CN109165494A - Privacy content guard method and terminal - Google Patents

Privacy content guard method and terminal Download PDF

Info

Publication number
CN109165494A
CN109165494A CN201811075510.XA CN201811075510A CN109165494A CN 109165494 A CN109165494 A CN 109165494A CN 201811075510 A CN201811075510 A CN 201811075510A CN 109165494 A CN109165494 A CN 109165494A
Authority
CN
China
Prior art keywords
private file
expression information
information
unlock
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811075510.XA
Other languages
Chinese (zh)
Inventor
钱文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Taihengnuo Technology Co Ltd
Original Assignee
Shenzhen Taihengnuo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Taihengnuo Technology Co Ltd filed Critical Shenzhen Taihengnuo Technology Co Ltd
Priority to CN201811075510.XA priority Critical patent/CN109165494A/en
Publication of CN109165494A publication Critical patent/CN109165494A/en
Priority to PCT/CN2019/085361 priority patent/WO2020052246A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The present invention provides a kind of privacy content guard method and terminal, the privacy content guard method is applied to terminal, and the privacy content guard method includes: to receive access request instruction;Judge functional module corresponding with access request instruction with the presence or absence of in private file folder;When the functional module is pressed from both sides there are the private file, then expression unlocking function is activated;When the functional module is pressed from both sides there is no the private file, then allow to access the functional module.A kind of privacy content guard method provided by the invention and terminal; enable to user can be at any time; the content for the browsing private file underedge stayed calm and collected; it is manually operated without user; just it is able to achieve unlock; to prevent other people from prying through unlocking pin in user's unlocking process, the safety of secret protection is improved, user experience is good.

Description

Privacy content guard method and terminal
Technical field
The present invention relates to information protective technology field more particularly to a kind of privacy content guard method and terminals.
Background technique
As privacy of the people to mobile device requires higher and higher, private information is protected using application lock The user of equal tools is also more and more.
The application lock of all mobile devices is all using cumbersome unlocking manner, such as in mobile device in the prior art Setting in the numerical ciphers, the graphical passwords, fingerprint recognition etc. that provide, these unlocking manners require being manually entered for user Or operation, and be easy to be known the unlocking pin of mobile device by other people, it is stolen a glance at there are the privacy content in mobile device Risk causes bad user experience.
In view of the above-mentioned problems, those skilled in the art are seeking redress always.
Summary of the invention
In view of this, enabling to user in office the present invention provides a kind of privacy content guard method and terminal When wait, the content for the browsing private file underedge stayed calm and collected, is manually operated without user, is able to achieve unlock, just to prevent Other people pry through unlocking pin in user's unlocking process, improve the safety of secret protection, and user experience is good.
The present invention provides a kind of privacy content guard method, and the privacy content guard method is applied to terminal, described hidden Private content protecting method includes: to receive access request instruction;Whether judge functional module corresponding with access request instruction There are in private file folder;When the functional module is pressed from both sides there are the private file, then expression unlocking function is activated;Described When functional module is pressed from both sides there is no the private file, then allow to access the functional module.
Specifically, before the step of reception access request instructs further include: receive secret protection instruction;Will with it is described Secret protection instructs corresponding functional module to be added in private file folder.
Specifically, before the step of reception access request instructs further include: acquire image corresponding to the user in real time Information;Image information in described image information and date library is compared and identifying processing obtains standard facial image;Benefit The standard facial image is analyzed to establish skin detection with regional characteristics analysis algorithm;By the face characteristic The face-image of template and the user carry out signature analysis, to obtain standard scale corresponding with the user based on the analysis results Feelings information.
Specifically, described the standard facial image to be analyzed using regional characteristics analysis algorithm to establish face spy The step of levying template includes: to extract portrait characteristic point from described image information using computer image processing technology;To described Portrait characteristic point carries out biometric analysis to establish skin detection.
Specifically, described that the skin detection and the face-image of the user are subjected to signature analysis, with basis After the step of analysis result obtains standard expression information corresponding with the user further include: receive expression record command;Root Facial expression image corresponding to the user is obtained according to the expression record command;By the facial expression image and the standard expression information into Row comparison processing, to obtain the difference characteristic information between the facial expression image and the standard expression information;According to the difference Different characteristic information and the facial expression image handle to obtain unlock expression information;The unlock expression information is stored to database In.
Specifically, before the step of reception access request instructs further include: receive corresponding with private file folder Unlock be arranged instruction;It obtains the unlock setting and instructs included difference characteristic information;According to the difference characteristic information The unlock expression information of the private file folder is set.
Specifically, described when the functional module is pressed from both sides there are the private file, then activate the step of expression unlocking function After rapid further include: obtain facial expression information corresponding to the user in real time;Judge the facial expression information whether meet with The private file presss from both sides corresponding unlock expression information;Meet in the facial expression information corresponding with private file folder When unlocking expression information, then the private file folder, and access function module are shown;The facial expression information do not meet with When the private file presss from both sides corresponding unlock expression information, then the hidden state of the private file folder is kept.
Specifically, described to meet unlock expression information corresponding with private file folder in the facial expression information When, then after the step of showing private file folder further include: receive corresponding with functional module exit instruction;According to The exit instruction exits the functional module, and private file folder corresponding with the functional module is restored to hiding shape State.
Specifically, described to judge whether the facial expression information meets unlock expression corresponding with private file folder The step of information includes: that processing is compared with standard expression information in the facial expression information, to obtain and the face The matching score of the corresponding difference characteristic information of expression information;It is corresponding to be located at the unlock expression information in the matching score When in the matching score regional scope that difference characteristic information is constituted, then determine that the facial expression information meets and the privacy The corresponding unlock expression information of file;It is located at the corresponding difference characteristic information of the unlock expression information in the matching score When except the matching score regional scope constituted, then determine that the facial expression information is not met and private file folder pair The unlock expression information answered.
The present invention also provides a kind of terminals, comprising: memory, for storing executable program code;And processor, it uses In calling the executable program code in the memory, to realize such as above-mentioned privacy content guard method.
Specifically, privacy content guard method provided in this embodiment and terminal, by receiving access request instruction, judgement Functional module corresponding with access request instruction whether there is in private file folder, in functional module, there are private file folders When, then activate expression unlocking function;And when functional module is pressed from both sides there is no private file, then allow access function module, thus Enable to user can at any time, the content for the browsing private file underedge stayed calm and collected is manually operated without user, Just it is able to achieve unlock, to prevent other people from prying through unlocking pin in user's unlocking process, improves the safety of secret protection, is used It experiences at family.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the invention can It is clearer and more comprehensible, it is special below to lift preferred embodiment, and cooperate attached drawing, detailed description are as follows.
