and system
CN104333449A (en) * 2014-09-29 2015-02-04 形山科技(深圳)有限公司 Picture encryption method and system
CN106503584A (en) * 2016-10-26 2017-03-15 腾讯科技(深圳)有限公司 A kind of session content methods of exhibiting and system
CN106874787A (en) * 2017-01-20 2017-06-20 维沃移动通信有限公司 A kind of image viewing method and mobile terminal
CN106909855A (en) * 2017-03-24 2017-06-30 腾讯科技(深圳)有限公司 File hiding method and device
CN107591149A (en) * 2017-09-18 2018-01-16 腾讯音乐娱乐科技(深圳)有限公司 Audio synthetic method, device and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150302218A1 (en) * 2014-04-22 2015-10-22 Pacid Technologies, Llc Method and system for file hiding

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455770A (en) * 2013-08-18 2013-12-18 苏州量跃信息科技有限公司 Method and terminal for blanking data contents through touch screen
CN104244075A (en) * 2014-08-29 2014-12-24 形山科技(深圳)有限公司 Media information sharing method and system
CN104333449A (en) * 2014-09-29 2015-02-04 形山科技(深圳)有限公司 Picture encryption method and system
CN106503584A (en) * 2016-10-26 2017-03-15 腾讯科技(深圳)有限公司 A kind of session content methods of exhibiting and system
CN106874787A (en) * 2017-01-20 2017-06-20 维沃移动通信有限公司 A kind of image viewing method and mobile terminal
CN106909855A (en) * 2017-03-24 2017-06-30 腾讯科技(深圳)有限公司 File hiding method and device
CN107591149A (en) * 2017-09-18 2018-01-16 腾讯音乐娱乐科技(深圳)有限公司 Audio synthetic method, device and storage medium

Also Published As

Publication number Publication date
CN109002728A (en) 2018-12-14

Similar Documents

Publication Publication Date Title
CN109450850B (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN105528606B (en) Area recognizing method and device
CN105654033B (en) Face image verification method and device
US20030108240A1 (en) Method and apparatus for automatic face blurring
JP2020522764A (en) Biological detection method and device, system, electronic device, storage medium
AU2020309090A1 (en) Image processing methods and apparatuses, electronic devices, and storage media
CN111524521A (en) Voiceprint extraction model training method, voiceprint recognition method, voiceprint extraction model training device, voiceprint recognition device and voiceprint recognition medium
CN106557755B (en) Fingerprint template acquisition method and device
CN108762494A (en) Show the method, apparatus and storage medium of information
CN109034150B (en) Image processing method and device
CN106409317B (en) Method and device for extracting dream speech
CN107945806B (en) User identification method and device based on sound characteristics
CN111160928A (en) Identity verification method and device
CN114127801A (en) System and method for using people identifiability across device networks
CN110931028A (en) Voice processing method and device and electronic equipment
CN106980836B (en) Identity verification method and device
CN114998955A (en) Face recognition method and device, storage medium and electronic equipment
JP7240445B2 (en) AUDIO PROCESSING METHOD, APPARATUS, TERMINAL AND STORAGE MEDIUM
CN109002728B (en) Group display control method based on one-key triggering
CN108574781B (en) Image processing method applied to instant messaging client dialogue record
CN113113044A (en) Audio processing method and device, terminal and storage medium
CN108959887B (en) Group control method applied to instant communication client
CN108833257B (en) Picture covering method applied to group
CN109165533B (en) Anti-peeping method of short video based on cross-group mechanism
CN111507131A (en) Living body detection method and apparatus, electronic device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211124

Address after: 518057 3001, building 1, Dachong Business Center (phase II), No. 9680, Shennan Avenue, Dachong community, Yuehai street, Nanshan District, Shenzhen, Guangdong

Applicant after: Shenzhen aichat Technology Co.,Ltd.

Address before: Room 403, No.35, Sanxiang, xiashou new village, Xicheng District, Dongguan City, Guangdong Province 523073

Applicant before: DONGGUAN HUARUI ELECTRONIC TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant