CN109165494A - Privacy content guard method and terminal - Google Patents
Privacy content guard method and terminal Download PDFInfo
- Publication number
- CN109165494A CN109165494A CN201811075510.XA CN201811075510A CN109165494A CN 109165494 A CN109165494 A CN 109165494A CN 201811075510 A CN201811075510 A CN 201811075510A CN 109165494 A CN109165494 A CN 109165494A
- Authority
- CN
- China
- Prior art keywords
- private file
- expression information
- information
- unlock
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Abstract
The present invention provides a kind of privacy content guard method and terminal, the privacy content guard method is applied to terminal, and the privacy content guard method includes: to receive access request instruction;Judge functional module corresponding with access request instruction with the presence or absence of in private file folder;When the functional module is pressed from both sides there are the private file, then expression unlocking function is activated;When the functional module is pressed from both sides there is no the private file, then allow to access the functional module.A kind of privacy content guard method provided by the invention and terminal; enable to user can be at any time; the content for the browsing private file underedge stayed calm and collected; it is manually operated without user; just it is able to achieve unlock; to prevent other people from prying through unlocking pin in user's unlocking process, the safety of secret protection is improved, user experience is good.
Description
Technical field
The present invention relates to information protective technology field more particularly to a kind of privacy content guard method and terminals.
Background technique
As privacy of the people to mobile device requires higher and higher, private information is protected using application lock
The user of equal tools is also more and more.
The application lock of all mobile devices is all using cumbersome unlocking manner, such as in mobile device in the prior art
Setting in the numerical ciphers, the graphical passwords, fingerprint recognition etc. that provide, these unlocking manners require being manually entered for user
Or operation, and be easy to be known the unlocking pin of mobile device by other people, it is stolen a glance at there are the privacy content in mobile device
Risk causes bad user experience.
In view of the above-mentioned problems, those skilled in the art are seeking redress always.
Summary of the invention
In view of this, enabling to user in office the present invention provides a kind of privacy content guard method and terminal
When wait, the content for the browsing private file underedge stayed calm and collected, is manually operated without user, is able to achieve unlock, just to prevent
Other people pry through unlocking pin in user's unlocking process, improve the safety of secret protection, and user experience is good.
The present invention provides a kind of privacy content guard method, and the privacy content guard method is applied to terminal, described hidden
Private content protecting method includes: to receive access request instruction;Whether judge functional module corresponding with access request instruction
There are in private file folder;When the functional module is pressed from both sides there are the private file, then expression unlocking function is activated;Described
When functional module is pressed from both sides there is no the private file, then allow to access the functional module.
Specifically, before the step of reception access request instructs further include: receive secret protection instruction;Will with it is described
Secret protection instructs corresponding functional module to be added in private file folder.
Specifically, before the step of reception access request instructs further include: acquire image corresponding to the user in real time
Information;Image information in described image information and date library is compared and identifying processing obtains standard facial image;Benefit
The standard facial image is analyzed to establish skin detection with regional characteristics analysis algorithm;By the face characteristic
The face-image of template and the user carry out signature analysis, to obtain standard scale corresponding with the user based on the analysis results
Feelings information.
Specifically, described the standard facial image to be analyzed using regional characteristics analysis algorithm to establish face spy
The step of levying template includes: to extract portrait characteristic point from described image information using computer image processing technology;To described
Portrait characteristic point carries out biometric analysis to establish skin detection.
Specifically, described that the skin detection and the face-image of the user are subjected to signature analysis, with basis
After the step of analysis result obtains standard expression information corresponding with the user further include: receive expression record command;Root
Facial expression image corresponding to the user is obtained according to the expression record command;By the facial expression image and the standard expression information into
Row comparison processing, to obtain the difference characteristic information between the facial expression image and the standard expression information;According to the difference
Different characteristic information and the facial expression image handle to obtain unlock expression information;The unlock expression information is stored to database
In.
Specifically, before the step of reception access request instructs further include: receive corresponding with private file folder
Unlock be arranged instruction;It obtains the unlock setting and instructs included difference characteristic information;According to the difference characteristic information
The unlock expression information of the private file folder is set.
Specifically, described when the functional module is pressed from both sides there are the private file, then activate the step of expression unlocking function
After rapid further include: obtain facial expression information corresponding to the user in real time;Judge the facial expression information whether meet with
The private file presss from both sides corresponding unlock expression information;Meet in the facial expression information corresponding with private file folder
When unlocking expression information, then the private file folder, and access function module are shown;The facial expression information do not meet with
When the private file presss from both sides corresponding unlock expression information, then the hidden state of the private file folder is kept.
Specifically, described to meet unlock expression information corresponding with private file folder in the facial expression information
When, then after the step of showing private file folder further include: receive corresponding with functional module exit instruction;According to
The exit instruction exits the functional module, and private file folder corresponding with the functional module is restored to hiding shape
State.
