CN109684810A - A kind of information processing method and system - Google Patents
A kind of information processing method and system Download PDFInfo
- Publication number
- CN109684810A CN109684810A CN201811589504.6A CN201811589504A CN109684810A CN 109684810 A CN109684810 A CN 109684810A CN 201811589504 A CN201811589504 A CN 201811589504A CN 109684810 A CN109684810 A CN 109684810A
- Authority
- CN
- China
- Prior art keywords
- user
- electronic equipment
- image
- content
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
Abstract
When a kind of information processing method includes: triggering electronic equipment, unlocked by fingerprint mode is shown;It inputs and verifies, be proved to be successful, be arranged wait store the content with peep-proof and leakage;User stores after selecting transformation;When display has stored the content with peep-proof and leakage, shown on the screen after verified.This method and system can carry out information setting and scientific management to electronic equipment, so that the information security of the owner is preferably protected, from causing personal information, privacy information, kith and kin's information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;Flexibility and the user experience of unlock can be improved according to the use habit dynamic micro-adjustments parameter of user;It can guarantee that the data of storage can not be restored by cracking incomer, effectively improve data-handling efficiency, improve user experience, and by selectively transmitting, reduce the traffic of wireless transmission.
Description
Technical field
The present invention relates to electric data processing fields, and more specifically, are related to a kind of information processing method and system.
Background technique
With the fast development of economic society, electronic equipment is more and more applied in people's lives, such as
As means of communication, social tool, mobile internet access and information acquisition instrument, converter tools, image and video capture and
Storage tool, information equipments of recording, shopping at network and mobile payment tool etc..It can be said that electronic equipment is at for people's lives
Helper, significantly improve and enrich substance and the cultural life of people.However, just because of electronic equipment effect increasingly
Obviously, so the safety problem of electronic equipment is also increasingly prominent.For example, electronic equipment is by nonowners in use, may cause
Personal information leakage therein, or lead to the economic loss of the owner.Such as following scene: the mobile terminal of the owner is unfortunate
It loses, causes the people found that can obtain the Alipay or wechat wallet or Third-party payment account of the owner, to give the owner
When economic loss, the especially owner being brought to be provided with no password payment in order to convenient or exempt from password payment, the people found can
It is transferred accounts with realizing with the slightest effort, brings great riches to lose to the owner.Alternatively, the mobile terminal of the owner is by friend
Friend obtains, and enters application program and watch, and may cause the condition of individual privacy leakage or embarrassment, for example, the owner's shows
Appoint friends of the opposite sex that may undoubtedly browse to picture, chat record, communications records, mark of former friends of the opposite sex of the owner etc.
Deng causing the owner difficult to get at the truth.For another example nonowners may browse the letter of the other users in the mobile terminal of the owner
Breath, the information such as name, work unit, telephone number, Email, communications records of kith and kin, so as to utilize these
Information pretends to be the owner to swindle, and perhaps peddles personal information or carries out precision marketing, negative reputation is brought to the owner
Or adverse effect.It is therefore desirable to carry out information setting and scientific management for electronic equipment, to preferably protect the owner
Information security, from cause personal information, privacy information, kith and kin's information and associate data leakage.However in the prior art
Often both for electronic equipment carry out screen locking setting, thus by input password, input biometric information, input gesture and
It slides or generates pattern to unlock, and security level is not high, such as nonowners can attempt to continually enter password, Huo Zhegen
Unlocking pin is inferred according to the scratch on electronic equipment screen, or is obtained owner's fingerprint by unlawful means and passed through instead
Fingerprint mold is manufactured to engineering to unlock;In addition, even if unlock after, for the information in electronic equipment can not carry out classification or
Setting, causes nonowners to see the content that should not be seen;In addition, if electronic equipment is often difficult to be returned once losing
Also, so the return for the electronic equipment lost and its anti-leak of content ensure that the prior art lacks relevant measure.
Based on this, it is necessary to invent a kind of information processing method for being able to solve problem above.
Summary of the invention
An object of the present invention is to provide a kind of information processing method and system, can carry out information to electronic equipment
Setting and scientific management, so that the information security of the owner is preferably protected, from causing personal information, privacy information, kith and kin
Information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;It can be dynamic according to the use habit of user
State finely tunes parameter, improves flexibility and the user experience of unlock;It can guarantee that the data of storage can not be restored by cracking incomer, be had
Effect ground improves data-handling efficiency, improves user experience, and by selectively transmitting, reduces the communication of wireless transmission
Amount.
The technical solution that the present invention takes to solve above-mentioned technical problem are as follows: a kind of information processing method includes: when using
Family when triggering electronic equipment, shows unlocked by fingerprint by pressing physical button or with finger touch sensor on the screen
Mode;User inputs and verifies according to the first unlocking manner, and authentication failed then selects other one or more different solutions
Lock mode, is proved to be successful, and is arranged wait store the content with peep-proof and leakage;Other one or more different unlocking manners
Authentication failed then shoots the image of the user of unlock failure, and sends the image to intended destination and/or be shown in screen
On, it is proved to be successful, is arranged wait store the content with peep-proof and leakage;User selects storage or encryption change after simple transformation
It changes and stores;It will be stored with peep-proof and the content of leakage to the specified region of electronic equipment, and shown wait store after simple transformation
Diagram mark;By wait store the content with peep-proof and leakage after enciphering transformation, the specified region of the electronic equipment is arrived in part storage,
In addition part is stored to remote equipment, and shows icon;When user's trial display has stored the content with peep-proof and leakage,
Application prompts user inputs password, after verified, from the specified region of the electronic equipment or the electronic equipment
Specified region and remote equipment call the stored content with peep-proof and leakage, to show on the screen.
In one embodiment, it when user exits the application program or browsing other applications, will transfer through depositing
Storage is deleted from buffer with peep-proof and the content of leakage, and is guaranteed the specified region for being only stored in electronic equipment or be somebody's turn to do
On the specified region of electronic equipment and remote equipment
In one embodiment, this method specifically includes: step 1, when user by pressing physical button or uses finger
Touch sensor when triggering electronic equipment, shows the first unlocking manner on the screen;Step 2, user is according to the first unlock side
Formula is inputted, and is then entered step 7 if the verification passes, is otherwise entered step 3;Step 3, the second unlock side is shown on the screen
Formula;Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step 5;
Step 5, step 4 is repeated, if user's the second unlocking manner frequency of failure reaches first threshold, suspends unlock up to the time
Section selects other unlocking manners or the camera lens by electronic equipment later, and shooting unlocks the image of the user of failure, and
It sends the image to intended destination and is displayed on the screen;Step 6, start after user's checking hidden involved in electronic equipment
When the application program of private, the application program presentation content;Step 7: user, which is directed to, to be stored with peep-proof and leakage
Content is selected and is arranged, and selects to store after storage or enciphering transformation after simple transformation;Step 8: becoming if it is simple
It being stored after changing, then format conversion will be carried out with peep-proof and the content of leakage wait store, the specified region of electronic equipment is arrived in storage,
And when the contextual information of the content is shown, display icon in side's is on the screen to have prompted to have stored with peep-proof and leakage
Content, and execute step 10;It step 9, then will be wait store the content with peep-proof and leakage if it is being stored after enciphering transformation
Format conversion is carried out, the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment;Wherein if
The quantity for waiting storing the content with peep-proof and leakage is greater than predetermined threshold, then extracts partial data shape using random number algorithm
At the first transformation data sequence, only by the first transformation data sequence storage to remote equipment;In the contextual information of the content
When shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage, and executes step 10;Step
Rapid 10, when the icon is when the user clicks to attempt display, application prompts user inputs password, after verified, from this
The specified region of electronic equipment or the specified region of the electronic equipment and remote equipment call stored with peep-proof and leakage
Content.