Detailed description of the invention
Fig. 1 is the flow diagram of the privacy content guard method of first embodiment of the invention;
Fig. 2 is the flow diagram of the privacy content guard method of second embodiment of the invention;
Fig. 3 is the flow diagram of the privacy content guard method of third embodiment of the invention;
Fig. 4 is the flow diagram of the privacy content guard method of fourth embodiment of the invention;
Fig. 5 is the flow diagram of the privacy content guard method of fifth embodiment of the invention;
Fig. 6 is the flow diagram of the privacy content guard method of sixth embodiment of the invention;
Fig. 7 is the flow diagram of the privacy content guard method of seventh embodiment of the invention;
Fig. 8 is the flow diagram of the privacy content guard method of eighth embodiment of the invention;
Fig. 9 is the flow diagram of the privacy content guard method of ninth embodiment of the invention;
Figure 10 is the structural block diagram of the terminal of tenth embodiment of the invention.
Specific embodiment
It is of the invention to reach the technical means and efficacy that predetermined goal of the invention is taken further to illustrate, below in conjunction with Attached drawing and preferred embodiment, the present invention is described in detail as follows.
Fig. 1 is the flow diagram of the privacy content guard method of first embodiment of the invention.The present embodiment is held for terminal Capable privacy content guard method.As shown in Figure 1, the privacy content guard method of the present embodiment can comprise the following steps that
Step S11: access request instruction is received.
Specifically, in one embodiment, functional module of the user in triggering terminal, to request access to the functional module When, terminal receives access request instruction.Wherein, access request instruction includes the access request of corresponding functional module.
Step S12: judgement functional module corresponding with access request instruction is with the presence or absence of in private file folder.
Specifically, in one embodiment, terminal judges corresponding function in the access request instruction for receiving user's triggering Energy module whether there is in private file folder.Specifically, private file folder can be pre- for corresponding functional module for user First it is arranged, and the functional module of expectation protection can be added in corresponding private file folder, protects in the functional module Appearance is not pried through by other users.
Specifically, S13 is thened follow the steps there are when private file folder in functional module.Privacy is not present in functional module When file, S14 is thened follow the steps.
Step S13: activation expression unlocking function.
Specifically, in one embodiment, in functional module there are when private file folder, terminal is activated and the functional module Expression unlocking function, and control the functional module and enter in access waiting, such as the User Page of terminal shows the function mould In the load of block, until terminal recognition to user facial expression be preset unlock expression information, directly access the function mould Block promotes user experience to improve the unlocking information for avoiding other people from knowing user of the privacy content of user.
Step S14: allow access function module.
Specifically, in one embodiment, when functional module is pressed from both sides there is no private file, terminal is directly in response to access request Instruction is to access the functional module, and at this moment terminal will not activate expression unlocking function, to promote user experience.
Specifically, in one embodiment, functional module can be, but not limited to load application program at the terminal, figure Piece, audio-frequency information, video information, text information or browser usage record etc..Specifically, user can be in the desktop of terminal Be arranged private file press from both sides, will expectation protection application program be added to private file folder in, such as user can by wechat, QQ, it obtains etc. application and is added to different or identical private file folder, to carry out secret protection to these application programs.Tool Body, private file folder only have establish for the first time and unlock after can see, other when be held in hidden state, and be present in Application program in private file is existed simultaneously on the desktop of terminal, is user's visible state.Specifically, in an embodiment In, private file folder can also be arranged in the application, such as user can be hidden to the progress of the partial content in application program Private protection.Specifically, user can establish private file folder in the user interface of application program, and the content of expectation protection is added Into private file folder, such as the browsing in browser can be recorded automatic or manual and is added in private file by user, or Person user can establish private file folder in wechat user interface, and corresponding chat record or good friend are added to privacy text Protect in part folder etc..
Referring to FIG. 2, Fig. 2 is the flow diagram of the privacy content guard method of second embodiment of the invention.As Fig. 1 with Shown in Fig. 2, privacy content guard method provided in this embodiment, receiving the step of access request instructs further includes before following step It is rapid:
Step S21: secret protection instruction is received.
Step S22: functional module corresponding with secret protection instruction is added in private file folder.
Specifically, in one embodiment, user can be, but not limited to trigger corresponding functional module with hidden to terminal input Private protection instruction, such as the combination that user can press and/or click according to default gesture trigger the hidden of the functional module Private protection instruction.Specifically, after terminal receives secret protection instruction, functional module corresponding with secret protection instruction is added To private file folder in, for example, user newly-built private file press from both sides after, can be by dragging sliding mode to add the application program of desktop It is added in private file folder or user corresponding functional module can be arranged in corresponding privacy in the set interface of terminal In file, to carry out secret protection to functional module, user experience is promoted.
Specifically, in one embodiment, private file folder is established in functional module, user can be expectation protection Privacy content is moved in private file folder, and expression is arranged for the unlocking manner of this document folder and locks.User is arranged by terminal The unlock expression that the private file is pressed from both sides in the functional module.The difference of terminal extract real-time unlock expression information and standard expression information Different information, to unlock the private file folder of corresponding functional module using different information.Specifically, enter in user and be provided with table After the functional module of feelings lock, terminal changes according to the facial expression of user, with the expression information after facial expression changes After meeting the unlock expression of the private file folder definition, private file folder is then shown.Meet definition if do not detected Expression, private file folder do not show then.And after user exits the functional module, then private file folder is restored to hiding shape State, so that user can at any time, the content for the browsing private file underedge stayed calm and collected prevents other people in user Unlocking pin is pried through in unlocking process, improves the safety of secret protection.