Specifically, described to judge whether the facial expression information meets unlock expression corresponding with private file folder
The step of information includes: that processing is compared with standard expression information in the facial expression information, to obtain and the face
The matching score of the corresponding difference characteristic information of expression information;It is corresponding to be located at the unlock expression information in the matching score
When in the matching score regional scope that difference characteristic information is constituted, then determine that the facial expression information meets and the privacy
The corresponding unlock expression information of file;It is located at the corresponding difference characteristic information of the unlock expression information in the matching score
When except the matching score regional scope constituted, then determine that the facial expression information is not met and private file folder pair
The unlock expression information answered.
The present invention also provides a kind of terminals, comprising: memory, for storing executable program code;And processor, it uses
In calling the executable program code in the memory, to realize such as above-mentioned privacy content guard method.
Specifically, privacy content guard method provided in this embodiment and terminal, by receiving access request instruction, judgement
Functional module corresponding with access request instruction whether there is in private file folder, in functional module, there are private file folders
When, then activate expression unlocking function;And when functional module is pressed from both sides there is no private file, then allow access function module, thus
Enable to user can at any time, the content for the browsing private file underedge stayed calm and collected is manually operated without user,
Just it is able to achieve unlock, to prevent other people from prying through unlocking pin in user's unlocking process, improves the safety of secret protection, is used
It experiences at family.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the invention can
It is clearer and more comprehensible, it is special below to lift preferred embodiment, and cooperate attached drawing, detailed description are as follows.
Detailed description of the invention
Fig. 1 is the flow diagram of the privacy content guard method of first embodiment of the invention;
Fig. 2 is the flow diagram of the privacy content guard method of second embodiment of the invention;
Fig. 3 is the flow diagram of the privacy content guard method of third embodiment of the invention;
Fig. 4 is the flow diagram of the privacy content guard method of fourth embodiment of the invention;
Fig. 5 is the flow diagram of the privacy content guard method of fifth embodiment of the invention;
Fig. 6 is the flow diagram of the privacy content guard method of sixth embodiment of the invention;
Fig. 7 is the flow diagram of the privacy content guard method of seventh embodiment of the invention;
Fig. 8 is the flow diagram of the privacy content guard method of eighth embodiment of the invention;
Fig. 9 is the flow diagram of the privacy content guard method of ninth embodiment of the invention;
Figure 10 is the structural block diagram of the terminal of tenth embodiment of the invention.
Specific embodiment
It is of the invention to reach the technical means and efficacy that predetermined goal of the invention is taken further to illustrate, below in conjunction with
Attached drawing and preferred embodiment, the present invention is described in detail as follows.
Fig. 1 is the flow diagram of the privacy content guard method of first embodiment of the invention.The present embodiment is held for terminal
Capable privacy content guard method.As shown in Figure 1, the privacy content guard method of the present embodiment can comprise the following steps that
Step S11: access request instruction is received.
Specifically, in one embodiment, functional module of the user in triggering terminal, to request access to the functional module
When, terminal receives access request instruction.Wherein, access request instruction includes the access request of corresponding functional module.
Step S12: judgement functional module corresponding with access request instruction is with the presence or absence of in private file folder.
Specifically, in one embodiment, terminal judges corresponding function in the access request instruction for receiving user's triggering
Energy module whether there is in private file folder.Specifically, private file folder can be pre- for corresponding functional module for user
First it is arranged, and the functional module of expectation protection can be added in corresponding private file folder, protects in the functional module
Appearance is not pried through by other users.
Specifically, S13 is thened follow the steps there are when private file folder in functional module.Privacy is not present in functional module
When file, S14 is thened follow the steps.
Step S13: activation expression unlocking function.
Specifically, in one embodiment, in functional module there are when private file folder, terminal is activated and the functional module
Expression unlocking function, and control the functional module and enter in access waiting, such as the User Page of terminal shows the function mould
In the load of block, until terminal recognition to user facial expression be preset unlock expression information, directly access the function mould
Block promotes user experience to improve the unlocking information for avoiding other people from knowing user of the privacy content of user.
Step S14: allow access function module.
Specifically, in one embodiment, when functional module is pressed from both sides there is no private file, terminal is directly in response to access request
Instruction is to access the functional module, and at this moment terminal will not activate expression unlocking function, to promote user experience.
Specifically, in one embodiment, functional module can be, but not limited to load application program at the terminal, figure
Piece, audio-frequency information, video information, text information or browser usage record etc..Specifically, user can be in the desktop of terminal
Be arranged private file press from both sides, will expectation protection application program be added to private file folder in, such as user can by wechat,
QQ, it obtains etc. application and is added to different or identical private file folder, to carry out secret protection to these application programs.Tool
Body, private file folder only have establish for the first time and unlock after can see, other when be held in hidden state, and be present in
Application program in private file is existed simultaneously on the desktop of terminal, is user's visible state.Specifically, in an embodiment
In, private file folder can also be arranged in the application, such as user can be hidden to the progress of the partial content in application program
Private protection.Specifically, user can establish private file folder in the user interface of application program, and the content of expectation protection is added
Into private file folder, such as the browsing in browser can be recorded automatic or manual and is added in private file by user, or
Person user can establish private file folder in wechat user interface, and corresponding chat record or good friend are added to privacy text
Protect in part folder etc..