In one embodiment, if user's the second unlocking manner frequency of failure reaches first threshold, suspend unlock and reach
One period T, after period T, if user still passes through the second unlocking manner and attempts unlock, in its second method solution
After lock frequency of failure sum accumulation reaches the 6th threshold value greater than first threshold, one of following manner is selected: extending temporary
Stop unlocked time section T ', wherein T ' > T;Start third unlocking manner, wherein third unlocking manner be Password Input, slidably input,
Any one in living things feature recognition input, action input, if the third unlocking manner frequency of failure is up to six threshold values, solution
Failure signal is sent to electronics processors by lock module, to shut down after shooting and showing and transmit image;Work as unlock
The frequency of failure reach first threshold perhaps six threshold values when illustrate that the user for attempting unlock is that nonowners or biological characteristic are known
The other changed owner of information, at this time in order to ensure information safety, by the camera lens of electronic equipment, shooting unlock is lost
The image of the user lost, and send the image to intended destination and/or be displayed on the screen;Wherein it is sent to predetermined purpose
The operation on ground are as follows: the owner in advance leads to unlocked state and social application program, global positioning system application program, starting movement
The application program of letter is associated, matches and is arranged, and when aforementioned unlock unsuccessfully reaches certain number, it is fixed that unlocked state opens the whole world
The application program of position system application and starting mobile communication, and by searching for the widget on the desktop of electronic equipment
And start social application program, wherein preset contact person is inquired, by the present image of the user of the unlock failure of shooting
Be transferred to preset contact person, and by social application program, via mobile network by the geographical coordinate of the electronic equipment
Positioning be sent to preset contact person so that preset contact person obtain the electronic equipment position and attempt solution
The information of the people of lock;In addition, in order to promote the people for attempting to unlock that can give back the electronic equipment, the screen of the electronic equipment is also aobvious
Show the image of the user of the unlock failure of shooting, and shows owner's contact method and/or the contact method of its kith and kin.
In one embodiment, selecting a certain range of content to be stored includes: that finger is rested on application program
In some position at reach certain time, keep touching screen later and move up or down, the window of the application program at this time
By pullup or pulldown, when reaching at the position of user's expectation storage, user's finger is stopped at another position in the application
It stays up to certain time, when user's finger is removed from touch screen, to the letter between another position at some described position
Breath is chosen.Or: selecting a certain range of content to be stored includes: some position by finger stop in the application
Place is set up to certain time, finger is removed from touch screen later, and within another specified time, by pulling scroll bar to realize application
The pullup or pulldown of the window of program, when reaching user and it is expected at the position of storage, user's finger in the application another
It is stopped at a position and reaches certain time, then when user's finger is removed from touch screen, arrive another position at some described position
Information between setting is chosen.
In one embodiment, simple transformation are as follows: user selectes a certain range of in the window that application program is presented
Content to be stored.Selected information is converted to picture format by screenshot mode by conversion module later, and executes following behaviour
Make: calculating the pixel of the picture, obtain u × v pixel, which is divided into P mutually non-overlapping image tiles, by the figure
As the pixel value of tile is according to quantity sequential from less to more, sequence tile1, tile2 ... ... of image tiles is obtained,
Tilew takes the median in the sequence to obtain the median image tile of the sequence, wherein taking the sequence number to be when w is even number
The image tiles of w value half are as median image tile, and when w is odd number, taking sequence number is the integer part of w value half
Image tiles are as median image tile;Calculate the w-1 of the pixel of other image tiles in the median image tile and the sequence
A quantity is poor;Median image tile and the quantity difference of the pixel of each image tile fragment are modified later, to generate offset:
Wherein when quantity difference is bigger than the 8th threshold value as positive integer, by the quantity of median image tile and the pixel of the image tile fragment
Difference plus one, and when opposite a few hours of the quantity difference than the 8th threshold value as positive integer, by median image tile and the image watt
The quantity subtractive one of the pixel of block, and when quantity difference is between the opposite to that number of the 8th threshold value and including between two endpoints, in
It is worth image tiles and the quantity difference of the pixel of the image tile fragment is constant;The number of corresponding each pixel in image tiles is traversed later
It is poor to measure, according to the quantity difference of median image tile and the pixel of each image tile fragment is modified the offset of generation before, general
Binary password position is inserted into the vacancy of offset formation, and is inserted into departure indications between image tile fragment, to realize
Format conversion will be carried out with peep-proof and the content of leakage wait store, and then stored into the specified region of electronic equipment, and
When the contextual information of the content is shown, side's display icon is on the screen to prompt to have stored in peep-proof and leakage
Hold.
In one embodiment, during being selected at some position to the information between another position, pressure
Sensor judges selected position, and when detecting that effective pressure stops at some position on the touchscreen,
Trigger signal is sent to timing module and starts timing, stops timing when detecting that pressure limit is mobile, and at another
Same operation is executed at position;Only when timer determines that the period at two positions is above pre-provisioning request,
It is considered effectively to select process;Wherein determination carries out selected step at some position are as follows: by the information of the application program
It is divided into different parts according to default unit (such as according to every chat record, every short message, every picture), by this
The upper bound of the partial middle line between preceding section as the part, by the middle line between back to back part of the part
As the lower bound of the part, using the rectangular area between the upper bound, lower bound and the screen left and right sides as the region of the part;
When user's finger touches, pressure sensor first determines the satisfactory effective touch range of pressure value, and calculates this effectively
It touches range and is located at pixel quantity and its ratio in the different parts, when being fully located at some part, by the part
Be determined as selected part, when touching across middle line, the part that ratio is more than half be determined as selected part, and when than
It when example is just half, reminds user to select again on the screen, and then repeats the above operation to determine selected part.
In one embodiment, enciphering transformation include the following steps in any one: (1) user application program present
Window in, select a certain range of content to be stored;Conversion module is turned selected information by screenshot mode later
It is changed to picture format, and executes following operation: the image is decomposed, the image is transformed to horizontal point using wavelet transformation
Amount, vertical component, diagonal components and other components, and other components and diagonal components storage are arrived into the electronic equipment
Specified region, by horizontal component and vertical component storage to remote equipment;Wherein storage includes: to be based on level to remote equipment
Component and vertical component are inserted into the key of user's input between, to generate the first data sequence;And it is directed to first
Random number range is arranged in data sequence, selects random number as the increment for the position extracted from the random number range, from first
Designated position in data sequence starts to extract byte, which adds random number to obtain next position for extracting byte, sequentially
The algorithm is executed, until next byte location is greater than the data volume of the first data sequence, by the byte of the corresponding position of extraction
It is extracted from the first data sequence, the random number sequence with sequential is sent together as the first transformation data sequence
To the remote equipment of such as cloud server etc, so that remote equipment carries out the first verifying according to the first transformation data sequence,
And identifying code is formed, while electronic equipment is arrived into the data storage in the first data sequence in addition to the first transformation data sequence
In specified region;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified region of the electronic equipment,
Remain use when subsequent calls;(2) user is in the window that application program is presented, select it is a certain range of it is to be stored in
Hold;Selected information is converted to picture format by screenshot mode by conversion module later, and executes following operation: by the figure
It is 2 that piece, which is divided into size,Q*2QThe image tiles of a pixel, wherein Q is greater than the positive integer equal to 3, and works as the edge of picture
When part is unsatisfactory for the image tiles format size, by lack part with 0 polishing;And it is carried out for each image tiles as follows
Transformation:Wherein work as p, q
When=0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0;Wherein p and q is coordinate, wherein 2Q*2Q
The image tiles of a pixel are the discrete function of p and q, 2Q*2QIn a output, frequency is zero in the horizontal and vertical directions
Output result by the first part as the image tiles, and remaining output result by second as the image tiles
Point;The each image tiles for traversing the picture obtain its respective first part and second part, and are formed first part
Sequence and second part sequence, and by the storage of second part sequence to the specified region of the electronic equipment, by first part's sequence
Column are formed together queue storage to remote equipment, so that remote equipment is carried out according to first part's sequence and check code with check code
It is teaching and research, and form identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified of the electronic equipment
In region, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, guarantee that electronic equipment is lost
Or unlock is cracked by nonowners, into after the application program, it can guarantee that data information is imperfect, so that cracking incomer
The partial data can not be restored, ensure that information is not leaked;Simultaneously because not needing to all wait store with peep-proof and let out
The content of dew is encrypted, and data-handling efficiency can be effectively improved, and improves user experience.