Referring to FIG. 3, Fig. 3 is the flow diagram of the privacy content guard method of third embodiment of the invention.As Fig. 1 with Shown in Fig. 3, privacy content guard method provided in this embodiment, receiving the step of access request instructs further includes before following step It is rapid:
Step S31: image information corresponding to the user is acquired in real time.
Specifically, in one embodiment, terminal can with but be not limited by the face that front camera acquires user in real time Portion's image information.
Step S32: image information is compared with the image information in database and identifying processing obtains standard facial Image.
Specifically, in one embodiment, terminal compares the image information in acquired image information and date library It is right, and identifying processing is carried out to the image information in acquired image information and date library using image recognition technology, thus Obtain standard facial image corresponding with the user of terminal.Specifically, in one embodiment, standard facial image is user in day The often facial expression information under natural conditions in life.
Specifically, in one embodiment, terminal acquires the facial image information of user in real time, and facial image information is deposited Storage is into database, with the signature analysis of the facial image information to a large amount of user in database, to obtain the mark of user Quasi- face-image.
Step S33: standard facial image is analyzed to establish skin detection using regional characteristics analysis algorithm.
Specifically, in one embodiment, terminal using regional characteristics analysis algorithm to standard facial image analyzed with Mathematical model corresponding with the facial image information of user is established, and face characteristic corresponding to the user is constructed according to mathematical model Template.
Step S34: skin detection and the face-image of user are subjected to signature analysis, to obtain based on the analysis results Standard expression information corresponding to the user.
Specifically, in one embodiment, the face-image of face characteristic module and user are carried out signature analysis by terminal, with The similar value of face characteristic module and the face-image of user is provided, based on the analysis results to be greater than preset similarity value in similar value When, construct the standard expression information of user.Specifically, preset similarity value can be, but not limited to be set as 90 percent, such as Preset similarity value may be arranged as can be set to than 90 percent higher or lower percentage value, such as preset similarity value Percentage value 98 or 85 etc. percent, so as to promote the unlock accuracy that the expression of terminal is locked.
Specifically, in one embodiment, the facial characteristics and existing common face that terminal has each facial expression image Information compares, to judge difference characteristic information, for example, terminal can build the face image data of registration storage The feature for extracting face is generated skin detection to extract the feature of face by mould, and skin detection is saved in data In library.Specifically, in the new facial expression information of user's typing, by the standard expression of new facial expression information and database The face characteristic of information compares, and saves according to the difference for comparing output as differences, using as unlock Judgment basis.
Referring to FIG. 4, Fig. 4 is the flow diagram of the privacy content guard method of fourth embodiment of the invention.As Fig. 3 with Shown in Fig. 4, privacy content guard method provided in this embodiment carries out standard facial image using regional characteristics analysis algorithm Analysis to establish skin detection the step of specifically includes the following steps:
Step S41: portrait characteristic point is extracted from image information using computer image processing technology.
Step S42: biometric analysis is carried out to establish skin detection to portrait characteristic point.
Specifically, in one embodiment, recognition of face is the face-image for obtaining identification object in a non-contact manner, eventually Identification process is completed after being compared after obtaining image information with the image information in database in end.Specifically, implement one In mode, regional characteristics analysis algorithm fusion computer image processing technology and biostatistics principle, terminal is using calculating Machine image processing techniques extracts portrait characteristic point from video or image information, and the principle of biostatistics is then recycled to carry out Founding mathematical models are analyzed, to construct skin detection by mathematical model.
Referring to FIG. 5, Fig. 5 is the flow diagram of the privacy content guard method of fifth embodiment of the invention.As Fig. 3 with Shown in Fig. 5, skin detection and the face-image of user are carried out feature by privacy content guard method provided in this embodiment Analysis, the step of to obtain standard expression information corresponding to the user based on the analysis results after it is further comprising the steps of:
Step S51: expression record command is received.
Specifically, in one embodiment, user can record facial expression image information according to hobby, to input expression to terminal Record command.Specifically, user can be by terminal recorded video information, to change different expressions in recording process.
Step S52: facial expression image corresponding to the user is obtained according to expression record command.
Specifically, in one embodiment, terminal according to expression record command obtain user input comprising different expressions Video information handles to obtain different facial expression image corresponding to the user to carry out recognition of face to video information.
Step S53: processing is compared with standard expression information in facial expression image, to obtain facial expression image and standard expression Difference characteristic information between information.
Specifically, in one embodiment, each facial expression image that terminal can will acquire respectively with standard expression information Processing is compared, to obtain the difference characteristic information between each facial expression image and standard expression information.
Step S54: it is handled to obtain unlock expression information according to difference characteristic information and facial expression image.
Specifically, in one embodiment, terminal is handled according to the corresponding facial expression image of each difference characteristic information To corresponding unlock expression information.Specifically, in one embodiment, the tune of each unlock expression information can also be arranged in user Coefficient is saved, terminal handles to obtain corresponding matching score regional scope according to adjustment factor to unlock expression information, so as to User is promoted in the precision subsequently through facial expression unlock corresponding function module.
Step S55: unlock expression information is stored into database.
Specifically, in one embodiment, terminal stores all unlock expression informations into database, and corresponding record In expression lock list, to facilitate user that can quickly select corresponding unlock expression information when subsequent setting private file is pressed from both sides It is locked as expression, promotes user experience.