Referring to FIG. 2, Fig. 2 is the flow diagram of the privacy content guard method of second embodiment of the invention.As Fig. 1 with
Shown in Fig. 2, privacy content guard method provided in this embodiment, receiving the step of access request instructs further includes before following step
It is rapid:
Step S21: secret protection instruction is received.
Step S22: functional module corresponding with secret protection instruction is added in private file folder.
Specifically, in one embodiment, user can be, but not limited to trigger corresponding functional module with hidden to terminal input
Private protection instruction, such as the combination that user can press and/or click according to default gesture trigger the hidden of the functional module
Private protection instruction.Specifically, after terminal receives secret protection instruction, functional module corresponding with secret protection instruction is added
To private file folder in, for example, user newly-built private file press from both sides after, can be by dragging sliding mode to add the application program of desktop
It is added in private file folder or user corresponding functional module can be arranged in corresponding privacy in the set interface of terminal
In file, to carry out secret protection to functional module, user experience is promoted.
Specifically, in one embodiment, private file folder is established in functional module, user can be expectation protection
Privacy content is moved in private file folder, and expression is arranged for the unlocking manner of this document folder and locks.User is arranged by terminal
The unlock expression that the private file is pressed from both sides in the functional module.The difference of terminal extract real-time unlock expression information and standard expression information
Different information, to unlock the private file folder of corresponding functional module using different information.Specifically, enter in user and be provided with table
After the functional module of feelings lock, terminal changes according to the facial expression of user, with the expression information after facial expression changes
After meeting the unlock expression of the private file folder definition, private file folder is then shown.Meet definition if do not detected
Expression, private file folder do not show then.And after user exits the functional module, then private file folder is restored to hiding shape
State, so that user can at any time, the content for the browsing private file underedge stayed calm and collected prevents other people in user
Unlocking pin is pried through in unlocking process, improves the safety of secret protection.
Referring to FIG. 3, Fig. 3 is the flow diagram of the privacy content guard method of third embodiment of the invention.As Fig. 1 with
Shown in Fig. 3, privacy content guard method provided in this embodiment, receiving the step of access request instructs further includes before following step
It is rapid:
Step S31: image information corresponding to the user is acquired in real time.
Specifically, in one embodiment, terminal can with but be not limited by the face that front camera acquires user in real time
Portion's image information.
Step S32: image information is compared with the image information in database and identifying processing obtains standard facial
Image.
Specifically, in one embodiment, terminal compares the image information in acquired image information and date library
It is right, and identifying processing is carried out to the image information in acquired image information and date library using image recognition technology, thus
Obtain standard facial image corresponding with the user of terminal.Specifically, in one embodiment, standard facial image is user in day
The often facial expression information under natural conditions in life.
Specifically, in one embodiment, terminal acquires the facial image information of user in real time, and facial image information is deposited
Storage is into database, with the signature analysis of the facial image information to a large amount of user in database, to obtain the mark of user
Quasi- face-image.
Step S33: standard facial image is analyzed to establish skin detection using regional characteristics analysis algorithm.
Specifically, in one embodiment, terminal using regional characteristics analysis algorithm to standard facial image analyzed with
Mathematical model corresponding with the facial image information of user is established, and face characteristic corresponding to the user is constructed according to mathematical model
Template.
Step S34: skin detection and the face-image of user are subjected to signature analysis, to obtain based on the analysis results
Standard expression information corresponding to the user.
Specifically, in one embodiment, the face-image of face characteristic module and user are carried out signature analysis by terminal, with
The similar value of face characteristic module and the face-image of user is provided, based on the analysis results to be greater than preset similarity value in similar value
When, construct the standard expression information of user.Specifically, preset similarity value can be, but not limited to be set as 90 percent, such as
Preset similarity value may be arranged as can be set to than 90 percent higher or lower percentage value, such as preset similarity value
Percentage value 98 or 85 etc. percent, so as to promote the unlock accuracy that the expression of terminal is locked.
Specifically, in one embodiment, the facial characteristics and existing common face that terminal has each facial expression image
Information compares, to judge difference characteristic information, for example, terminal can build the face image data of registration storage
The feature for extracting face is generated skin detection to extract the feature of face by mould, and skin detection is saved in data
In library.Specifically, in the new facial expression information of user's typing, by the standard expression of new facial expression information and database
The face characteristic of information compares, and saves according to the difference for comparing output as differences, using as unlock
Judgment basis.