In addition, a kind of information processing system is also disclosed, the information processing system include memory, processor, application program,
Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement
Sensing module, gravity sensor, camera, camera lens, social application program, conversion module, global positioning system program module, starting
The application program of mobile communication, timing module, the memory include the program for executing above- mentioned information processing method, the processing
Program in the invoked memory of device with application program, Fingerprint Identification Unit, determination module, finger pressure sensor, Xie Suomo
Block, environment light determination module, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application journey
Sequence, global positioning system program module, starts the application program of mobile communication, the timing module letter together at conversion module
One or more of the step of ceasing processing method.
Detailed description of the invention
In the accompanying drawings by way of example rather than the embodiment of the present invention is shown by way of limitation, wherein phase
Same appended drawing reference indicates identical element, in which:
According to an exemplary embodiment of the invention, Fig. 1 illustrates a kind of general flow chart of information processing method.
According to an exemplary embodiment of the invention, the structure chart of Fig. 2 pictorial information processing system.
Specific embodiment
Before carrying out following specific embodiments, certain words and phrase used in the patent document are illustrated
Definition may be advantageous: term " includes " and "comprising" and its derivative mean to include without limiting;Term "or" is
Include, it is meant that and/or;Phrase " with ... it is associated ", " associated with it " and its derivative might mean that including quilt
Be included in ... it is interior, with ... interconnection, include be comprised in ... it is interior, be connected to ... or with ... connect, be coupled to ... or
With ... couple, can be with ... communicate, with ... cooperation interweaves, and side by side, approaches ..., be bound to ... or with ... binding, tool
Have, attribute having ..., etc.;And term " controller " mean to control any equipment of at least one operation, system or its
Component, such equipment may be realized with some combinations of hardware, firmware or software or wherein at least two.It should be noted that
: functionality associated with any specific controller may be centralization or distributed, either local or remote
Journey.The definition for being used for certain words and phrase is provided through patent document, it should be understood by those skilled in the art that: if not
In most cases, in many cases, such definition is suitable for word and phrase existing and define in this way not
To use.
In the following description, several specific embodiments with reference to attached drawing and are diagrammatically shown.It will be appreciated that
It is contemplated that and other embodiments can be made without departing from the scope of the present disclosure or spirit.Therefore, described in detail below should not be by
Think in a limiting sense.
According to an exemplary embodiment of the invention, Fig. 1 illustrates a kind of general flow chart of information processing method.Specifically, should
Method includes:
Step 1, when user is by pressing physical button or with finger touch sensor, when triggering electronic equipment,
The first unlocking manner is shown on screen;
Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise enters step
Rapid 3;
Step 3, the second unlocking manner is shown on the screen;
Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step
Rapid 5;
Step 5, step 4 is repeated to suspend unlock if user's the second unlocking manner frequency of failure reaches first threshold and reach
One period selected other unlocking manners or the camera lens by electronic equipment later, the user's of shooting unlock failure
Image, and send the image to intended destination and/or be displayed on the screen;
Step 6, when starting the application program of privacy involved in electronic equipment after user's checking, in application program presentation
Hold;
Step 7: user is directed to the content stored with peep-proof and leakage, is selected and is arranged, and selected
It is stored after storage or enciphering transformation after simple transformation;
Step 8: if it is storing after simple transformation, then format change will be carried out with peep-proof and the content of leakage wait store
It changes, the specified region of electronic equipment is arrived in storage, and when the contextual information of the content is shown, on the screen side's display icon
There is the content stored with peep-proof and leakage with prompt, and executes step 10;
Step 9, if it is storing after enciphering transformation, then format change will be carried out with peep-proof and the content of leakage wait store
It changes, the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment, and in the context of the content
When information is shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage, and executes step
10;
Step 10, when the icon is when the user clicks to attempt display, application prompts user inputs password, verified
Later, it is called from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment stored with peep-proof
Depending on and leakage content, to show on the screen;It, will and when user exits the application program or browsing other applications
Transfer it is stored deleted from buffer with peep-proof and the content of leakage, and guarantee to be only stored in the specified of electronic equipment
On region or the specified region and remote equipment of the electronic equipment.
According to an exemplary embodiment of the invention, the first unlocking manner and the second unlocking manner can be Password Input, cunning
Dynamic input, living things feature recognition input, any one in action input.
According to an exemplary embodiment of the invention, the first unlocking manner is living things feature recognition input, wherein in step 2
In, user inputs according to the first unlocking manner and verifying includes: that Fingerprint Identification Unit and finger pressure are provided in electronic equipment
Power sensor, when finger is placed on Fingerprint Identification Unit by user, Fingerprint Identification Unit acquires and identifies its finger print information, and with it is pre-
The preset fingerprint determined in database is compared, and fingerprint results are transmitted to the determination module in electronic equipment;User is by hand
While finger is placed on Fingerprint Identification Unit, other fingers are placed on the finger pressure sensor on electronic equipment screen, the finger
Pressure sensor acquires the pressure of other fingers application, and determines that pressure value is greater than second threshold in finger and screen contact area
Dot matrix quantity, and calculate apply the satisfactory touch area of pressure accordingly, and then according to by historian database
Third threshold value and the 4th threshold value between the default touch areal extent that limits determine that user applies the satisfactory touch of pressure
Whether area falls into the default touch areal extent of the restriction, and by whether fall into the restriction default touch areal extent knot
Fruit is transmitted to the determination module in electronic equipment;Whether the determination module is by according to fingerprint results and falling into the pre- of the restriction
If touching the result of areal extent to determine whether to match by verifying when fingerprint exists with the preset fingerprint in reservations database
Relationship, and user applies pressure satisfactory touch area when falling into the default touch areal extent of the restriction, and this is sentenced
The result being verified is output to the unlocked state of electronic equipment by cover half block, and otherwise the determination module is by the result of authentication failed
It is output to the unlocked state of electronic equipment;Wherein fingerprint whether there is sentencing for matching relationship with the preset fingerprint in reservations database
In fixed, need to determine whether the similar proportion of the preset fingerprint in fingerprint and reservations database is greater than the 5th threshold value, if it is greater than
Then there is matching relationship, matching relationship is otherwise not present;Wherein every time in verifying, whenever user applies the satisfactory touching of pressure
When touching area and falling into the default touch areal extent by being limited between third threshold value and the 4th threshold value, after this time verifying,
The user of this time is applied the satisfactory numerical value for touching area of pressure to be input in historian database, with historical record
In N item touch the record of area and be averaged, and the range of the positive and negative certain proportion of the average result (± M%) is selected as newly
Third threshold value and the 4th threshold value improve the flexibility of unlock so that the use habit for making it possible to according to user is finely adjusted
And user experience, guarantee the information security of electronic equipment.