Referring to FIG. 6, Fig. 6 is the flow diagram of the privacy content guard method of sixth embodiment of the invention.As Fig. 1 with Shown in Fig. 6, privacy content guard method provided in this embodiment, receiving the step of access request instructs further includes before following step It is rapid:
Step S61: unlock setting instruction corresponding with private file folder is received.
Specifically, in one embodiment, user's triggering after establishing private file folder, which is unlocked private file folder, sets Replacement setting can be carried out to the unlock expression information of the expression lock in private file folder by setting instruction or user, and at this moment terminal connects Receive unlock setting instruction corresponding with private file folder.
Step S62: it obtains unlock setting and instructs included difference characteristic information.
Step S63: the unlock expression information that private file is pressed from both sides is arranged according to difference characteristic information.
Specifically, in one embodiment, unlock setting instruction is included at least with difference characteristic information, and terminal is according to difference spy Reference ceases the unlock expression information corresponding from database lookup, the unlock expression information of private file folder is arranged, thus When the expression of terminal recognition to user is unlock expression information, the content in private file folder could be accessed, protection user is hidden Private improves the safety of privacy of user.
Specifically, in one embodiment, when user creates private file folder, terminal refers in reception unlock expression setting After order, list is locked in user interface pop-up display expression, it is corresponding with unlock expression setting instruction to be obtained in expression lock list The first expression lock.Terminal sets the first expression lock to the expression of private file folder corresponding with unlock expression setting instruction Lock.
Referring to FIG. 7, Fig. 7 is the flow diagram of the privacy content guard method of seventh embodiment of the invention.As Fig. 6 with It further include following step after functional module is there are the step of when private file folder, then activating expression unlocking function shown in Fig. 7 It is rapid:
Step S71: facial expression information corresponding to the user is obtained in real time.
Specifically, in one embodiment, terminal can be, but not limited to obtain face corresponding to the user in real time by camera Portion's expression information.
Step S72: judge whether facial expression information meets unlock expression information corresponding with private file folder.
Specifically, in one embodiment, terminal is by the facial expression information of the user got in real time and the private file It presss from both sides corresponding unlock expression information to be compared, to judge it is corresponding with private file folder whether facial expression information meets Unlock expression information.
Specifically, it when facial expression information meets unlock expression information corresponding with private file folder, thens follow the steps S73: when facial expression information does not meet unlock expression information corresponding with private file folder, S74 is thened follow the steps.
Step S73: display private file folder, and access function module.
Specifically, in one embodiment, meet unlock expression information corresponding with private file folder in facial expression information When, terminal shows private file folder, and allows the access function module of user.
Step S74: the hidden state of private file is kept.
Specifically, in one embodiment, unlock expression letter corresponding with private file folder is not met in facial expression information When breath, terminal keeps the hidden state of private file, and forbids user's access function module, to protect privacy content, thus real No trace unlocking process now may be implemented to user's privacy content to be protected, other people is avoided to pry through the privacy content of user Unlocking pin improves the safety of privacy of user content.
Specifically, in one embodiment, after user enters main interface using face unlock mobile device, user wants to browse When the privacy information in the functional module that espressiove is locked is arranged in some, user can make preset before triggering the functional module Expression, such as smile, serious etc. facial expression, when the facial expression of user meets the unlock expression letter that the functional module defines When breath, such as when terminal monitoring is to different information with standard expression, then allow to access the functional module, and show user's Privacy content, when user exits this in application, then continuing to hide privacy content.
Referring to FIG. 8, Fig. 8 is the flow diagram of the privacy content guard method of eighth embodiment of the invention.As Fig. 7 with Shown in Fig. 8, privacy content guard method provided in this embodiment meets solution corresponding with private file folder in facial expression information Lock expression information when, then show private file folder the step of after it is further comprising the steps of:
Step S81: exit instruction corresponding with functional module is received.
Step S82: restore extremely according to exit instruction exit function module, and by private file folder corresponding with functional module Hidden state.
Specifically, in one embodiment, when user exits the functional module, terminal automatically presss from both sides the private file of display Restore to hidden state, so that user can at any time, the content for the browsing private file underedge stayed calm and collected is prevented Only other people pry through unlocking pin in user's unlocking process, improve the safety of secret protection.
Referring to FIG. 9, Fig. 9 is the flow diagram of the privacy content guard method of eighth embodiment of the invention.As Fig. 7 with Shown in Fig. 9, privacy content guard method provided in this embodiment judges whether facial expression information meets and private file folder pair The step of unlock expression information answered specifically includes the following steps:
Step S91: being compared processing with standard expression information for facial expression information, to obtain and facial expression information The matching score of corresponding difference characteristic information.
Step S92: it is located at the matching score that the corresponding difference characteristic information of unlock expression information is constituted in matching score When in regional scope, then determine that facial expression information meets unlock expression information corresponding with private file folder.
Step S93: it is located at the matching score that the corresponding difference characteristic information of unlock expression information is constituted in matching score When except regional scope, then determine that facial expression information does not meet unlock expression information corresponding with private file folder.
Specifically, in one embodiment, the adjusting of the unlock expression information of corresponding private file folder can be set in user Coefficient, terminal handles to obtain corresponding matching score regional scope according to adjustment factor to unlock expression information, so as to mention User is risen in the precision subsequently through facial expression unlock corresponding function module.Specifically, terminal is matched by facial table Processing is compared with standard expression information in feelings information, to obtain the matching of difference characteristic information corresponding with facial expression information Score, and judge to match whether score is located in the corresponding matching score regional scope of private file folder, and then judge face Whether expression information meets unlock expression information corresponding with private file folder, improves the precision of the expression unlock of terminal, To promote user experience, allow the unlock that user is seamless, and different functional modules can be arranged different expressions into Row unlock.