Referring to FIG. 4, Fig. 4 is the flow diagram of the privacy content guard method of fourth embodiment of the invention.As Fig. 3 with
Shown in Fig. 4, privacy content guard method provided in this embodiment carries out standard facial image using regional characteristics analysis algorithm
Analysis to establish skin detection the step of specifically includes the following steps:
Step S41: portrait characteristic point is extracted from image information using computer image processing technology.
Step S42: biometric analysis is carried out to establish skin detection to portrait characteristic point.
Specifically, in one embodiment, recognition of face is the face-image for obtaining identification object in a non-contact manner, eventually
Identification process is completed after being compared after obtaining image information with the image information in database in end.Specifically, implement one
In mode, regional characteristics analysis algorithm fusion computer image processing technology and biostatistics principle, terminal is using calculating
Machine image processing techniques extracts portrait characteristic point from video or image information, and the principle of biostatistics is then recycled to carry out
Founding mathematical models are analyzed, to construct skin detection by mathematical model.
Referring to FIG. 5, Fig. 5 is the flow diagram of the privacy content guard method of fifth embodiment of the invention.As Fig. 3 with
Shown in Fig. 5, skin detection and the face-image of user are carried out feature by privacy content guard method provided in this embodiment
Analysis, the step of to obtain standard expression information corresponding to the user based on the analysis results after it is further comprising the steps of:
Step S51: expression record command is received.
Specifically, in one embodiment, user can record facial expression image information according to hobby, to input expression to terminal
Record command.Specifically, user can be by terminal recorded video information, to change different expressions in recording process.
Step S52: facial expression image corresponding to the user is obtained according to expression record command.
Specifically, in one embodiment, terminal according to expression record command obtain user input comprising different expressions
Video information handles to obtain different facial expression image corresponding to the user to carry out recognition of face to video information.
Step S53: processing is compared with standard expression information in facial expression image, to obtain facial expression image and standard expression
Difference characteristic information between information.
Specifically, in one embodiment, each facial expression image that terminal can will acquire respectively with standard expression information
Processing is compared, to obtain the difference characteristic information between each facial expression image and standard expression information.
Step S54: it is handled to obtain unlock expression information according to difference characteristic information and facial expression image.
Specifically, in one embodiment, terminal is handled according to the corresponding facial expression image of each difference characteristic information
To corresponding unlock expression information.Specifically, in one embodiment, the tune of each unlock expression information can also be arranged in user
Coefficient is saved, terminal handles to obtain corresponding matching score regional scope according to adjustment factor to unlock expression information, so as to
User is promoted in the precision subsequently through facial expression unlock corresponding function module.
Step S55: unlock expression information is stored into database.
Specifically, in one embodiment, terminal stores all unlock expression informations into database, and corresponding record
In expression lock list, to facilitate user that can quickly select corresponding unlock expression information when subsequent setting private file is pressed from both sides
It is locked as expression, promotes user experience.
Referring to FIG. 6, Fig. 6 is the flow diagram of the privacy content guard method of sixth embodiment of the invention.As Fig. 1 with
Shown in Fig. 6, privacy content guard method provided in this embodiment, receiving the step of access request instructs further includes before following step
It is rapid:
Step S61: unlock setting instruction corresponding with private file folder is received.
Specifically, in one embodiment, user's triggering after establishing private file folder, which is unlocked private file folder, sets
Replacement setting can be carried out to the unlock expression information of the expression lock in private file folder by setting instruction or user, and at this moment terminal connects
Receive unlock setting instruction corresponding with private file folder.
Step S62: it obtains unlock setting and instructs included difference characteristic information.
Step S63: the unlock expression information that private file is pressed from both sides is arranged according to difference characteristic information.
Specifically, in one embodiment, unlock setting instruction is included at least with difference characteristic information, and terminal is according to difference spy
Reference ceases the unlock expression information corresponding from database lookup, the unlock expression information of private file folder is arranged, thus
When the expression of terminal recognition to user is unlock expression information, the content in private file folder could be accessed, protection user is hidden
Private improves the safety of privacy of user.
Specifically, in one embodiment, when user creates private file folder, terminal refers in reception unlock expression setting
After order, list is locked in user interface pop-up display expression, it is corresponding with unlock expression setting instruction to be obtained in expression lock list
The first expression lock.Terminal sets the first expression lock to the expression of private file folder corresponding with unlock expression setting instruction
Lock.
Referring to FIG. 7, Fig. 7 is the flow diagram of the privacy content guard method of seventh embodiment of the invention.As Fig. 6 with
It further include following step after functional module is there are the step of when private file folder, then activating expression unlocking function shown in Fig. 7
It is rapid:
Step S71: facial expression information corresponding to the user is obtained in real time.
Specifically, in one embodiment, terminal can be, but not limited to obtain face corresponding to the user in real time by camera
Portion's expression information.