According to an exemplary embodiment of the invention, the second unlocking manner is living things feature recognition input, wherein in step 4
In, user inputs according to the second unlocking manner and verifying includes: that environment light determination module, eye are provided in electronic equipment
Determination module and movement sensing module containing gravity sensor;When entering the second unlocking manner, environment light determination module
The power of environment light is determined, if meeting strong environment cursor criterion starting eye determination module, if meeting weak environment light standard
Then start movement sensing module, and the selection mode of starting is shown on a display screen;Wherein eye determination module passes through camera
Camera lens, the video of the mobile variation of shooting user's eye, and analyze the position of eyeball in every frame in the video, comprehensive judgement user
The mobile variation of eye, and the mobile variation track of user's eye is compared with the record in eye determination module, when true
Determine to solve lock screen when matching degree meets the requirements, user is notified to unlock failure when determining that matching degree is undesirable.It is clapped
Take the photograph and analyze operation are as follows: when screen shows eye determination module, image or text prompt user on screen are watched electronics attentively and set
Standby Front camera simultaneously moves eyeball at the appointed time in section, and keeps specified distance range with Front camera, keeps
Palm grip electronic equipment does not shake, which can guarantee that camera can capture the movement of user eyeball, while camera is opened
Screening-mode, and at the appointed time multiple frames in section in the video of the acquisition shooting, pass through the gray scale analyzed in every frame image
Change big region, lock eyes, concrete operations are as follows: smooth operation is executed to every frame image using filter, is obtained
The convolution results of present image and filter;The gradient magnitude of Difference Calculation adjacent pixel, when gradient is greater than the threshold value of setting,
Region where determining the image is area-of-interest, and records its coordinate value in this frame image;Count the region of interest
The grayscale information in domain, and carry out binaryzation;By sequentially scanning in the horizontal and vertical directions, determine in close on two pixels
The variation of gray value when being greater than seven threshold values, calculate rest of pixels sequence in this direction, and the variation of gray value is drawn
At curve, show the boundary for reaching sclera and iris when there is maximum, show pupil position when there is minimum, when out
Show the boundary for reaching iris and sclera when existing second maximum, executes same operation to capture another eyes in the frame
Location information and coordinate values in image;The position of two pupils in consecutive frame is successively analyzed later, and according to every frame figure
The coordinate values of each pupil draw the moving curve of eyes of user as in;And the eyes curve of drafting and eye are determined into mould
Record in block is compared, and solves lock screen when determining that at least one in eyes and the matching degree of record meet the requirements.Example
Such as when user has pre-registered " √ " shape unlocking pin in record, the moving curve and note of at least one in the eyes of drafting
The matching degree of record meets the requirements, then being shown to be the user is the owner.In addition, if meeting weak environment cursor criterion starting fortune
Dynamic sensing module, and the selection mode of starting is shown on a display screen, remind user to hold the electronic equipment and specified
The electronic equipment is shaken with certain track in period, the gravity sensor root in the movement sensing module in the electronic equipment
According to the variation of the acceleration in electronic equipment at the appointed time section, by movement sensing module rendering accelerating degree change curve, from
And be compared with the record in movement sensing module, when in the acceleration change curve for determining acceleration change curve and record
One matching degree solve lock screen when meeting the requirements.Such as when user has pre-registered " N " shape unlocking pin in record
When, when user hold electronic equipment and at the appointed time the estimation move in section be also N, and acceleration change curve with record
The matching degree of acceleration change curve when meeting the requirements, then being shown to be the user is the owner.
According to an exemplary embodiment of the invention, step 5 further comprises: if user's the second unlocking manner frequency of failure
Reach first threshold, then suspends unlock up to a period T, after period T, if user still passes through the second unlocking manner
Attempt unlock, then after the unlock frequency of failure sum accumulation of its second method reaches greater than the 6th threshold value of first threshold, choosing
It selects one of following manner: extending pause unlocked time section T ', wherein T ' > T;Start third unlocking manner, wherein third solution
Lock mode is Password Input, slidably input, living things feature recognition input, any one in action input, if third unlocks
When the mode frequency of failure is up to six threshold values, failure signal is sent to electronics processors to shut down by unlocked state.Work as unlock
The frequency of failure reach first threshold perhaps six threshold values when illustrate that the user for attempting unlock is that nonowners or biological characteristic are known
The other changed owner of information, at this time in order to ensure information safety, by the camera lens of electronic equipment, shooting unlock is lost
The image of the user lost, and send the image to intended destination and/or be displayed on the screen;Wherein it is sent to predetermined purpose
The operation on ground are as follows: the owner in advance leads to unlocked state and social application program, global positioning system application program, starting movement
The application program of letter is associated, matches and is arranged, and when aforementioned unlock unsuccessfully reaches certain number, it is fixed that unlocked state opens the whole world
The application program of position system application and starting mobile communication, and by searching for the widget on the desktop of electronic equipment
And start social application program, wherein preset contact person is inquired, by the present image of the user of the unlock failure of shooting
Be transferred to preset contact person, and by social application program, via mobile network by the geographical coordinate of the electronic equipment
Positioning be sent to preset contact person so that preset contact person obtain the electronic equipment position and attempt solution
The information of the people of lock;In addition, in order to promote the people for attempting to unlock that can give back the electronic equipment, the screen of the electronic equipment is also aobvious
Show the image of the user of the unlock failure of shooting, and shows owner's contact method or the contact method of its kith and kin.Pass through
The setting can be effectively facilitated the safety of the information of electronic equipment.
Preferably, the owner of the electronic equipment is in advance by the social applications such as unlocked state and wechat (wechat), positioning
Program, wireless network startup program are associated, match and are arranged, and when aforementioned unlock unsuccessfully reaches certain number, unlocked state is opened
It opens global positioning system application program and starts the application program of mobile communication, and by searching for the window on the desktop of electronic equipment
Mouth widget simultaneously starts the social applications such as wechat, inquires wherein preset contact person (for example, " wife Zhang Qing "), will shoot
The present image of user of unlock failure be transferred to wife Zhang Qing, and by the social applications such as wechat, via wireless network, pass through
Finder the positioning (such as " position " in the social applications such as wechat) of the geographical coordinate of the electronic equipment is sent to (such as
Start " sending position " function or " shared real time position " function in " position " in the social applications such as wechat) wife
The mountain valley with clumps of trees and bamboo, so that wife opens the information that the mountain valley with clumps of trees and bamboo obtains the position of the electronic equipment and attempts the people of unlock;In addition, in order to promote to attempt to unlock
People can give back the electronic equipment, the screen of the electronic equipment also shows the image of the user of the unlock failure of shooting, and
Show owner's contact method or the contact method of its kith and kin;Preferably, " position " in the social applications such as starting wechat
In " shared real time position " function after, keep the state of activation of the function, wait preset contact person according to the position
Confidence breath carries out the position positioning of electronic equipment or finds the electronic equipment accordingly, in order to be able to guarantee electronic equipment as early as possible
Ground is returned or is found, and reduces the loss of information leakage bring.