Referring to FIG. 10, Figure 10 is the structural block diagram of the terminal 100 of tenth embodiment of the invention.As shown in Figure 10, this reality The terminal 100 for applying example offer includes memory 110 for executing privacy content guard method, terminal 100 provided in this embodiment With processor 120.
Specifically, in the present embodiment, memory 110 is for storing executable program code.Processor 120 is for calling Executable program code in memory, to realize that step performed by privacy content guard method includes: reception access request Instruction;Judge functional module corresponding with access request instruction with the presence or absence of in private file folder;In functional module, there are privacies When file, then expression unlocking function is activated;When functional module is pressed from both sides there is no private file, then allow access function module.
Specifically, in one embodiment, processor 120 also execute before executing the step of receiving access request instruction Step includes: to receive secret protection instruction;Functional module corresponding with secret protection instruction is added in private file folder.
Specifically, in one embodiment, processor 120 also execute before executing the step of receiving access request instruction Step includes: to acquire image information corresponding to the user in real time;Image information is compared with the image information in database And identifying processing obtains standard facial image;Standard facial image is analyzed to establish people using regional characteristics analysis algorithm Face feature templates;Skin detection and the face-image of user are subjected to signature analysis, to obtain and use based on the analysis results The corresponding standard expression information in family.
Specifically, in one embodiment, processor 120 are executed using regional characteristics analysis algorithm to standard facial image The step of the step of being analyzed to establish skin detection specifically executes includes: using computer image processing technology from figure As extracting portrait characteristic point in information;Biometric analysis is carried out to establish skin detection to portrait characteristic point.
Specifically, in one embodiment, processor 120 execute and carry out skin detection and the face-image of user Signature analysis, the step of to obtain standard expression information corresponding to the user based on the analysis results after the step of also executing packet It includes: receiving expression record command;Facial expression image corresponding to the user is obtained according to expression record command;By facial expression image and standard Processing is compared in expression information, to obtain the difference characteristic information between facial expression image and standard expression information;According to difference Characteristic information and facial expression image handle to obtain unlock expression information;Unlock expression information is stored into database.
Specifically, in one embodiment, processor 120 also execute before executing the step of receiving access request instruction Step includes: reception unlock setting instruction corresponding with private file folder;It obtains unlock setting and instructs included difference characteristic Information;According to difference characteristic information, the unlock expression information that private file is pressed from both sides is set.
Specifically, in one embodiment, processor 120 execute in functional module there are when private file folder, then activate table The step of also executing after the step of feelings unlocking function includes: to obtain facial expression information corresponding to the user in real time;Judgement face Whether portion's expression information meets unlock expression information corresponding with private file folder;Meet and private file in facial expression information When pressing from both sides corresponding unlock expression information, then show that private file is pressed from both sides, and access function module;Facial expression information do not meet with When private file presss from both sides corresponding unlock expression information, then the hidden state of private file folder is kept.
Specifically, in one embodiment, processor 120, execution meet corresponding with private file folder in facial expression information Unlock expression information when, then show private file folder the step of after also execute the step of include: reception and functional module pair The exit instruction answered;Restore according to exit instruction exit function module, and by private file folder corresponding with functional module to hidden Hiding state.
Specifically, in one embodiment, processor 120, execution judge whether facial expression information meets and private file The step of the step of pressing from both sides corresponding unlock expression information specifically executes includes: to carry out facial expression information and standard expression information Comparison processing, to obtain the matching score of difference characteristic information corresponding with facial expression information;It is located at unlock in matching score When in the matching score regional scope that the corresponding difference characteristic information of expression information is constituted, then determine that facial expression information meets Unlock expression information corresponding with private file folder;It is located at the corresponding difference characteristic information institute of unlock expression information in matching score When except the matching score regional scope of composition, then determine that facial expression information does not meet unlock table corresponding with private file folder Feelings information.
The present embodiment realizes the detailed process of respective function to each functional unit of terminal 100, refers to above-mentioned Fig. 1 to figure Particular content described in 9 illustrated embodiments, details are not described herein.
Specifically, privacy content guard method provided in this embodiment and terminal, by receiving access request instruction, judgement Functional module corresponding with access request instruction whether there is in private file folder, in functional module, there are private file folders When, then activate expression unlocking function;And when functional module is pressed from both sides there is no private file, then allow access function module, thus Enable to user can at any time, the content for the browsing private file underedge stayed calm and collected is manually operated without user, Just it is able to achieve unlock, to prevent other people from prying through unlocking pin in user's unlocking process, improves the safety of secret protection, is used It experiences at family.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium, it is executable to be stored with computer Instruction, above-mentioned computer readable storage medium is, for example, nonvolatile memory such as CD, hard disk or flash memory.It is above-mentioned Computer executable instructions for allowing computer or similar arithmetic unit to complete in above-mentioned privacy content guard method Various operations.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For terminal class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.