Step S72: judge whether facial expression information meets unlock expression information corresponding with private file folder.
Specifically, in one embodiment, terminal is by the facial expression information of the user got in real time and the private file
It presss from both sides corresponding unlock expression information to be compared, to judge it is corresponding with private file folder whether facial expression information meets
Unlock expression information.
Specifically, it when facial expression information meets unlock expression information corresponding with private file folder, thens follow the steps
S73: when facial expression information does not meet unlock expression information corresponding with private file folder, S74 is thened follow the steps.
Step S73: display private file folder, and access function module.
Specifically, in one embodiment, meet unlock expression information corresponding with private file folder in facial expression information
When, terminal shows private file folder, and allows the access function module of user.
Step S74: the hidden state of private file is kept.
Specifically, in one embodiment, unlock expression letter corresponding with private file folder is not met in facial expression information
When breath, terminal keeps the hidden state of private file, and forbids user's access function module, to protect privacy content, thus real
No trace unlocking process now may be implemented to user's privacy content to be protected, other people is avoided to pry through the privacy content of user
Unlocking pin improves the safety of privacy of user content.
Specifically, in one embodiment, after user enters main interface using face unlock mobile device, user wants to browse
When the privacy information in the functional module that espressiove is locked is arranged in some, user can make preset before triggering the functional module
Expression, such as smile, serious etc. facial expression, when the facial expression of user meets the unlock expression letter that the functional module defines
When breath, such as when terminal monitoring is to different information with standard expression, then allow to access the functional module, and show user's
Privacy content, when user exits this in application, then continuing to hide privacy content.
Referring to FIG. 8, Fig. 8 is the flow diagram of the privacy content guard method of eighth embodiment of the invention.As Fig. 7 with
Shown in Fig. 8, privacy content guard method provided in this embodiment meets solution corresponding with private file folder in facial expression information
Lock expression information when, then show private file folder the step of after it is further comprising the steps of:
Step S81: exit instruction corresponding with functional module is received.
Step S82: restore extremely according to exit instruction exit function module, and by private file folder corresponding with functional module
Hidden state.
Specifically, in one embodiment, when user exits the functional module, terminal automatically presss from both sides the private file of display
Restore to hidden state, so that user can at any time, the content for the browsing private file underedge stayed calm and collected is prevented
Only other people pry through unlocking pin in user's unlocking process, improve the safety of secret protection.
Referring to FIG. 9, Fig. 9 is the flow diagram of the privacy content guard method of eighth embodiment of the invention.As Fig. 7 with
Shown in Fig. 9, privacy content guard method provided in this embodiment judges whether facial expression information meets and private file folder pair
The step of unlock expression information answered specifically includes the following steps:
Step S91: being compared processing with standard expression information for facial expression information, to obtain and facial expression information
The matching score of corresponding difference characteristic information.
Step S92: it is located at the matching score that the corresponding difference characteristic information of unlock expression information is constituted in matching score
When in regional scope, then determine that facial expression information meets unlock expression information corresponding with private file folder.
Step S93: it is located at the matching score that the corresponding difference characteristic information of unlock expression information is constituted in matching score
When except regional scope, then determine that facial expression information does not meet unlock expression information corresponding with private file folder.
Specifically, in one embodiment, the adjusting of the unlock expression information of corresponding private file folder can be set in user
Coefficient, terminal handles to obtain corresponding matching score regional scope according to adjustment factor to unlock expression information, so as to mention
User is risen in the precision subsequently through facial expression unlock corresponding function module.Specifically, terminal is matched by facial table
Processing is compared with standard expression information in feelings information, to obtain the matching of difference characteristic information corresponding with facial expression information
Score, and judge to match whether score is located in the corresponding matching score regional scope of private file folder, and then judge face
Whether expression information meets unlock expression information corresponding with private file folder, improves the precision of the expression unlock of terminal,
To promote user experience, allow the unlock that user is seamless, and different functional modules can be arranged different expressions into
Row unlock.
Referring to FIG. 10, Figure 10 is the structural block diagram of the terminal 100 of tenth embodiment of the invention.As shown in Figure 10, this reality
The terminal 100 for applying example offer includes memory 110 for executing privacy content guard method, terminal 100 provided in this embodiment
With processor 120.
Specifically, in the present embodiment, memory 110 is for storing executable program code.Processor 120 is for calling
Executable program code in memory, to realize that step performed by privacy content guard method includes: reception access request
Instruction;Judge functional module corresponding with access request instruction with the presence or absence of in private file folder;In functional module, there are privacies
When file, then expression unlocking function is activated;When functional module is pressed from both sides there is no private file, then allow access function module.
Specifically, in one embodiment, processor 120 also execute before executing the step of receiving access request instruction
Step includes: to receive secret protection instruction;Functional module corresponding with secret protection instruction is added in private file folder.