According to an exemplary embodiment of the invention, in step 8, simple transformation are as follows: the window that user is presented in application program
In mouthful, a certain range of content to be stored is selected.Conversion module is converted to selected information by screenshot mode later
Picture format, and execute following operation: the pixel of the picture is calculated, u × v pixel is obtained, which is divided into P mutual nothings
The image tiles (tile) of overlapping obtain image watt by the pixel value of the image tiles according to quantity sequential from less to more
Sequence tile1, tile2 ... ... of piece, tilew take the median in the sequence to obtain the median image tile of the sequence,
In when w is even number, take the image tiles that sequence number is w value half as median image tile, when w is odd number, take sequence
Column number is the image tiles of the integer part of w value half as median image tile;Calculate the median image tile and the sequence
W-1 quantity of the pixel of other image tiles is poor in column;Later by the pixel of median image tile and each image tile fragment
Quantity difference is modified, to generate offset: wherein when quantity difference is bigger than the 8th threshold value as positive integer, by median image
The quantity difference of the pixel of tile and the image tile fragment adds one, and when quantity difference is smaller than the opposite number of the 8th threshold value as positive integer
When, by the quantity subtractive one of median image tile and the pixel of the image tile fragment, and when quantity difference is between the 8th threshold value and its phase
Anti- number and when including between two endpoints, median image tile and the quantity difference of the pixel of the image tile fragment are constant;It traverses later
The quantity of corresponding each pixel is poor in image tiles, according to before by the pixel of median image tile and each image tile fragment
Quantity difference is modified the offset of generation, binary password position is inserted into the vacancy of offset formation, and in image watt
It is inserted into departure indications between block, so that format conversion will be carried out wait store with peep-proof and the content of leakage by realizing, and then stores
Into the specified region of electronic equipment, and when the contextual information of the content is shown, display icon in side's is on the screen to mention
It is shown with the content stored with peep-proof and leakage.
At some position to the information between another position it is chosen during, pressure sensor is for selected
Position is judged, and when detecting that effective pressure stops at some position on the touchscreen, trigger signal is sent to
Timing module simultaneously starts timing, stops timing when detecting that pressure limit is mobile, and executes similarly at another position
Operation;Only when timer determines that the period at two positions is above pre-provisioning request, just it is considered effectively selected
Process;Wherein at some position determination carry out selected step are as follows: by the information of the application program according to default unit (such as
According to every chat record, every short message, every picture) be divided into different parts, by the part and preceding section
Between the upper bound of the middle line as the part, using the middle line between back to back part of the part as under the part
Boundary, using the rectangular area between the upper bound, lower bound and the screen left and right sides as the region of the part;When user's finger touches
When, pressure sensor first determines the satisfactory effective touch range of pressure value, and calculates effective touch range and be located at not
The part is determined as selected portion when being fully located at some part by pixel quantity and its ratio in the same part
Point, when touching across middle line, the part that ratio is more than half is determined as selected part, and when ratio is just half
When, remind user to select again on the screen, and then repeat the above operation to determine selected part.
According to an exemplary embodiment of the invention, enciphering transformation is the following steps are included: the window that user is presented in application program
In mouthful, a certain range of content to be stored is selected;Conversion module is converted to selected information by screenshot mode later
Picture format, and execute following operation:
The image is decomposed, the image is transformed to horizontal component, vertical component, diagonal line point using wavelet transformation
Amount and other components, and by other components and diagonal components storage to the specified region of the electronic equipment, by level point
Amount and vertical component are stored to remote equipment;Wherein storing to remote equipment includes: based on horizontal component and vertical component, two
The key of user's input is inserted between person, to generate the first data sequence;And it is directed to the first data sequence, random number is set
Range, selects random number as the increment for the position extracted from the random number range, the specific bit from the first data sequence
It sets and starts to extract byte, which adds random number to obtain next position for extracting byte, the algorithm is sequentially executed, until next
A byte location is greater than the data volume of the first data sequence, and the byte of the corresponding position of extraction is extracted from the first data sequence
Out, such as cloud server etc is sent to together as the first transformation data sequence with the random number sequence of sequential
Remote equipment and form identifying code so that remote equipment carries out the first verifying according to the first transformation data sequence, while by the
Data in one data sequence in addition to the first transformation data sequence are stored into the specified region of electronic equipment;Reception is remotely set
The standby identifying code returned, and the identifying code is stored in the specified region of the electronic equipment, remain use when subsequent calls.According to
This, can guarantee the safety of information in electronic equipment, guarantee that electronic equipment is lost or cracks unlock by nonowners, answers into this
It after program, can guarantee that data information is imperfect, so that the partial data can not be restored by cracking incomer, ensure that information
It is not leaked;Simultaneously because not needing effectively mention to all encrypting wait store with peep-proof and the content of leakage
High data-handling efficiency improves user experience;And pass through and selectively transmit, reduces the traffic of wireless transmission, it is this
Situation is especially effective for a large amount of data to be stored.
According to an exemplary embodiment of the invention, alternatively, enciphering transformation is the following steps are included: user is in application program
In existing window, a certain range of content to be stored is selected;Conversion module is by screenshot mode later, by selected information
It is converted to picture format, and executes following operation: at size being 2 by the picture segmentationQ*2QThe image tiles of a pixel, wherein Q
It is greater than the positive integer equal to 3, and when the marginal portion of picture is unsatisfactory for the image tiles format size, by lack part
With 0 polishing;And such as down conversion is carried out for each image tiles:Wherein work as p, when q=0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0;Wherein p and q is coordinate, wherein 2Q*2QA pixel
Image tiles be p and q discrete function, 2Q*2QIn a output, frequency is zero output in the horizontal and vertical directions
As a result by the first part as the image tiles, and remaining output result is by the second part as the image tiles;Time
The each image tiles for going through the picture obtain its respective first part and second part, and are formed first part's sequence
With second part sequence, and by second part sequence storage arrive the electronic equipment specified region, by first part's sequence with
Check code is formed together queue storage to remote equipment, so that remote equipment is taught according to first part's sequence and check code
It grinds, and forms identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified area of the electronic equipment
In domain, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, guarantee electronic equipment lose or
Crack unlock, into after the application program by nonowners, can guarantee that data information is imperfect so that crack incomer without
Method restores the partial data, ensure that information is not leaked;Simultaneously because not needing to all wait store with peep-proof and leakage
Content encrypted, can effectively improve data-handling efficiency, improve user experience.
Preferably, selecting a certain range of content to be stored includes: that finger is stopped in the application some
(such as chat record, short message, picture) reaches certain time at position, and touch screen is kept to move up or down later,
The window of the application program is by pullup or pulldown at this time, and when reaching at the position of user's expectation storage, user's finger is applying journey
(such as another chat record, another short message, another picture) is stopped up to a timing at another position in sequence
Between, it is chosen to the information between another position at some described position when user's finger is removed from touch screen.
Alternatively, selecting a certain range of content to be stored includes: that finger is stopped in the application some
(such as chat record, short message, picture) reaches certain time at position, and finger is removed from touch screen later, and in another finger
In fixing time, the pullup or pulldown of the window by pulling scroll bar realization application program reaches the position that user it is expected storage
When place, at another position of user's finger in the application (such as it is another chat record, another short message, another
One picture) it stops up to certain time, then when user's finger is removed from touch screen, another position is arrived at some described position
Information between setting is chosen.