Claims (10)

1. a kind of privacy content guard method, which is characterized in that the privacy content guard method is applied to terminal, the privacy Content protecting method includes:
Receive access request instruction;
Judge functional module corresponding with access request instruction with the presence or absence of in private file folder;
When the functional module is pressed from both sides there are the private file, then expression unlocking function is activated;
When the functional module is pressed from both sides there is no the private file, then allow to access the functional module.
2. privacy content guard method as described in claim 1, which is characterized in that the step of reception access request instructs Before further include:
Receive secret protection instruction;
Functional module corresponding with secret protection instruction is added in private file folder.
3. privacy content guard method as described in claim 1, which is characterized in that the step of reception access request instructs Before further include:
Image information corresponding to the user is acquired in real time;
Image information in described image information and date library is compared and identifying processing obtains standard facial image;
The standard facial image is analyzed to establish skin detection using regional characteristics analysis algorithm;
The face-image of the skin detection and the user are subjected to signature analysis, to obtain based on the analysis results and institute State the corresponding standard expression information of user.
4. privacy content guard method as claimed in claim 3, which is characterized in that described to utilize regional characteristics analysis algorithm pair The step of standard facial image is analyzed to establish skin detection include:
Portrait characteristic point is extracted from described image information using computer image processing technology;
Biometric analysis is carried out to establish skin detection to the portrait characteristic point.
5. privacy content guard method as claimed in claim 3, which is characterized in that described by the skin detection and institute The face-image for stating user carries out signature analysis, to obtain standard expression information corresponding with the user based on the analysis results After step further include:
Receive expression record command;
Facial expression image corresponding to the user is obtained according to the expression record command;
Processing is compared with the standard expression information in the facial expression image, to obtain the facial expression image and the standard Difference characteristic information between expression information;
It is handled to obtain unlock expression information according to the difference characteristic information and the facial expression image;
The unlock expression information is stored into database.
6. privacy content guard method as described in claim 1, which is characterized in that the step of reception access request instructs Before further include:
Receive unlock setting instruction corresponding with private file folder;
It obtains the unlock setting and instructs included difference characteristic information;
The unlock expression information of the private file folder is set according to the difference characteristic information.
7. privacy content guard method as claimed in claim 6, which is characterized in that it is described the functional module exist described in When private file is pressed from both sides, then after the step of activating expression unlocking function further include:
Facial expression information corresponding to the user is obtained in real time;
Judge whether the facial expression information meets unlock expression information corresponding with private file folder;
When the facial expression information meets unlock expression information corresponding with private file folder, then the privacy is shown File, and access function module;
When the facial expression information does not meet unlock expression information corresponding with private file folder, then keep described hidden The hidden state of private file.
8. privacy content guard method as claimed in claim 7, which is characterized in that described to meet in the facial expression information When unlock expression information corresponding with private file folder, then show the private file folder the step of after further include:
Receive exit instruction corresponding with the functional module;
The functional module is exited according to the exit instruction, and private file folder corresponding with the functional module is restored extremely Hidden state.
9. privacy content guard method as claimed in claim 7, which is characterized in that described to judge that the facial expression information is No the step of meeting unlock expression information corresponding with private file folder includes:
Processing is compared with standard expression information in the facial expression information, it is corresponding with the facial expression information to obtain Difference characteristic information matching score;
It is located at the matching score region that the corresponding difference characteristic information of the unlock expression information is constituted in the matching score When in range, then determine that the facial expression information meets unlock expression information corresponding with private file folder;
It is located at the matching score region that the corresponding difference characteristic information of the unlock expression information is constituted in the matching score When except range, then determine that the facial expression information does not meet unlock expression information corresponding with private file folder.
10. a kind of terminal, which is characterized in that the terminal includes:
Memory, for storing executable program code;And
Processor, for calling the executable program code in the memory, to realize as appointed in claim 1 to 9 Privacy content guard method described in one.
CN201811075510.XA 2018-09-14 2018-09-14 Privacy content guard method and terminal Pending CN109165494A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811075510.XA CN109165494A (en) 2018-09-14 2018-09-14 Privacy content guard method and terminal
PCT/CN2019/085361 WO2020052246A1 (en) 2018-09-14 2019-04-30 Privacy content protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811075510.XA CN109165494A (en) 2018-09-14 2018-09-14 Privacy content guard method and terminal