Specifically, in one embodiment, processor 120 also execute before executing the step of receiving access request instruction
Step includes: to acquire image information corresponding to the user in real time;Image information is compared with the image information in database
And identifying processing obtains standard facial image;Standard facial image is analyzed to establish people using regional characteristics analysis algorithm
Face feature templates;Skin detection and the face-image of user are subjected to signature analysis, to obtain and use based on the analysis results
The corresponding standard expression information in family.
Specifically, in one embodiment, processor 120 are executed using regional characteristics analysis algorithm to standard facial image
The step of the step of being analyzed to establish skin detection specifically executes includes: using computer image processing technology from figure
As extracting portrait characteristic point in information;Biometric analysis is carried out to establish skin detection to portrait characteristic point.
Specifically, in one embodiment, processor 120 execute and carry out skin detection and the face-image of user
Signature analysis, the step of to obtain standard expression information corresponding to the user based on the analysis results after the step of also executing packet
It includes: receiving expression record command;Facial expression image corresponding to the user is obtained according to expression record command;By facial expression image and standard
Processing is compared in expression information, to obtain the difference characteristic information between facial expression image and standard expression information;According to difference
Characteristic information and facial expression image handle to obtain unlock expression information;Unlock expression information is stored into database.
Specifically, in one embodiment, processor 120 also execute before executing the step of receiving access request instruction
Step includes: reception unlock setting instruction corresponding with private file folder;It obtains unlock setting and instructs included difference characteristic
Information;According to difference characteristic information, the unlock expression information that private file is pressed from both sides is set.
Specifically, in one embodiment, processor 120 execute in functional module there are when private file folder, then activate table
The step of also executing after the step of feelings unlocking function includes: to obtain facial expression information corresponding to the user in real time;Judgement face
Whether portion's expression information meets unlock expression information corresponding with private file folder;Meet and private file in facial expression information
When pressing from both sides corresponding unlock expression information, then show that private file is pressed from both sides, and access function module;Facial expression information do not meet with
When private file presss from both sides corresponding unlock expression information, then the hidden state of private file folder is kept.
Specifically, in one embodiment, processor 120, execution meet corresponding with private file folder in facial expression information
Unlock expression information when, then show private file folder the step of after also execute the step of include: reception and functional module pair
The exit instruction answered;Restore according to exit instruction exit function module, and by private file folder corresponding with functional module to hidden
Hiding state.
Specifically, in one embodiment, processor 120, execution judge whether facial expression information meets and private file
The step of the step of pressing from both sides corresponding unlock expression information specifically executes includes: to carry out facial expression information and standard expression information
Comparison processing, to obtain the matching score of difference characteristic information corresponding with facial expression information;It is located at unlock in matching score
When in the matching score regional scope that the corresponding difference characteristic information of expression information is constituted, then determine that facial expression information meets
Unlock expression information corresponding with private file folder;It is located at the corresponding difference characteristic information institute of unlock expression information in matching score
When except the matching score regional scope of composition, then determine that facial expression information does not meet unlock table corresponding with private file folder
Feelings information.
The present embodiment realizes the detailed process of respective function to each functional unit of terminal 100, refers to above-mentioned Fig. 1 to figure
Particular content described in 9 illustrated embodiments, details are not described herein.
Specifically, privacy content guard method provided in this embodiment and terminal, by receiving access request instruction, judgement
Functional module corresponding with access request instruction whether there is in private file folder, in functional module, there are private file folders
When, then activate expression unlocking function;And when functional module is pressed from both sides there is no private file, then allow access function module, thus
Enable to user can at any time, the content for the browsing private file underedge stayed calm and collected is manually operated without user,
Just it is able to achieve unlock, to prevent other people from prying through unlocking pin in user's unlocking process, improves the safety of secret protection, is used
It experiences at family.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium, it is executable to be stored with computer
Instruction, above-mentioned computer readable storage medium is, for example, nonvolatile memory such as CD, hard disk or flash memory.It is above-mentioned
Computer executable instructions for allowing computer or similar arithmetic unit to complete in above-mentioned privacy content guard method
Various operations.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For terminal class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
Claims (10)
1. a kind of privacy content guard method, which is characterized in that the privacy content guard method is applied to terminal, the privacy
Content protecting method includes:
Receive access request instruction;
Judge functional module corresponding with access request instruction with the presence or absence of in private file folder;
When the functional module is pressed from both sides there are the private file, then expression unlocking function is activated;
When the functional module is pressed from both sides there is no the private file, then allow to access the functional module.
2. privacy content guard method as described in claim 1, which is characterized in that the step of reception access request instructs
Before further include:
Receive secret protection instruction;
Functional module corresponding with secret protection instruction is added in private file folder.
3. privacy content guard method as described in claim 1, which is characterized in that the step of reception access request instructs
Before further include:
Image information corresponding to the user is acquired in real time;
Image information in described image information and date library is compared and identifying processing obtains standard facial image;
The standard facial image is analyzed to establish skin detection using regional characteristics analysis algorithm;
The face-image of the skin detection and the user are subjected to signature analysis, to obtain based on the analysis results and institute
State the corresponding standard expression information of user.