According to an exemplary embodiment of the invention, in step 10, when icon is when the user clicks to attempt display, the application
Program reminds user to input password, after verified, the application program launching mobile network communication, from the specified of the electronic equipment
The stored content with peep-proof and leakage is called in the specified region and remote equipment of region or the electronic equipment, when being simple
When storing after transformation, binary password position is inputted, and then remove by binary password position, according to division from the content of storage
When departure indications extract each image tiles, than generating the pixel of image tiles according to quantity sequential from less to more
Quantity is poor, and traverses each image tiles, when the quantity difference of intermediate value image tiles and the pixel of each image tile fragment is greater than the
Eight threshold values a period of time, by the quantity subtractive one, when the quantity difference of intermediate value image tiles and the pixel of each image tile fragment is less than the 8th
When threshold value adds one opposite number, which is added one, when quantity difference is between the opposite to that number of the 8th threshold value and including two ends
When between point, median image tile and the quantity difference of the pixel of the image tile fragment are constant;Thus realize the image tiles of image
Inverse offset restores the peep-proof of storage and the content of leakage by the splicing of image tiles.
When storing after for enciphering transformation, the first transformation data sequence is received from the remote equipment of such as cloud server etc
Column decompose the random number sequence of sequential therein and the first data sequence extracted, and are become by identifying code verifying first
Data sequence is changed, the random number sequence based on sequential and the first data sequence extracted, retrospectively calculate extract the position of byte
It sets, restores the designated position in the first data sequence, and then obtain the first data sequence, the key inputted by user is raw
At horizontal component and vertical component, other components and diagonal components, root then are extracted from the specified region of the electronic equipment
According to the component, original image is obtained by inverse transformation.
Alternatively, when storing after for enciphering transformation, identifying code is transferred from the specified region of electronic equipment, and sent out
Remote equipment is given, reduction is carried out by remote equipment and forms first part's sequence and check code, and the two is sent back into electronics and is set
Standby, electronic equipment proofreads first part's sequence according to check code, and based on the second part sequence stored in specified region, passes through
If down conversion restores original image tile,Wherein work as p, when q=0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0.
According to an exemplary embodiment of the invention, the structure chart of Fig. 2 pictorial information processing system.The wherein information processing system
System includes memory, processor, application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment
Light determination module, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, transformation mould
Block, global positioning system program module, the application program for starting mobile communication, timing module, which includes for executing
The program of above- mentioned information processing method, program in the invoked memory of the processor with application program, Fingerprint Identification Unit, sentence
Cover half block, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement sensing module, gravity
Sensor, camera lens, social application program, conversion module, global positioning system program module, starts answering for mobile communication at camera
One or more of the step of executing above- mentioned information processing method together with program, timing module.
Above-mentioned each technical term is the routine techniques term with common meaning in this field, in order not to obscure this
The emphasis of invention, is not further explained it herein.
It to sum up, in the inventive solutions, can be to electronic equipment by using a kind of information processing method
Information setting and scientific management are carried out, so that the information security of the owner is preferably protected, from causing personal information, privacy letter
Breath, kith and kin's information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;It can be according to the use of user
It is accustomed to dynamic micro-adjustments parameter, improves flexibility and the user experience of unlock;It can guarantee that storage can not be restored by cracking incomer
Data effectively improve data-handling efficiency, improve user experience, and by selectively transmitting, reduce wireless biography
The defeated traffic.
It will be appreciated that example and reality of the invention can be realized in the form of the combination of hardware, software or hardware and software
Apply example.As described above, any main body for executing this method can be stored, in the form of volatility or non-volatile holographic storage, such as
Equipment is stored, as ROM, whether no matter can erasing or is rewritable, or in the form of a memory, such as RAM, storage core
Piece, equipment or integrated circuit or on the readable medium of light or magnetic, such as CD, DVD, disk or tape.It will be appreciated that
Storage equipment and storage medium are suitable for storing the example of the machine readable storage of one or more programs, upon being performed,
One or more of programs realize example of the invention.Via any medium, such as it is loaded with by wired or wireless coupling
Signal of communication can electronically transmit example of the invention, and example suitably includes identical content.
It is to be noted that because the present invention, which solves, to carry out information setting and scientific management to electronic equipment, from
And the information security of the owner is preferably protected, from causing letting out for personal information, privacy information, kith and kin's information and contacts data
Dew;And it can be returned after promoting electronic equipment to lose;Unlock can be improved according to the use habit dynamic micro-adjustments parameter of user
Flexibility and user experience;It can guarantee that the data of storage can not be restored by cracking incomer, effectively improve data processing effect
Rate improves user experience, and by the technical issues of selectively transmitting, reducing the traffic of wireless transmission, uses
Technical staff instructs technological means to understand according to it after reading this description in field of computer technology, and obtains
Advantageous effects are taken, so claimed scheme belongs to the technical side on patent law purposes in the following claims
Case.In addition, because the claimed technical solution of appended claims can be made or used in industry, program tool
Standby practicability.
The above, preferable specific embodiment only of the invention, but protection scope of the present invention is not limited to
This, anyone skilled in the art in the technical scope disclosed by the present invention, the variation that can readily occur in or replaces
It changes, should all forgive within protection scope of the present invention.Unless be otherwise expressly recited, otherwise disclosed each feature is only
It is equivalent or similar characteristics a example for general series.Therefore, protection scope of the present invention should be with claims
Subject to protection scope.
Claims (10)
1. a kind of information processing method, comprising:
When user is by pressing physical button or with finger touch sensor, when triggering electronic equipment, show on the screen
Unlocked by fingerprint mode;
User inputs and verifies according to the first unlocking manner, and authentication failed then selects other one or more different unlocks
Mode is proved to be successful, and is arranged wait store the content with peep-proof and leakage;
Other one or more different unlocking manner authentication faileds then shoot the image of the user of unlock failure, and by the image
It is sent to intended destination and/or is displayed on the screen, be proved to be successful, be arranged wait store the content with peep-proof and leakage;
User stores still enciphering transformation after selecting simple transformation and stores;
It will be stored with peep-proof and the content of leakage to the specified region of electronic equipment wait store after simple transformation, and show figure
Mark;
By wait store the content with peep-proof and leakage after enciphering transformation, the specified region of the electronic equipment is arrived in part storage, separately
Outer part is stored to remote equipment, and shows icon;
User attempts to show that application prompts user inputs password, experience when having stored the content with peep-proof and leakage
After card, from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment call it is stored to prevent
The content pried through and revealed, to show on the screen.
2. information processing method according to claim 1, wherein further comprising:
User exit the application program or browsing other applications when, by transfer it is stored with peep-proof and leakage in
Appearance deleted from buffer, and guarantee be only stored in electronic equipment specified region or the electronic equipment specified region and
On remote equipment.
3. information processing method according to claim 2, wherein this method is specifically included:
Step 1, when user is by pressing physical button or with finger touch sensor, when triggering electronic equipment, in screen
The first unlocking manner of upper display;
Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise enters step 3;
Step 3, the second unlocking manner is shown on the screen;
Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step 5;
Step 5, step 4 is repeated, if user's the second unlocking manner frequency of failure reaches first threshold, suspends unlock up to for the moment
Between section, select other unlocking manners or the camera lens by electronic equipment later, the image of the user of shooting unlock failure,
And it sends the image to intended destination and is displayed on the screen;
Step 6, when starting the application program of privacy involved in electronic equipment after user's checking, the application program presentation content;
Step 7: user is directed to the content stored with peep-proof and leakage, is selected and is arranged, and selects simple
It is stored after storage or enciphering transformation after transformation;
Step 8: if it is being stored after simple transformation, then format conversion will be carried out with peep-proof and the content of leakage wait store, deposited
The specified region of electronic equipment is stored up, and when the contextual information of the content is shown, display icon in side's is on the screen to mention
It is shown with the content stored with peep-proof and leakage, and executes step 10;
Step 9, if it is storing after enciphering transformation, then format conversion, portion will be carried out with peep-proof and the content of leakage wait store
The specified region for dividing storage to arrive the electronic equipment, part in addition are stored to remote equipment;It wherein if should be wait store with peep-proof
Depending on and leakage content quantity be greater than predetermined threshold, then using random number algorithm extract partial data formed first transformation data
Sequence, only by the first transformation data sequence storage to remote equipment;When the contextual information of the content is shown, in screen
Top display icon executes step 10 to prompt to have stored the content with peep-proof and leakage;
Step 10, when the user clicks the icon with attempt display when, application prompts user input password, it is verified it
Afterwards, it is called from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment stored with peep-proof
With the content of leakage.