Publications (1)

Publication Number Publication Date
CN109165494A true CN109165494A (en) 2019-01-08

Family

ID=64879137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811075510.XA Pending CN109165494A (en) 2018-09-14 2018-09-14 Privacy content guard method and terminal

Country Status (2)

Country Link
CN (1) CN109165494A (en)
WO (1) WO2020052246A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020052246A1 (en) * 2018-09-14 2020-03-19 深圳市泰衡诺科技有限公司 Privacy content protection method and terminal
US11163988B2 (en) * 2019-12-02 2021-11-02 International Business Machines Corporation Selective interactive event tracking based on user interest

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946481A (en) * 2012-11-13 2013-02-27 广东欧珀移动通信有限公司 Method and system for unlocking human face expression
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
US20140050408A1 (en) * 2012-08-14 2014-02-20 Samsung Electronics Co., Ltd. Method for on-the-fly learning of facial artifacts for facial emotion recognition
CN105335662A (en) * 2015-09-30 2016-02-17 北京金山安全软件有限公司 Method, device and equipment for hiding information
CN105512547A (en) * 2016-02-25 2016-04-20 上海斐讯数据通信技术有限公司 Intelligent terminal privacy protection method and intelligent terminal privacy protection system
CN106203038A (en) * 2016-06-30 2016-12-07 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN106446619A (en) * 2016-09-29 2017-02-22 努比亚技术有限公司 Method for processing application and terminal
CN107402763A (en) * 2017-07-27 2017-11-28 深圳市泰衡诺科技有限公司 A kind of icon control method and control system based on intelligent terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509053A (en) * 2011-11-23 2012-06-20 唐辉 Authentication and authorization method, processor, equipment and mobile terminal
CN105787320A (en) * 2014-12-19 2016-07-20 北京奇虎科技有限公司 Private data intrusion detection method and apparatus
CN105117628B (en) * 2015-07-30 2018-02-02 广东欧珀移动通信有限公司 Control method, device and the corresponding mobile device that file is shown in a kind of terminal
CN108052811A (en) * 2017-11-27 2018-05-18 北京传嘉科技有限公司 Terminal control method and system based on face texture identification
CN109165494A (en) * 2018-09-14 2019-01-08 深圳市泰衡诺科技有限公司 Privacy content guard method and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140050408A1 (en) * 2012-08-14 2014-02-20 Samsung Electronics Co., Ltd. Method for on-the-fly learning of facial artifacts for facial emotion recognition
CN102946481A (en) * 2012-11-13 2013-02-27 广东欧珀移动通信有限公司 Method and system for unlocking human face expression
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN105335662A (en) * 2015-09-30 2016-02-17 北京金山安全软件有限公司 Method, device and equipment for hiding information
CN105512547A (en) * 2016-02-25 2016-04-20 上海斐讯数据通信技术有限公司 Intelligent terminal privacy protection method and intelligent terminal privacy protection system
CN106203038A (en) * 2016-06-30 2016-12-07 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN106446619A (en) * 2016-09-29 2017-02-22 努比亚技术有限公司 Method for processing application and terminal
CN107402763A (en) * 2017-07-27 2017-11-28 深圳市泰衡诺科技有限公司 A kind of icon control method and control system based on intelligent terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020052246A1 (en) * 2018-09-14 2020-03-19 深圳市泰衡诺科技有限公司 Privacy content protection method and terminal
US11163988B2 (en) * 2019-12-02 2021-11-02 International Business Machines Corporation Selective interactive event tracking based on user interest

Also Published As

Publication number Publication date
WO2020052246A1 (en) 2020-03-19

Similar Documents

Publication Publication Date Title
US9122913B2 (en) Method for logging a user in to a mobile device
CN109165940B (en) Anti-theft method and device and electronic equipment
US9773151B2 (en) System and methods for contactless biometrics-based identification
WO2020024398A1 (en) Biometrics-assisted payment method and apparatus, and computer device and storage medium
CN105975182B (en) A kind of terminal operation method and terminal
US10846514B2 (en) Processing images from an electronic mirror
Idrus et al. Soft biometrics for keystroke dynamics
DE102013102399A1 (en) Facial feature detection
US8983207B1 (en) Mitigating replay attacks using multiple-image authentication
CN109472269A (en) Characteristics of image configuration and method of calibration, device, computer equipment and medium
CN109165494A (en) Privacy content guard method and terminal
CN108986342A (en) A kind of recognition of face locker system based on cloud computing platform
US20110106700A1 (en) Method, apparatus and program for performing personal authentication and inputting operation instruction on the basis of biometric information including posture information
CN110599187A (en) Payment method and device based on face recognition, computer equipment and storage medium
CN108875335B (en) Method for unlocking human face and inputting expression and expression action, authentication equipment and nonvolatile storage medium
Prasanthi et al. Palm vein biometric technology: An approach to upgrade security in ATM transactions
JP6311237B2 (en) Collation device and collation method, collation system, and computer program
TWI584146B (en) Login system and method based on face recognition
CN107729795A (en) A kind of information processing manner with face recognition
JPWO2015145727A1 (en) Personal information acquisition system and personal information acquisition method
TWI771819B (en) Authentication system, authentication device, authentication method, and program product
TWM556877U (en) Login verification device and login verification system
EP3270313B1 (en) Optical authorization method for programs and files
CN111353139A (en) Continuous authentication method and device, electronic equipment and storage medium
CN114005208B (en) Access control method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190108