4. privacy content guard method as claimed in claim 3, which is characterized in that described to utilize regional characteristics analysis algorithm pair
The step of standard facial image is analyzed to establish skin detection include:
Portrait characteristic point is extracted from described image information using computer image processing technology;
Biometric analysis is carried out to establish skin detection to the portrait characteristic point.
5. privacy content guard method as claimed in claim 3, which is characterized in that described by the skin detection and institute
The face-image for stating user carries out signature analysis, to obtain standard expression information corresponding with the user based on the analysis results
After step further include:
Receive expression record command;
Facial expression image corresponding to the user is obtained according to the expression record command;
Processing is compared with the standard expression information in the facial expression image, to obtain the facial expression image and the standard
Difference characteristic information between expression information;
It is handled to obtain unlock expression information according to the difference characteristic information and the facial expression image;
The unlock expression information is stored into database.
6. privacy content guard method as described in claim 1, which is characterized in that the step of reception access request instructs
Before further include:
Receive unlock setting instruction corresponding with private file folder;
It obtains the unlock setting and instructs included difference characteristic information;
The unlock expression information of the private file folder is set according to the difference characteristic information.
7. privacy content guard method as claimed in claim 6, which is characterized in that it is described the functional module exist described in
When private file is pressed from both sides, then after the step of activating expression unlocking function further include:
Facial expression information corresponding to the user is obtained in real time;
Judge whether the facial expression information meets unlock expression information corresponding with private file folder;
When the facial expression information meets unlock expression information corresponding with private file folder, then the privacy is shown
File, and access function module;
When the facial expression information does not meet unlock expression information corresponding with private file folder, then keep described hidden
The hidden state of private file.
8. privacy content guard method as claimed in claim 7, which is characterized in that described to meet in the facial expression information
When unlock expression information corresponding with private file folder, then show the private file folder the step of after further include:
Receive exit instruction corresponding with the functional module;
The functional module is exited according to the exit instruction, and private file folder corresponding with the functional module is restored extremely
Hidden state.
9. privacy content guard method as claimed in claim 7, which is characterized in that described to judge that the facial expression information is
No the step of meeting unlock expression information corresponding with private file folder includes:
Processing is compared with standard expression information in the facial expression information, it is corresponding with the facial expression information to obtain
Difference characteristic information matching score;
It is located at the matching score region that the corresponding difference characteristic information of the unlock expression information is constituted in the matching score
When in range, then determine that the facial expression information meets unlock expression information corresponding with private file folder;
It is located at the matching score region that the corresponding difference characteristic information of the unlock expression information is constituted in the matching score
When except range, then determine that the facial expression information does not meet unlock expression information corresponding with private file folder.
10. a kind of terminal, which is characterized in that the terminal includes:
Memory, for storing executable program code;And
Processor, for calling the executable program code in the memory, to realize as appointed in claim 1 to 9
Privacy content guard method described in one.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811075510.XA CN109165494A (en) | 2018-09-14 | 2018-09-14 | Privacy content guard method and terminal |
PCT/CN2019/085361 WO2020052246A1 (en) | 2018-09-14 | 2019-04-30 | Privacy content protection method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811075510.XA CN109165494A (en) | 2018-09-14 | 2018-09-14 | Privacy content guard method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109165494A true CN109165494A (en) | 2019-01-08 |
Family
ID=64879137
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811075510.XA Pending CN109165494A (en) | 2018-09-14 | 2018-09-14 | Privacy content guard method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109165494A (en) |
WO (1) | WO2020052246A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020052246A1 (en) * | 2018-09-14 | 2020-03-19 | 深圳市泰衡诺科技有限公司 | Privacy content protection method and terminal |
US11163988B2 (en) * | 2019-12-02 | 2021-11-02 | International Business Machines Corporation | Selective interactive event tracking based on user interest |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102946481A (en) * | 2012-11-13 | 2013-02-27 | 广东欧珀移动通信有限公司 | Method and system for unlocking human face expression |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