4. information processing method according to claim 3, in which:
If user's the second unlocking manner frequency of failure reaches first threshold, suspend unlock up to a period T, in period T
Later, if user still passes through the second unlocking manner and attempts unlock, in the unlock frequency of failure sum accumulation of its second method
After reaching the 6th threshold value greater than first threshold, one of following manner is selected: extending pause unlocked time section T ', wherein
T'>T;Start third unlocking manner, wherein third unlocking manner is Password Input, slidably inputs, living things feature recognition input, moves
Any one in inputting, if the third unlocking manner frequency of failure is up to six threshold values, unlocked state sends out failure signal
Electronics processors are given, to shut down after shooting and showing and transmit image;When the unlock frequency of failure reaches the first threshold
Illustrate that attempting the user of unlock is nonowners or biological characteristic recognition information changed institute when being worth perhaps six threshold value
The person of having, at this time in order to ensure information safety, by the camera lens of electronic equipment, the image for the user that shooting unlock fails, and
It sends the image to intended destination and/or is displayed on the screen;Wherein it is sent to the operation of intended destination are as follows: the owner
In advance by unlocked state and social application program, global positioning system application program, the application program progress for starting mobile communication
Association, matching and setting, when it is aforementioned unlock unsuccessfully reach certain number when, unlocked state open global positioning system application program and
Start the application program of mobile communication, and by searching for the widget on the desktop of electronic equipment and starts social application journey
Sequence inquires wherein preset contact person, the present image of the user of the unlock failure of shooting is transferred to preset
Contact person, and be sent to the positioning of the geographical coordinate of the electronic equipment in advance by social application program, via mobile network
The contact person of setting, so that preset contact person obtains the position of the electronic equipment and attempts the information of the people of unlock;This
Outside, in order to promote the people for attempting to unlock that can give back the electronic equipment, the screen of the electronic equipment also shows that the unlock of shooting is lost
The image of the user lost, and show owner's contact method and/or the contact method of its kith and kin.
5. information processing method according to claim 4, in which:
Selecting a certain range of content to be stored includes: to stop finger at some position in the application up to certain
Time keeps touch screen to move up or down later, and pullup or pulldown is reached user by the window of the application program at this time
It is expected that being stopped at another position of user's finger in the application when at the position of storage and reaching certain time, work as user hand
Refer to from when touch screen removal, is selected at some described position to the information between another position.
6. information processing method according to claim 4, in which:
Selecting a certain range of content to be stored includes: to stop finger at some position in the application up to certain
Time, finger is removed from touch screen later, and within another specified time, by pulling scroll bar to realize the window of application program
Pullup or pulldown, reach user it is expected storage position at when, user's finger is stopped at another position in the application
It stays up to certain time, then when user's finger is removed from touch screen, is arrived between another position at some described position
Information is chosen.
7. information processing method according to claim 5 or 6, in which:
Simple transformation are as follows: user selectes a certain range of content to be stored in the window that application program is presented.Become later
It changes the mold block and selected information is converted to by picture format by screenshot mode, and execute following operation: calculating the picture of the picture
Element obtains u × v pixel, which is divided into P mutually non-overlapping image tiles, the pixel value of the image tiles is pressed
According to quantity sequential from less to more, sequence tile1, tile2 ... ... of image tiles is obtained, tilew takes in the sequence
Median obtains the median image tile of the sequence, wherein taking sequence number is the image tiles of w value half when w is even number
As median image tile, when w is odd number, take the image tiles that sequence number is the integer part of w value half as intermediate value
Image tiles;It calculates the median image tile and w-1 quantity of the pixel of other image tiles in the sequence is poor;Later will in
Value image tiles and the quantity difference of the pixel of each image tile fragment are modified, to generate offset: wherein when quantity difference is compared to
When big for the 8th threshold value of positive integer, the quantity difference of median image tile and the pixel of the image tile fragment is added one, and works as quantity
Difference than the 8th threshold value as positive integer opposite a few hours, median image tile and the quantity of the pixel of the image tile fragment is poor
Subtract one, and when quantity difference is between the opposite to that number of the 8th threshold value and including between two endpoints, median image tile and the figure
As the quantity difference of the pixel of tile fragment is constant;The quantity for traversing corresponding each pixel in image tiles later is poor, according to general before
The quantity difference of the pixel of median image tile and each image tile fragment is modified the offset of generation, and binary password position is inserted
Enter in the vacancy formed to the offset, and be inserted into departure indications between image tile fragment, so that realizing will be wait store with peep-proof
Format conversion is carried out with the content of leakage, and then is stored into the specified region of electronic equipment, and is believed in the context of the content
When breath is shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage.
8. information processing method according to claim 7, in which:
During being selected at some position to the information between another position, pressure sensor is for selected position
Judged, and when detecting that effective pressure stops at some position on the touchscreen, trigger signal is sent to timing
Module simultaneously starts timing, stops timing when detecting that pressure limit is mobile, and same operation is executed at another position;
Only when timer determines that the period at two positions is above pre-provisioning request, just it is considered effectively to select process;
Wherein at some position determination carry out selected step are as follows: by the information of the application program according to default unit (such as according to
Every chat record, every short message, every picture) it is divided into different parts, by the part between preceding section
The upper bound of the middle line as the part will using the middle line between back to back part of the part as the lower bound of the part
Region of the rectangular area as the part between at left and right sides of the upper bound, lower bound and screen;When user's finger touches, pressure
Force snesor first determines the satisfactory effective touch range of pressure value, and calculates effective touch range and be located at different institutes
State the pixel quantity and its ratio in part, when being fully located at some part, which be determined as to selected part, when across
It crosses the centre line when touching, the part that ratio is more than half is determined as selected part, and when ratio is just half, in screen
Upper prompting user selectes again, and then repeats the above operation to determine selected part.