US20140050408A1 (en) * | 2012-08-14 | 2014-02-20 | Samsung Electronics Co., Ltd. | Method for on-the-fly learning of facial artifacts for facial emotion recognition |
CN105335662A (en) * | 2015-09-30 | 2016-02-17 | 北京金山安全软件有限公司 | Method, device and equipment for hiding information |
CN105512547A (en) * | 2016-02-25 | 2016-04-20 | 上海斐讯数据通信技术有限公司 | Intelligent terminal privacy protection method and intelligent terminal privacy protection system |
CN106203038A (en) * | 2016-06-30 | 2016-12-07 | 维沃移动通信有限公司 | A kind of unlocking method and mobile terminal |
CN106446619A (en) * | 2016-09-29 | 2017-02-22 | 努比亚技术有限公司 | Method for processing application and terminal |
CN107402763A (en) * | 2017-07-27 | 2017-11-28 | 深圳市泰衡诺科技有限公司 | A kind of icon control method and control system based on intelligent terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102509053A (en) * | 2011-11-23 | 2012-06-20 | 唐辉 | Authentication and authorization method, processor, equipment and mobile terminal |
CN105787320A (en) * | 2014-12-19 | 2016-07-20 | 北京奇虎科技有限公司 | Private data intrusion detection method and apparatus |
CN105117628B (en) * | 2015-07-30 | 2018-02-02 | 广东欧珀移动通信有限公司 | Control method, device and the corresponding mobile device that file is shown in a kind of terminal |
CN108052811A (en) * | 2017-11-27 | 2018-05-18 | 北京传嘉科技有限公司 | Terminal control method and system based on face texture identification |
CN109165494A (en) * | 2018-09-14 | 2019-01-08 | 深圳市泰衡诺科技有限公司 | Privacy content guard method and terminal |
-
2018
- 2018-09-14 CN CN201811075510.XA patent/CN109165494A/en active Pending
-
2019
- 2019-04-30 WO PCT/CN2019/085361 patent/WO2020052246A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140050408A1 (en) * | 2012-08-14 | 2014-02-20 | Samsung Electronics Co., Ltd. | Method for on-the-fly learning of facial artifacts for facial emotion recognition |
CN102946481A (en) * | 2012-11-13 | 2013-02-27 | 广东欧珀移动通信有限公司 | Method and system for unlocking human face expression |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
CN105335662A (en) * | 2015-09-30 | 2016-02-17 | 北京金山安全软件有限公司 | Method, device and equipment for hiding information |
CN105512547A (en) * | 2016-02-25 | 2016-04-20 | 上海斐讯数据通信技术有限公司 | Intelligent terminal privacy protection method and intelligent terminal privacy protection system |
CN106203038A (en) * | 2016-06-30 | 2016-12-07 | 维沃移动通信有限公司 | A kind of unlocking method and mobile terminal |
CN106446619A (en) * | 2016-09-29 | 2017-02-22 | 努比亚技术有限公司 | Method for processing application and terminal |
CN107402763A (en) * | 2017-07-27 | 2017-11-28 | 深圳市泰衡诺科技有限公司 | A kind of icon control method and control system based on intelligent terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020052246A1 (en) * | 2018-09-14 | 2020-03-19 | 深圳市泰衡诺科技有限公司 | Privacy content protection method and terminal |
US11163988B2 (en) * | 2019-12-02 | 2021-11-02 | International Business Machines Corporation | Selective interactive event tracking based on user interest |
Also Published As
Publication number | Publication date |
---|---|
WO2020052246A1 (en) | 2020-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9122913B2 (en) | Method for logging a user in to a mobile device | |
CN109165940B (en) | Anti-theft method and device and electronic equipment | |
US9773151B2 (en) | System and methods for contactless biometrics-based identification | |
WO2020024398A1 (en) | Biometrics-assisted payment method and apparatus, and computer device and storage medium | |
CN105975182B (en) | A kind of terminal operation method and terminal | |
US10846514B2 (en) | Processing images from an electronic mirror | |
Idrus et al. | Soft biometrics for keystroke dynamics | |
DE102013102399A1 (en) | Facial feature detection | |
US8983207B1 (en) | Mitigating replay attacks using multiple-image authentication | |
CN109472269A (en) | Characteristics of image configuration and method of calibration, device, computer equipment and medium | |
CN109165494A (en) | Privacy content guard method and terminal | |
CN108986342A (en) | A kind of recognition of face locker system based on cloud computing platform | |
US20110106700A1 (en) | Method, apparatus and program for performing personal authentication and inputting operation instruction on the basis of biometric information including posture information | |
CN110599187A (en) | Payment method and device based on face recognition, computer equipment and storage medium | |
CN108875335B (en) | Method for unlocking human face and inputting expression and expression action, authentication equipment and nonvolatile storage medium | |
Prasanthi et al. | Palm vein biometric technology: An approach to upgrade security in ATM transactions | |
JP6311237B2 (en) | Collation device and collation method, collation system, and computer program | |
TWI584146B (en) | Login system and method based on face recognition | |
CN107729795A (en) | A kind of information processing manner with face recognition | |
JPWO2015145727A1 (en) | Personal information acquisition system and personal information acquisition method | |
TWI771819B (en) | Authentication system, authentication device, authentication method, and program product | |
TWM556877U (en) | Login verification device and login verification system | |
EP3270313B1 (en) | Optical authorization method for programs and files | |
CN111353139A (en) | Continuous authentication method and device, electronic equipment and storage medium | |
CN114005208B (en) | Access control method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190108 |