9. information processing method according to claim 8, in which:
Enciphering transformation include the following steps in any one:
(1) user selectes a certain range of content to be stored in the window that application program is presented;Conversion module is logical later
Screenshot mode is crossed, selected information picture format is converted into, and execute following operation: the image being decomposed, use is small
The image is transformed to horizontal component, vertical component, diagonal components and other components by wave conversion, and by other components and
The specified region of the electronic equipment is arrived in diagonal components storage, and horizontal component and vertical component are stored to remote equipment;Wherein
Storing remote equipment includes: to be inserted into the key of user's input between based on horizontal component and vertical component, thus raw
At the first data sequence;And it is directed to the first data sequence, random number range is set, selects random number from the random number range
The increment of position as extraction extracts byte since the designated position in the first data sequence, which adds random number to obtain
To next position for extracting byte, the algorithm is sequentially executed, until next byte location is greater than the number of the first data sequence
According to amount, the byte of the corresponding position of extraction is extracted from the first data sequence, the random number sequence one with sequential
It rises as the first transformation data sequence, is sent to the remote equipment of such as cloud server etc, so that remote equipment is according to the
One transformation data sequence carries out the first verifying, and forms identifying code, while the first transformation data sequence will be removed in the first data sequence
Data except column are stored into the specified region of electronic equipment;The identifying code that remote equipment returns is received, and by the identifying code
It is stored in the specified region of the electronic equipment, remains use when subsequent calls;
(2) user selectes a certain range of content to be stored in the window that application program is presented;Conversion module is logical later
Screenshot mode is crossed, selected information is converted into picture format, and execute following operation: at size being 2 by the picture segmentationQ*2Q
The image tiles of a pixel, wherein Q is greater than the positive integer equal to 3, and when the marginal portion of picture is unsatisfactory for the image watt
When piece format size, by lack part with 0 polishing;And such as down conversion is carried out for each image tiles:
Wherein work as p, q=
When 0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0;Wherein p and q is coordinate, wherein 2Q*2QIt is a
The image tiles of pixel are the discrete function of p and q, 2Q*2QIn a output, frequency is zero in the horizontal and vertical directions
Result is exported by the first part as the image tiles, and remaining output result is by second as the image tiles
Point;The each image tiles for traversing the picture obtain its respective first part and second part, and are formed first part
Sequence and second part sequence, and by the storage of second part sequence to the specified region of the electronic equipment, by first part's sequence
Column are formed together queue storage to remote equipment, so that remote equipment is carried out according to first part's sequence and check code with check code
It is teaching and research, and form identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified of the electronic equipment
In region, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, guarantee that electronic equipment is lost
Or unlock is cracked by nonowners, into after the application program, it can guarantee that data information is imperfect, so that cracking incomer
The partial data can not be restored, ensure that information is not leaked;Simultaneously because not needing to all wait store with peep-proof and let out
The content of dew is encrypted, and data-handling efficiency can be effectively improved, and improves user experience.
10. a kind of information processing system, the information processing system include memory, processor, application program, Fingerprint Identification Unit,
Determination module, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement sensing module, again
Force snesor, camera lens, social application program, conversion module, global positioning system program module, starts mobile communication at camera
Application program, timing module, the memory include the program for executing above- mentioned information processing method, and the processor is invoked to be deposited
Program in reservoir with application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment light to sentence
Cover half block, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, conversion module,
Perform claim requires described in 9 together for global positioning system program module, the application program for starting mobile communication, timing module
The step of information processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811589504.6A CN109684810B (en) | 2018-12-25 | 2018-12-25 | Information processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811589504.6A CN109684810B (en) | 2018-12-25 | 2018-12-25 | Information processing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109684810A true CN109684810A (en) | 2019-04-26 |
CN109684810B CN109684810B (en) | 2020-05-05 |
Family
ID=66189345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811589504.6A Active CN109684810B (en) | 2018-12-25 | 2018-12-25 | Information processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109684810B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112307452A (en) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | Application program operation control method and device and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577052A (en) * | 2013-11-15 | 2014-02-12 | 惠州Tcl移动通信有限公司 | Method and system for conducting batched selection in information list through mobile terminal |
CN104539811A (en) * | 2015-01-23 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Anti-theft method of terminal and mobile terminal |
CN105530356A (en) * | 2015-12-21 | 2016-04-27 | 珠海格力电器股份有限公司 | Mobile communication terminal and data protection method and device thereof |
CN105553940A (en) * | 2015-12-09 | 2016-05-04 | 北京中科云集科技有限公司 | Safety protection method based on big data processing platform |
CN108076426A (en) * | 2017-12-11 | 2018-05-25 | 广东欧珀移动通信有限公司 | Terminal tracing method, apparatus, storage medium and terminal device |
CN108289141A (en) * | 2017-12-27 | 2018-07-17 | 努比亚技术有限公司 | A kind of the screen locking unlocking method and mobile terminal of mobile terminal |
-
2018
- 2018-12-25 CN CN201811589504.6A patent/CN109684810B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103577052A (en) * | 2013-11-15 | 2014-02-12 | 惠州Tcl移动通信有限公司 | Method and system for conducting batched selection in information list through mobile terminal |
CN104539811A (en) * | 2015-01-23 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Anti-theft method of terminal and mobile terminal |
CN105553940A (en) * | 2015-12-09 | 2016-05-04 | 北京中科云集科技有限公司 | Safety protection method based on big data processing platform |
CN105530356A (en) * | 2015-12-21 | 2016-04-27 | 珠海格力电器股份有限公司 | Mobile communication terminal and data protection method and device thereof |
CN108076426A (en) * | 2017-12-11 | 2018-05-25 | 广东欧珀移动通信有限公司 | Terminal tracing method, apparatus, storage medium and terminal device |
CN108289141A (en) * | 2017-12-27 | 2018-07-17 | 努比亚技术有限公司 | A kind of the screen locking unlocking method and mobile terminal of mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112307452A (en) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | Application program operation control method and device and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109684810B (en) | 2020-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109543390A (en) | A kind of information security management method and system | |
JP4177598B2 (en) | Face image recording apparatus, information management system, face image recording method, and information management method | |
KR101242390B1 (en) | Method, apparatus and computer-readable recording medium for identifying user | |
US9122913B2 (en) | Method for logging a user in to a mobile device | |
EP1990770B1 (en) | Face authentication device, face authentication method, and program | |
CN105869235B (en) | A kind of safety door inhibition method and system | |
US8550339B1 (en) | Utilization of digit sequences for biometric authentication | |
CN103886237A (en) | Control method and system for electronic device with fingerprint sensor and touch screen | |
CN108171137B (en) | Face recognition method and system | |
KR20140072858A (en) | Method and computer program for providing authentication to control access to a computer system | |
CN108734838B (en) | Intelligent lock with video-based biological feature verification device | |
CN105261105A (en) | Safety access control method | |
CN103617385A (en) | Terminal and method for unlocking screen | |
CN109814964B (en) | Interface display method, terminal equipment and computer readable storage medium | |
TWI754964B (en) | Authentication system, authentication device, authentication method, and program product | |
JP7090008B2 (en) | Identity verification support device and identity verification support method | |
JP2006235718A (en) | Facial authentication device, its facial authentication method, electronic equipment integrated with the facial authentication device and recording medium with the facial authentication program stored thereon | |
JPWO2017170384A1 (en) | Biometric data processing apparatus, biometric data processing system, biometric data processing method, biometric data processing program, and storage medium for storing biometric data processing program | |
US11792189B1 (en) | Systems and methods for authenticating a user using an image capture device | |
Mecke et al. | Open sesame! user perception of physical, biometric, and behavioural authentication concepts to open doors | |
CN109543389A (en) | A kind of information protecting method and system | |
CN109684810A (en) | A kind of information processing method and system | |
CN105760733B (en) | Data ciphering method and module, data access method and module | |
CN110727355A (en) | User terminal for operating virtual key based on motion sensor | |
TWI771819B (en) | Authentication system, authentication device, authentication method, and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200408 Address after: 215123 unit e4-1, No. 88, Jinjihu Avenue, Suzhou Industrial Park, Suzhou City, Jiangsu Province Applicant after: Suzhou zhihuigu Technology Service Co., Ltd Address before: 510000 A30 house 68 (1), Nanxiang Road, Whampoa District, Guangzhou, Guangdong. Applicant before: GUANGZHOU ZHIHONG TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |