CN109684810A - A kind of information processing method and system - Google Patents

A kind of information processing method and system Download PDF

Info

Publication number
CN109684810A
CN109684810A CN201811589504.6A CN201811589504A CN109684810A CN 109684810 A CN109684810 A CN 109684810A CN 201811589504 A CN201811589504 A CN 201811589504A CN 109684810 A CN109684810 A CN 109684810A
Authority
CN
China
Prior art keywords
user
electronic equipment
image
content
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811589504.6A
Other languages
Chinese (zh)
Other versions
CN109684810B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou zhihuigu Technology Service Co., Ltd
Original Assignee
Guangzhou Zhi Hong Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhi Hong Science And Technology Co Ltd filed Critical Guangzhou Zhi Hong Science And Technology Co Ltd
Priority to CN201811589504.6A priority Critical patent/CN109684810B/en
Publication of CN109684810A publication Critical patent/CN109684810A/en
Application granted granted Critical
Publication of CN109684810B publication Critical patent/CN109684810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

When a kind of information processing method includes: triggering electronic equipment, unlocked by fingerprint mode is shown;It inputs and verifies, be proved to be successful, be arranged wait store the content with peep-proof and leakage;User stores after selecting transformation;When display has stored the content with peep-proof and leakage, shown on the screen after verified.This method and system can carry out information setting and scientific management to electronic equipment, so that the information security of the owner is preferably protected, from causing personal information, privacy information, kith and kin's information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;Flexibility and the user experience of unlock can be improved according to the use habit dynamic micro-adjustments parameter of user;It can guarantee that the data of storage can not be restored by cracking incomer, effectively improve data-handling efficiency, improve user experience, and by selectively transmitting, reduce the traffic of wireless transmission.

Description

A kind of information processing method and system
Technical field
The present invention relates to electric data processing fields, and more specifically, are related to a kind of information processing method and system.
Background technique
With the fast development of economic society, electronic equipment is more and more applied in people's lives, such as As means of communication, social tool, mobile internet access and information acquisition instrument, converter tools, image and video capture and Storage tool, information equipments of recording, shopping at network and mobile payment tool etc..It can be said that electronic equipment is at for people's lives Helper, significantly improve and enrich substance and the cultural life of people.However, just because of electronic equipment effect increasingly Obviously, so the safety problem of electronic equipment is also increasingly prominent.For example, electronic equipment is by nonowners in use, may cause Personal information leakage therein, or lead to the economic loss of the owner.Such as following scene: the mobile terminal of the owner is unfortunate It loses, causes the people found that can obtain the Alipay or wechat wallet or Third-party payment account of the owner, to give the owner When economic loss, the especially owner being brought to be provided with no password payment in order to convenient or exempt from password payment, the people found can It is transferred accounts with realizing with the slightest effort, brings great riches to lose to the owner.Alternatively, the mobile terminal of the owner is by friend Friend obtains, and enters application program and watch, and may cause the condition of individual privacy leakage or embarrassment, for example, the owner's shows Appoint friends of the opposite sex that may undoubtedly browse to picture, chat record, communications records, mark of former friends of the opposite sex of the owner etc. Deng causing the owner difficult to get at the truth.For another example nonowners may browse the letter of the other users in the mobile terminal of the owner Breath, the information such as name, work unit, telephone number, Email, communications records of kith and kin, so as to utilize these Information pretends to be the owner to swindle, and perhaps peddles personal information or carries out precision marketing, negative reputation is brought to the owner Or adverse effect.It is therefore desirable to carry out information setting and scientific management for electronic equipment, to preferably protect the owner Information security, from cause personal information, privacy information, kith and kin's information and associate data leakage.However in the prior art Often both for electronic equipment carry out screen locking setting, thus by input password, input biometric information, input gesture and It slides or generates pattern to unlock, and security level is not high, such as nonowners can attempt to continually enter password, Huo Zhegen Unlocking pin is inferred according to the scratch on electronic equipment screen, or is obtained owner's fingerprint by unlawful means and passed through instead Fingerprint mold is manufactured to engineering to unlock;In addition, even if unlock after, for the information in electronic equipment can not carry out classification or Setting, causes nonowners to see the content that should not be seen;In addition, if electronic equipment is often difficult to be returned once losing Also, so the return for the electronic equipment lost and its anti-leak of content ensure that the prior art lacks relevant measure.
Based on this, it is necessary to invent a kind of information processing method for being able to solve problem above.
Summary of the invention
An object of the present invention is to provide a kind of information processing method and system, can carry out information to electronic equipment Setting and scientific management, so that the information security of the owner is preferably protected, from causing personal information, privacy information, kith and kin Information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;It can be dynamic according to the use habit of user State finely tunes parameter, improves flexibility and the user experience of unlock;It can guarantee that the data of storage can not be restored by cracking incomer, be had Effect ground improves data-handling efficiency, improves user experience, and by selectively transmitting, reduces the communication of wireless transmission Amount.
The technical solution that the present invention takes to solve above-mentioned technical problem are as follows: a kind of information processing method includes: when using Family when triggering electronic equipment, shows unlocked by fingerprint by pressing physical button or with finger touch sensor on the screen Mode;User inputs and verifies according to the first unlocking manner, and authentication failed then selects other one or more different solutions Lock mode, is proved to be successful, and is arranged wait store the content with peep-proof and leakage;Other one or more different unlocking manners Authentication failed then shoots the image of the user of unlock failure, and sends the image to intended destination and/or be shown in screen On, it is proved to be successful, is arranged wait store the content with peep-proof and leakage;User selects storage or encryption change after simple transformation It changes and stores;It will be stored with peep-proof and the content of leakage to the specified region of electronic equipment, and shown wait store after simple transformation Diagram mark;By wait store the content with peep-proof and leakage after enciphering transformation, the specified region of the electronic equipment is arrived in part storage, In addition part is stored to remote equipment, and shows icon;When user's trial display has stored the content with peep-proof and leakage, Application prompts user inputs password, after verified, from the specified region of the electronic equipment or the electronic equipment Specified region and remote equipment call the stored content with peep-proof and leakage, to show on the screen.
In one embodiment, it when user exits the application program or browsing other applications, will transfer through depositing Storage is deleted from buffer with peep-proof and the content of leakage, and is guaranteed the specified region for being only stored in electronic equipment or be somebody's turn to do On the specified region of electronic equipment and remote equipment
In one embodiment, this method specifically includes: step 1, when user by pressing physical button or uses finger Touch sensor when triggering electronic equipment, shows the first unlocking manner on the screen;Step 2, user is according to the first unlock side Formula is inputted, and is then entered step 7 if the verification passes, is otherwise entered step 3;Step 3, the second unlock side is shown on the screen Formula;Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step 5; Step 5, step 4 is repeated, if user's the second unlocking manner frequency of failure reaches first threshold, suspends unlock up to the time Section selects other unlocking manners or the camera lens by electronic equipment later, and shooting unlocks the image of the user of failure, and It sends the image to intended destination and is displayed on the screen;Step 6, start after user's checking hidden involved in electronic equipment When the application program of private, the application program presentation content;Step 7: user, which is directed to, to be stored with peep-proof and leakage Content is selected and is arranged, and selects to store after storage or enciphering transformation after simple transformation;Step 8: becoming if it is simple It being stored after changing, then format conversion will be carried out with peep-proof and the content of leakage wait store, the specified region of electronic equipment is arrived in storage, And when the contextual information of the content is shown, display icon in side's is on the screen to have prompted to have stored with peep-proof and leakage Content, and execute step 10;It step 9, then will be wait store the content with peep-proof and leakage if it is being stored after enciphering transformation Format conversion is carried out, the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment;Wherein if The quantity for waiting storing the content with peep-proof and leakage is greater than predetermined threshold, then extracts partial data shape using random number algorithm At the first transformation data sequence, only by the first transformation data sequence storage to remote equipment;In the contextual information of the content When shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage, and executes step 10;Step Rapid 10, when the icon is when the user clicks to attempt display, application prompts user inputs password, after verified, from this The specified region of electronic equipment or the specified region of the electronic equipment and remote equipment call stored with peep-proof and leakage Content.
In one embodiment, if user's the second unlocking manner frequency of failure reaches first threshold, suspend unlock and reach One period T, after period T, if user still passes through the second unlocking manner and attempts unlock, in its second method solution After lock frequency of failure sum accumulation reaches the 6th threshold value greater than first threshold, one of following manner is selected: extending temporary Stop unlocked time section T ', wherein T ' > T;Start third unlocking manner, wherein third unlocking manner be Password Input, slidably input, Any one in living things feature recognition input, action input, if the third unlocking manner frequency of failure is up to six threshold values, solution Failure signal is sent to electronics processors by lock module, to shut down after shooting and showing and transmit image;Work as unlock The frequency of failure reach first threshold perhaps six threshold values when illustrate that the user for attempting unlock is that nonowners or biological characteristic are known The other changed owner of information, at this time in order to ensure information safety, by the camera lens of electronic equipment, shooting unlock is lost The image of the user lost, and send the image to intended destination and/or be displayed on the screen;Wherein it is sent to predetermined purpose The operation on ground are as follows: the owner in advance leads to unlocked state and social application program, global positioning system application program, starting movement The application program of letter is associated, matches and is arranged, and when aforementioned unlock unsuccessfully reaches certain number, it is fixed that unlocked state opens the whole world The application program of position system application and starting mobile communication, and by searching for the widget on the desktop of electronic equipment And start social application program, wherein preset contact person is inquired, by the present image of the user of the unlock failure of shooting Be transferred to preset contact person, and by social application program, via mobile network by the geographical coordinate of the electronic equipment Positioning be sent to preset contact person so that preset contact person obtain the electronic equipment position and attempt solution The information of the people of lock;In addition, in order to promote the people for attempting to unlock that can give back the electronic equipment, the screen of the electronic equipment is also aobvious Show the image of the user of the unlock failure of shooting, and shows owner's contact method and/or the contact method of its kith and kin.
In one embodiment, selecting a certain range of content to be stored includes: that finger is rested on application program In some position at reach certain time, keep touching screen later and move up or down, the window of the application program at this time By pullup or pulldown, when reaching at the position of user's expectation storage, user's finger is stopped at another position in the application It stays up to certain time, when user's finger is removed from touch screen, to the letter between another position at some described position Breath is chosen.Or: selecting a certain range of content to be stored includes: some position by finger stop in the application Place is set up to certain time, finger is removed from touch screen later, and within another specified time, by pulling scroll bar to realize application The pullup or pulldown of the window of program, when reaching user and it is expected at the position of storage, user's finger in the application another It is stopped at a position and reaches certain time, then when user's finger is removed from touch screen, arrive another position at some described position Information between setting is chosen.
In one embodiment, simple transformation are as follows: user selectes a certain range of in the window that application program is presented Content to be stored.Selected information is converted to picture format by screenshot mode by conversion module later, and executes following behaviour Make: calculating the pixel of the picture, obtain u × v pixel, which is divided into P mutually non-overlapping image tiles, by the figure As the pixel value of tile is according to quantity sequential from less to more, sequence tile1, tile2 ... ... of image tiles is obtained, Tilew takes the median in the sequence to obtain the median image tile of the sequence, wherein taking the sequence number to be when w is even number The image tiles of w value half are as median image tile, and when w is odd number, taking sequence number is the integer part of w value half Image tiles are as median image tile;Calculate the w-1 of the pixel of other image tiles in the median image tile and the sequence A quantity is poor;Median image tile and the quantity difference of the pixel of each image tile fragment are modified later, to generate offset: Wherein when quantity difference is bigger than the 8th threshold value as positive integer, by the quantity of median image tile and the pixel of the image tile fragment Difference plus one, and when opposite a few hours of the quantity difference than the 8th threshold value as positive integer, by median image tile and the image watt The quantity subtractive one of the pixel of block, and when quantity difference is between the opposite to that number of the 8th threshold value and including between two endpoints, in It is worth image tiles and the quantity difference of the pixel of the image tile fragment is constant;The number of corresponding each pixel in image tiles is traversed later It is poor to measure, according to the quantity difference of median image tile and the pixel of each image tile fragment is modified the offset of generation before, general Binary password position is inserted into the vacancy of offset formation, and is inserted into departure indications between image tile fragment, to realize Format conversion will be carried out with peep-proof and the content of leakage wait store, and then stored into the specified region of electronic equipment, and When the contextual information of the content is shown, side's display icon is on the screen to prompt to have stored in peep-proof and leakage Hold.
In one embodiment, during being selected at some position to the information between another position, pressure Sensor judges selected position, and when detecting that effective pressure stops at some position on the touchscreen, Trigger signal is sent to timing module and starts timing, stops timing when detecting that pressure limit is mobile, and at another Same operation is executed at position;Only when timer determines that the period at two positions is above pre-provisioning request, It is considered effectively to select process;Wherein determination carries out selected step at some position are as follows: by the information of the application program It is divided into different parts according to default unit (such as according to every chat record, every short message, every picture), by this The upper bound of the partial middle line between preceding section as the part, by the middle line between back to back part of the part As the lower bound of the part, using the rectangular area between the upper bound, lower bound and the screen left and right sides as the region of the part; When user's finger touches, pressure sensor first determines the satisfactory effective touch range of pressure value, and calculates this effectively It touches range and is located at pixel quantity and its ratio in the different parts, when being fully located at some part, by the part Be determined as selected part, when touching across middle line, the part that ratio is more than half be determined as selected part, and when than It when example is just half, reminds user to select again on the screen, and then repeats the above operation to determine selected part.
In one embodiment, enciphering transformation include the following steps in any one: (1) user application program present Window in, select a certain range of content to be stored;Conversion module is turned selected information by screenshot mode later It is changed to picture format, and executes following operation: the image is decomposed, the image is transformed to horizontal point using wavelet transformation Amount, vertical component, diagonal components and other components, and other components and diagonal components storage are arrived into the electronic equipment Specified region, by horizontal component and vertical component storage to remote equipment;Wherein storage includes: to be based on level to remote equipment Component and vertical component are inserted into the key of user's input between, to generate the first data sequence;And it is directed to first Random number range is arranged in data sequence, selects random number as the increment for the position extracted from the random number range, from first Designated position in data sequence starts to extract byte, which adds random number to obtain next position for extracting byte, sequentially The algorithm is executed, until next byte location is greater than the data volume of the first data sequence, by the byte of the corresponding position of extraction It is extracted from the first data sequence, the random number sequence with sequential is sent together as the first transformation data sequence To the remote equipment of such as cloud server etc, so that remote equipment carries out the first verifying according to the first transformation data sequence, And identifying code is formed, while electronic equipment is arrived into the data storage in the first data sequence in addition to the first transformation data sequence In specified region;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified region of the electronic equipment, Remain use when subsequent calls;(2) user is in the window that application program is presented, select it is a certain range of it is to be stored in Hold;Selected information is converted to picture format by screenshot mode by conversion module later, and executes following operation: by the figure It is 2 that piece, which is divided into size,Q*2QThe image tiles of a pixel, wherein Q is greater than the positive integer equal to 3, and works as the edge of picture When part is unsatisfactory for the image tiles format size, by lack part with 0 polishing;And it is carried out for each image tiles as follows Transformation:Wherein work as p, q When=0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0;Wherein p and q is coordinate, wherein 2Q*2Q The image tiles of a pixel are the discrete function of p and q, 2Q*2QIn a output, frequency is zero in the horizontal and vertical directions Output result by the first part as the image tiles, and remaining output result by second as the image tiles Point;The each image tiles for traversing the picture obtain its respective first part and second part, and are formed first part Sequence and second part sequence, and by the storage of second part sequence to the specified region of the electronic equipment, by first part's sequence Column are formed together queue storage to remote equipment, so that remote equipment is carried out according to first part's sequence and check code with check code It is teaching and research, and form identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified of the electronic equipment In region, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, guarantee that electronic equipment is lost Or unlock is cracked by nonowners, into after the application program, it can guarantee that data information is imperfect, so that cracking incomer The partial data can not be restored, ensure that information is not leaked;Simultaneously because not needing to all wait store with peep-proof and let out The content of dew is encrypted, and data-handling efficiency can be effectively improved, and improves user experience.
In addition, a kind of information processing system is also disclosed, the information processing system include memory, processor, application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement Sensing module, gravity sensor, camera, camera lens, social application program, conversion module, global positioning system program module, starting The application program of mobile communication, timing module, the memory include the program for executing above- mentioned information processing method, the processing Program in the invoked memory of device with application program, Fingerprint Identification Unit, determination module, finger pressure sensor, Xie Suomo Block, environment light determination module, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application journey Sequence, global positioning system program module, starts the application program of mobile communication, the timing module letter together at conversion module One or more of the step of ceasing processing method.
Detailed description of the invention
In the accompanying drawings by way of example rather than the embodiment of the present invention is shown by way of limitation, wherein phase Same appended drawing reference indicates identical element, in which:
According to an exemplary embodiment of the invention, Fig. 1 illustrates a kind of general flow chart of information processing method.
According to an exemplary embodiment of the invention, the structure chart of Fig. 2 pictorial information processing system.
Specific embodiment
Before carrying out following specific embodiments, certain words and phrase used in the patent document are illustrated Definition may be advantageous: term " includes " and "comprising" and its derivative mean to include without limiting;Term "or" is Include, it is meant that and/or;Phrase " with ... it is associated ", " associated with it " and its derivative might mean that including quilt Be included in ... it is interior, with ... interconnection, include be comprised in ... it is interior, be connected to ... or with ... connect, be coupled to ... or With ... couple, can be with ... communicate, with ... cooperation interweaves, and side by side, approaches ..., be bound to ... or with ... binding, tool Have, attribute having ..., etc.;And term " controller " mean to control any equipment of at least one operation, system or its Component, such equipment may be realized with some combinations of hardware, firmware or software or wherein at least two.It should be noted that : functionality associated with any specific controller may be centralization or distributed, either local or remote Journey.The definition for being used for certain words and phrase is provided through patent document, it should be understood by those skilled in the art that: if not In most cases, in many cases, such definition is suitable for word and phrase existing and define in this way not To use.
In the following description, several specific embodiments with reference to attached drawing and are diagrammatically shown.It will be appreciated that It is contemplated that and other embodiments can be made without departing from the scope of the present disclosure or spirit.Therefore, described in detail below should not be by Think in a limiting sense.
According to an exemplary embodiment of the invention, Fig. 1 illustrates a kind of general flow chart of information processing method.Specifically, should Method includes:
Step 1, when user is by pressing physical button or with finger touch sensor, when triggering electronic equipment, The first unlocking manner is shown on screen;
Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise enters step Rapid 3;
Step 3, the second unlocking manner is shown on the screen;
Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step Rapid 5;
Step 5, step 4 is repeated to suspend unlock if user's the second unlocking manner frequency of failure reaches first threshold and reach One period selected other unlocking manners or the camera lens by electronic equipment later, the user's of shooting unlock failure Image, and send the image to intended destination and/or be displayed on the screen;
Step 6, when starting the application program of privacy involved in electronic equipment after user's checking, in application program presentation Hold;
Step 7: user is directed to the content stored with peep-proof and leakage, is selected and is arranged, and selected It is stored after storage or enciphering transformation after simple transformation;
Step 8: if it is storing after simple transformation, then format change will be carried out with peep-proof and the content of leakage wait store It changes, the specified region of electronic equipment is arrived in storage, and when the contextual information of the content is shown, on the screen side's display icon There is the content stored with peep-proof and leakage with prompt, and executes step 10;
Step 9, if it is storing after enciphering transformation, then format change will be carried out with peep-proof and the content of leakage wait store It changes, the specified region of the electronic equipment is arrived in part storage, and part in addition is stored to remote equipment, and in the context of the content When information is shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage, and executes step 10;
Step 10, when the icon is when the user clicks to attempt display, application prompts user inputs password, verified Later, it is called from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment stored with peep-proof Depending on and leakage content, to show on the screen;It, will and when user exits the application program or browsing other applications Transfer it is stored deleted from buffer with peep-proof and the content of leakage, and guarantee to be only stored in the specified of electronic equipment On region or the specified region and remote equipment of the electronic equipment.
According to an exemplary embodiment of the invention, the first unlocking manner and the second unlocking manner can be Password Input, cunning Dynamic input, living things feature recognition input, any one in action input.
According to an exemplary embodiment of the invention, the first unlocking manner is living things feature recognition input, wherein in step 2 In, user inputs according to the first unlocking manner and verifying includes: that Fingerprint Identification Unit and finger pressure are provided in electronic equipment Power sensor, when finger is placed on Fingerprint Identification Unit by user, Fingerprint Identification Unit acquires and identifies its finger print information, and with it is pre- The preset fingerprint determined in database is compared, and fingerprint results are transmitted to the determination module in electronic equipment;User is by hand While finger is placed on Fingerprint Identification Unit, other fingers are placed on the finger pressure sensor on electronic equipment screen, the finger Pressure sensor acquires the pressure of other fingers application, and determines that pressure value is greater than second threshold in finger and screen contact area Dot matrix quantity, and calculate apply the satisfactory touch area of pressure accordingly, and then according to by historian database Third threshold value and the 4th threshold value between the default touch areal extent that limits determine that user applies the satisfactory touch of pressure Whether area falls into the default touch areal extent of the restriction, and by whether fall into the restriction default touch areal extent knot Fruit is transmitted to the determination module in electronic equipment;Whether the determination module is by according to fingerprint results and falling into the pre- of the restriction If touching the result of areal extent to determine whether to match by verifying when fingerprint exists with the preset fingerprint in reservations database Relationship, and user applies pressure satisfactory touch area when falling into the default touch areal extent of the restriction, and this is sentenced The result being verified is output to the unlocked state of electronic equipment by cover half block, and otherwise the determination module is by the result of authentication failed It is output to the unlocked state of electronic equipment;Wherein fingerprint whether there is sentencing for matching relationship with the preset fingerprint in reservations database In fixed, need to determine whether the similar proportion of the preset fingerprint in fingerprint and reservations database is greater than the 5th threshold value, if it is greater than Then there is matching relationship, matching relationship is otherwise not present;Wherein every time in verifying, whenever user applies the satisfactory touching of pressure When touching area and falling into the default touch areal extent by being limited between third threshold value and the 4th threshold value, after this time verifying, The user of this time is applied the satisfactory numerical value for touching area of pressure to be input in historian database, with historical record In N item touch the record of area and be averaged, and the range of the positive and negative certain proportion of the average result (± M%) is selected as newly Third threshold value and the 4th threshold value improve the flexibility of unlock so that the use habit for making it possible to according to user is finely adjusted And user experience, guarantee the information security of electronic equipment.
According to an exemplary embodiment of the invention, the second unlocking manner is living things feature recognition input, wherein in step 4 In, user inputs according to the second unlocking manner and verifying includes: that environment light determination module, eye are provided in electronic equipment Determination module and movement sensing module containing gravity sensor;When entering the second unlocking manner, environment light determination module The power of environment light is determined, if meeting strong environment cursor criterion starting eye determination module, if meeting weak environment light standard Then start movement sensing module, and the selection mode of starting is shown on a display screen;Wherein eye determination module passes through camera Camera lens, the video of the mobile variation of shooting user's eye, and analyze the position of eyeball in every frame in the video, comprehensive judgement user The mobile variation of eye, and the mobile variation track of user's eye is compared with the record in eye determination module, when true Determine to solve lock screen when matching degree meets the requirements, user is notified to unlock failure when determining that matching degree is undesirable.It is clapped Take the photograph and analyze operation are as follows: when screen shows eye determination module, image or text prompt user on screen are watched electronics attentively and set Standby Front camera simultaneously moves eyeball at the appointed time in section, and keeps specified distance range with Front camera, keeps Palm grip electronic equipment does not shake, which can guarantee that camera can capture the movement of user eyeball, while camera is opened Screening-mode, and at the appointed time multiple frames in section in the video of the acquisition shooting, pass through the gray scale analyzed in every frame image Change big region, lock eyes, concrete operations are as follows: smooth operation is executed to every frame image using filter, is obtained The convolution results of present image and filter;The gradient magnitude of Difference Calculation adjacent pixel, when gradient is greater than the threshold value of setting, Region where determining the image is area-of-interest, and records its coordinate value in this frame image;Count the region of interest The grayscale information in domain, and carry out binaryzation;By sequentially scanning in the horizontal and vertical directions, determine in close on two pixels The variation of gray value when being greater than seven threshold values, calculate rest of pixels sequence in this direction, and the variation of gray value is drawn At curve, show the boundary for reaching sclera and iris when there is maximum, show pupil position when there is minimum, when out Show the boundary for reaching iris and sclera when existing second maximum, executes same operation to capture another eyes in the frame Location information and coordinate values in image;The position of two pupils in consecutive frame is successively analyzed later, and according to every frame figure The coordinate values of each pupil draw the moving curve of eyes of user as in;And the eyes curve of drafting and eye are determined into mould Record in block is compared, and solves lock screen when determining that at least one in eyes and the matching degree of record meet the requirements.Example Such as when user has pre-registered " √ " shape unlocking pin in record, the moving curve and note of at least one in the eyes of drafting The matching degree of record meets the requirements, then being shown to be the user is the owner.In addition, if meeting weak environment cursor criterion starting fortune Dynamic sensing module, and the selection mode of starting is shown on a display screen, remind user to hold the electronic equipment and specified The electronic equipment is shaken with certain track in period, the gravity sensor root in the movement sensing module in the electronic equipment According to the variation of the acceleration in electronic equipment at the appointed time section, by movement sensing module rendering accelerating degree change curve, from And be compared with the record in movement sensing module, when in the acceleration change curve for determining acceleration change curve and record One matching degree solve lock screen when meeting the requirements.Such as when user has pre-registered " N " shape unlocking pin in record When, when user hold electronic equipment and at the appointed time the estimation move in section be also N, and acceleration change curve with record The matching degree of acceleration change curve when meeting the requirements, then being shown to be the user is the owner.
According to an exemplary embodiment of the invention, step 5 further comprises: if user's the second unlocking manner frequency of failure Reach first threshold, then suspends unlock up to a period T, after period T, if user still passes through the second unlocking manner Attempt unlock, then after the unlock frequency of failure sum accumulation of its second method reaches greater than the 6th threshold value of first threshold, choosing It selects one of following manner: extending pause unlocked time section T ', wherein T ' > T;Start third unlocking manner, wherein third solution Lock mode is Password Input, slidably input, living things feature recognition input, any one in action input, if third unlocks When the mode frequency of failure is up to six threshold values, failure signal is sent to electronics processors to shut down by unlocked state.Work as unlock The frequency of failure reach first threshold perhaps six threshold values when illustrate that the user for attempting unlock is that nonowners or biological characteristic are known The other changed owner of information, at this time in order to ensure information safety, by the camera lens of electronic equipment, shooting unlock is lost The image of the user lost, and send the image to intended destination and/or be displayed on the screen;Wherein it is sent to predetermined purpose The operation on ground are as follows: the owner in advance leads to unlocked state and social application program, global positioning system application program, starting movement The application program of letter is associated, matches and is arranged, and when aforementioned unlock unsuccessfully reaches certain number, it is fixed that unlocked state opens the whole world The application program of position system application and starting mobile communication, and by searching for the widget on the desktop of electronic equipment And start social application program, wherein preset contact person is inquired, by the present image of the user of the unlock failure of shooting Be transferred to preset contact person, and by social application program, via mobile network by the geographical coordinate of the electronic equipment Positioning be sent to preset contact person so that preset contact person obtain the electronic equipment position and attempt solution The information of the people of lock;In addition, in order to promote the people for attempting to unlock that can give back the electronic equipment, the screen of the electronic equipment is also aobvious Show the image of the user of the unlock failure of shooting, and shows owner's contact method or the contact method of its kith and kin.Pass through The setting can be effectively facilitated the safety of the information of electronic equipment.
Preferably, the owner of the electronic equipment is in advance by the social applications such as unlocked state and wechat (wechat), positioning Program, wireless network startup program are associated, match and are arranged, and when aforementioned unlock unsuccessfully reaches certain number, unlocked state is opened It opens global positioning system application program and starts the application program of mobile communication, and by searching for the window on the desktop of electronic equipment Mouth widget simultaneously starts the social applications such as wechat, inquires wherein preset contact person (for example, " wife Zhang Qing "), will shoot The present image of user of unlock failure be transferred to wife Zhang Qing, and by the social applications such as wechat, via wireless network, pass through Finder the positioning (such as " position " in the social applications such as wechat) of the geographical coordinate of the electronic equipment is sent to (such as Start " sending position " function or " shared real time position " function in " position " in the social applications such as wechat) wife The mountain valley with clumps of trees and bamboo, so that wife opens the information that the mountain valley with clumps of trees and bamboo obtains the position of the electronic equipment and attempts the people of unlock;In addition, in order to promote to attempt to unlock People can give back the electronic equipment, the screen of the electronic equipment also shows the image of the user of the unlock failure of shooting, and Show owner's contact method or the contact method of its kith and kin;Preferably, " position " in the social applications such as starting wechat In " shared real time position " function after, keep the state of activation of the function, wait preset contact person according to the position Confidence breath carries out the position positioning of electronic equipment or finds the electronic equipment accordingly, in order to be able to guarantee electronic equipment as early as possible Ground is returned or is found, and reduces the loss of information leakage bring.
According to an exemplary embodiment of the invention, in step 8, simple transformation are as follows: the window that user is presented in application program In mouthful, a certain range of content to be stored is selected.Conversion module is converted to selected information by screenshot mode later Picture format, and execute following operation: the pixel of the picture is calculated, u × v pixel is obtained, which is divided into P mutual nothings The image tiles (tile) of overlapping obtain image watt by the pixel value of the image tiles according to quantity sequential from less to more Sequence tile1, tile2 ... ... of piece, tilew take the median in the sequence to obtain the median image tile of the sequence, In when w is even number, take the image tiles that sequence number is w value half as median image tile, when w is odd number, take sequence Column number is the image tiles of the integer part of w value half as median image tile;Calculate the median image tile and the sequence W-1 quantity of the pixel of other image tiles is poor in column;Later by the pixel of median image tile and each image tile fragment Quantity difference is modified, to generate offset: wherein when quantity difference is bigger than the 8th threshold value as positive integer, by median image The quantity difference of the pixel of tile and the image tile fragment adds one, and when quantity difference is smaller than the opposite number of the 8th threshold value as positive integer When, by the quantity subtractive one of median image tile and the pixel of the image tile fragment, and when quantity difference is between the 8th threshold value and its phase Anti- number and when including between two endpoints, median image tile and the quantity difference of the pixel of the image tile fragment are constant;It traverses later The quantity of corresponding each pixel is poor in image tiles, according to before by the pixel of median image tile and each image tile fragment Quantity difference is modified the offset of generation, binary password position is inserted into the vacancy of offset formation, and in image watt It is inserted into departure indications between block, so that format conversion will be carried out wait store with peep-proof and the content of leakage by realizing, and then stores Into the specified region of electronic equipment, and when the contextual information of the content is shown, display icon in side's is on the screen to mention It is shown with the content stored with peep-proof and leakage.
At some position to the information between another position it is chosen during, pressure sensor is for selected Position is judged, and when detecting that effective pressure stops at some position on the touchscreen, trigger signal is sent to Timing module simultaneously starts timing, stops timing when detecting that pressure limit is mobile, and executes similarly at another position Operation;Only when timer determines that the period at two positions is above pre-provisioning request, just it is considered effectively selected Process;Wherein at some position determination carry out selected step are as follows: by the information of the application program according to default unit (such as According to every chat record, every short message, every picture) be divided into different parts, by the part and preceding section Between the upper bound of the middle line as the part, using the middle line between back to back part of the part as under the part Boundary, using the rectangular area between the upper bound, lower bound and the screen left and right sides as the region of the part;When user's finger touches When, pressure sensor first determines the satisfactory effective touch range of pressure value, and calculates effective touch range and be located at not The part is determined as selected portion when being fully located at some part by pixel quantity and its ratio in the same part Point, when touching across middle line, the part that ratio is more than half is determined as selected part, and when ratio is just half When, remind user to select again on the screen, and then repeat the above operation to determine selected part.
According to an exemplary embodiment of the invention, enciphering transformation is the following steps are included: the window that user is presented in application program In mouthful, a certain range of content to be stored is selected;Conversion module is converted to selected information by screenshot mode later Picture format, and execute following operation:
The image is decomposed, the image is transformed to horizontal component, vertical component, diagonal line point using wavelet transformation Amount and other components, and by other components and diagonal components storage to the specified region of the electronic equipment, by level point Amount and vertical component are stored to remote equipment;Wherein storing to remote equipment includes: based on horizontal component and vertical component, two The key of user's input is inserted between person, to generate the first data sequence;And it is directed to the first data sequence, random number is set Range, selects random number as the increment for the position extracted from the random number range, the specific bit from the first data sequence It sets and starts to extract byte, which adds random number to obtain next position for extracting byte, the algorithm is sequentially executed, until next A byte location is greater than the data volume of the first data sequence, and the byte of the corresponding position of extraction is extracted from the first data sequence Out, such as cloud server etc is sent to together as the first transformation data sequence with the random number sequence of sequential Remote equipment and form identifying code so that remote equipment carries out the first verifying according to the first transformation data sequence, while by the Data in one data sequence in addition to the first transformation data sequence are stored into the specified region of electronic equipment;Reception is remotely set The standby identifying code returned, and the identifying code is stored in the specified region of the electronic equipment, remain use when subsequent calls.According to This, can guarantee the safety of information in electronic equipment, guarantee that electronic equipment is lost or cracks unlock by nonowners, answers into this It after program, can guarantee that data information is imperfect, so that the partial data can not be restored by cracking incomer, ensure that information It is not leaked;Simultaneously because not needing effectively mention to all encrypting wait store with peep-proof and the content of leakage High data-handling efficiency improves user experience;And pass through and selectively transmit, reduces the traffic of wireless transmission, it is this Situation is especially effective for a large amount of data to be stored.
According to an exemplary embodiment of the invention, alternatively, enciphering transformation is the following steps are included: user is in application program In existing window, a certain range of content to be stored is selected;Conversion module is by screenshot mode later, by selected information It is converted to picture format, and executes following operation: at size being 2 by the picture segmentationQ*2QThe image tiles of a pixel, wherein Q It is greater than the positive integer equal to 3, and when the marginal portion of picture is unsatisfactory for the image tiles format size, by lack part With 0 polishing;And such as down conversion is carried out for each image tiles:Wherein work as p, when q=0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0;Wherein p and q is coordinate, wherein 2Q*2QA pixel Image tiles be p and q discrete function, 2Q*2QIn a output, frequency is zero output in the horizontal and vertical directions As a result by the first part as the image tiles, and remaining output result is by the second part as the image tiles;Time The each image tiles for going through the picture obtain its respective first part and second part, and are formed first part's sequence With second part sequence, and by second part sequence storage arrive the electronic equipment specified region, by first part's sequence with Check code is formed together queue storage to remote equipment, so that remote equipment is taught according to first part's sequence and check code It grinds, and forms identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified area of the electronic equipment In domain, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, guarantee electronic equipment lose or Crack unlock, into after the application program by nonowners, can guarantee that data information is imperfect so that crack incomer without Method restores the partial data, ensure that information is not leaked;Simultaneously because not needing to all wait store with peep-proof and leakage Content encrypted, can effectively improve data-handling efficiency, improve user experience.
Preferably, selecting a certain range of content to be stored includes: that finger is stopped in the application some (such as chat record, short message, picture) reaches certain time at position, and touch screen is kept to move up or down later, The window of the application program is by pullup or pulldown at this time, and when reaching at the position of user's expectation storage, user's finger is applying journey (such as another chat record, another short message, another picture) is stopped up to a timing at another position in sequence Between, it is chosen to the information between another position at some described position when user's finger is removed from touch screen.
Alternatively, selecting a certain range of content to be stored includes: that finger is stopped in the application some (such as chat record, short message, picture) reaches certain time at position, and finger is removed from touch screen later, and in another finger In fixing time, the pullup or pulldown of the window by pulling scroll bar realization application program reaches the position that user it is expected storage When place, at another position of user's finger in the application (such as it is another chat record, another short message, another One picture) it stops up to certain time, then when user's finger is removed from touch screen, another position is arrived at some described position Information between setting is chosen.
According to an exemplary embodiment of the invention, in step 10, when icon is when the user clicks to attempt display, the application Program reminds user to input password, after verified, the application program launching mobile network communication, from the specified of the electronic equipment The stored content with peep-proof and leakage is called in the specified region and remote equipment of region or the electronic equipment, when being simple When storing after transformation, binary password position is inputted, and then remove by binary password position, according to division from the content of storage When departure indications extract each image tiles, than generating the pixel of image tiles according to quantity sequential from less to more Quantity is poor, and traverses each image tiles, when the quantity difference of intermediate value image tiles and the pixel of each image tile fragment is greater than the Eight threshold values a period of time, by the quantity subtractive one, when the quantity difference of intermediate value image tiles and the pixel of each image tile fragment is less than the 8th When threshold value adds one opposite number, which is added one, when quantity difference is between the opposite to that number of the 8th threshold value and including two ends When between point, median image tile and the quantity difference of the pixel of the image tile fragment are constant;Thus realize the image tiles of image Inverse offset restores the peep-proof of storage and the content of leakage by the splicing of image tiles.
When storing after for enciphering transformation, the first transformation data sequence is received from the remote equipment of such as cloud server etc Column decompose the random number sequence of sequential therein and the first data sequence extracted, and are become by identifying code verifying first Data sequence is changed, the random number sequence based on sequential and the first data sequence extracted, retrospectively calculate extract the position of byte It sets, restores the designated position in the first data sequence, and then obtain the first data sequence, the key inputted by user is raw At horizontal component and vertical component, other components and diagonal components, root then are extracted from the specified region of the electronic equipment According to the component, original image is obtained by inverse transformation.
Alternatively, when storing after for enciphering transformation, identifying code is transferred from the specified region of electronic equipment, and sent out Remote equipment is given, reduction is carried out by remote equipment and forms first part's sequence and check code, and the two is sent back into electronics and is set Standby, electronic equipment proofreads first part's sequence according to check code, and based on the second part sequence stored in specified region, passes through If down conversion restores original image tile,Wherein work as p, when q=0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0.
According to an exemplary embodiment of the invention, the structure chart of Fig. 2 pictorial information processing system.The wherein information processing system System includes memory, processor, application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment Light determination module, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, transformation mould Block, global positioning system program module, the application program for starting mobile communication, timing module, which includes for executing The program of above- mentioned information processing method, program in the invoked memory of the processor with application program, Fingerprint Identification Unit, sentence Cover half block, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement sensing module, gravity Sensor, camera lens, social application program, conversion module, global positioning system program module, starts answering for mobile communication at camera One or more of the step of executing above- mentioned information processing method together with program, timing module.
Above-mentioned each technical term is the routine techniques term with common meaning in this field, in order not to obscure this The emphasis of invention, is not further explained it herein.
It to sum up, in the inventive solutions, can be to electronic equipment by using a kind of information processing method Information setting and scientific management are carried out, so that the information security of the owner is preferably protected, from causing personal information, privacy letter Breath, kith and kin's information and the leakage for associating data;And it can be returned after promoting electronic equipment to lose;It can be according to the use of user It is accustomed to dynamic micro-adjustments parameter, improves flexibility and the user experience of unlock;It can guarantee that storage can not be restored by cracking incomer Data effectively improve data-handling efficiency, improve user experience, and by selectively transmitting, reduce wireless biography The defeated traffic.
It will be appreciated that example and reality of the invention can be realized in the form of the combination of hardware, software or hardware and software Apply example.As described above, any main body for executing this method can be stored, in the form of volatility or non-volatile holographic storage, such as Equipment is stored, as ROM, whether no matter can erasing or is rewritable, or in the form of a memory, such as RAM, storage core Piece, equipment or integrated circuit or on the readable medium of light or magnetic, such as CD, DVD, disk or tape.It will be appreciated that Storage equipment and storage medium are suitable for storing the example of the machine readable storage of one or more programs, upon being performed, One or more of programs realize example of the invention.Via any medium, such as it is loaded with by wired or wireless coupling Signal of communication can electronically transmit example of the invention, and example suitably includes identical content.
It is to be noted that because the present invention, which solves, to carry out information setting and scientific management to electronic equipment, from And the information security of the owner is preferably protected, from causing letting out for personal information, privacy information, kith and kin's information and contacts data Dew;And it can be returned after promoting electronic equipment to lose;Unlock can be improved according to the use habit dynamic micro-adjustments parameter of user Flexibility and user experience;It can guarantee that the data of storage can not be restored by cracking incomer, effectively improve data processing effect Rate improves user experience, and by the technical issues of selectively transmitting, reducing the traffic of wireless transmission, uses Technical staff instructs technological means to understand according to it after reading this description in field of computer technology, and obtains Advantageous effects are taken, so claimed scheme belongs to the technical side on patent law purposes in the following claims Case.In addition, because the claimed technical solution of appended claims can be made or used in industry, program tool Standby practicability.
The above, preferable specific embodiment only of the invention, but protection scope of the present invention is not limited to This, anyone skilled in the art in the technical scope disclosed by the present invention, the variation that can readily occur in or replaces It changes, should all forgive within protection scope of the present invention.Unless be otherwise expressly recited, otherwise disclosed each feature is only It is equivalent or similar characteristics a example for general series.Therefore, protection scope of the present invention should be with claims Subject to protection scope.

Claims (10)

1. a kind of information processing method, comprising:
When user is by pressing physical button or with finger touch sensor, when triggering electronic equipment, show on the screen Unlocked by fingerprint mode;
User inputs and verifies according to the first unlocking manner, and authentication failed then selects other one or more different unlocks Mode is proved to be successful, and is arranged wait store the content with peep-proof and leakage;
Other one or more different unlocking manner authentication faileds then shoot the image of the user of unlock failure, and by the image It is sent to intended destination and/or is displayed on the screen, be proved to be successful, be arranged wait store the content with peep-proof and leakage;
User stores still enciphering transformation after selecting simple transformation and stores;
It will be stored with peep-proof and the content of leakage to the specified region of electronic equipment wait store after simple transformation, and show figure Mark;
By wait store the content with peep-proof and leakage after enciphering transformation, the specified region of the electronic equipment is arrived in part storage, separately Outer part is stored to remote equipment, and shows icon;
User attempts to show that application prompts user inputs password, experience when having stored the content with peep-proof and leakage After card, from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment call it is stored to prevent The content pried through and revealed, to show on the screen.
2. information processing method according to claim 1, wherein further comprising:
User exit the application program or browsing other applications when, by transfer it is stored with peep-proof and leakage in Appearance deleted from buffer, and guarantee be only stored in electronic equipment specified region or the electronic equipment specified region and On remote equipment.
3. information processing method according to claim 2, wherein this method is specifically included:
Step 1, when user is by pressing physical button or with finger touch sensor, when triggering electronic equipment, in screen The first unlocking manner of upper display;
Step 2, user inputs according to the first unlocking manner, then enters step 7 if the verification passes, otherwise enters step 3;
Step 3, the second unlocking manner is shown on the screen;
Step 4, user inputs according to the second unlocking manner, then enters step 7 if the verification passes, otherwise enters step 5;
Step 5, step 4 is repeated, if user's the second unlocking manner frequency of failure reaches first threshold, suspends unlock up to for the moment Between section, select other unlocking manners or the camera lens by electronic equipment later, the image of the user of shooting unlock failure, And it sends the image to intended destination and is displayed on the screen;
Step 6, when starting the application program of privacy involved in electronic equipment after user's checking, the application program presentation content;
Step 7: user is directed to the content stored with peep-proof and leakage, is selected and is arranged, and selects simple It is stored after storage or enciphering transformation after transformation;
Step 8: if it is being stored after simple transformation, then format conversion will be carried out with peep-proof and the content of leakage wait store, deposited The specified region of electronic equipment is stored up, and when the contextual information of the content is shown, display icon in side's is on the screen to mention It is shown with the content stored with peep-proof and leakage, and executes step 10;
Step 9, if it is storing after enciphering transformation, then format conversion, portion will be carried out with peep-proof and the content of leakage wait store The specified region for dividing storage to arrive the electronic equipment, part in addition are stored to remote equipment;It wherein if should be wait store with peep-proof Depending on and leakage content quantity be greater than predetermined threshold, then using random number algorithm extract partial data formed first transformation data Sequence, only by the first transformation data sequence storage to remote equipment;When the contextual information of the content is shown, in screen Top display icon executes step 10 to prompt to have stored the content with peep-proof and leakage;
Step 10, when the user clicks the icon with attempt display when, application prompts user input password, it is verified it Afterwards, it is called from the specified region and remote equipment of the specified region of the electronic equipment or the electronic equipment stored with peep-proof With the content of leakage.
4. information processing method according to claim 3, in which:
If user's the second unlocking manner frequency of failure reaches first threshold, suspend unlock up to a period T, in period T Later, if user still passes through the second unlocking manner and attempts unlock, in the unlock frequency of failure sum accumulation of its second method After reaching the 6th threshold value greater than first threshold, one of following manner is selected: extending pause unlocked time section T ', wherein T'>T;Start third unlocking manner, wherein third unlocking manner is Password Input, slidably inputs, living things feature recognition input, moves Any one in inputting, if the third unlocking manner frequency of failure is up to six threshold values, unlocked state sends out failure signal Electronics processors are given, to shut down after shooting and showing and transmit image;When the unlock frequency of failure reaches the first threshold Illustrate that attempting the user of unlock is nonowners or biological characteristic recognition information changed institute when being worth perhaps six threshold value The person of having, at this time in order to ensure information safety, by the camera lens of electronic equipment, the image for the user that shooting unlock fails, and It sends the image to intended destination and/or is displayed on the screen;Wherein it is sent to the operation of intended destination are as follows: the owner In advance by unlocked state and social application program, global positioning system application program, the application program progress for starting mobile communication Association, matching and setting, when it is aforementioned unlock unsuccessfully reach certain number when, unlocked state open global positioning system application program and Start the application program of mobile communication, and by searching for the widget on the desktop of electronic equipment and starts social application journey Sequence inquires wherein preset contact person, the present image of the user of the unlock failure of shooting is transferred to preset Contact person, and be sent to the positioning of the geographical coordinate of the electronic equipment in advance by social application program, via mobile network The contact person of setting, so that preset contact person obtains the position of the electronic equipment and attempts the information of the people of unlock;This Outside, in order to promote the people for attempting to unlock that can give back the electronic equipment, the screen of the electronic equipment also shows that the unlock of shooting is lost The image of the user lost, and show owner's contact method and/or the contact method of its kith and kin.
5. information processing method according to claim 4, in which:
Selecting a certain range of content to be stored includes: to stop finger at some position in the application up to certain Time keeps touch screen to move up or down later, and pullup or pulldown is reached user by the window of the application program at this time It is expected that being stopped at another position of user's finger in the application when at the position of storage and reaching certain time, work as user hand Refer to from when touch screen removal, is selected at some described position to the information between another position.
6. information processing method according to claim 4, in which:
Selecting a certain range of content to be stored includes: to stop finger at some position in the application up to certain Time, finger is removed from touch screen later, and within another specified time, by pulling scroll bar to realize the window of application program Pullup or pulldown, reach user it is expected storage position at when, user's finger is stopped at another position in the application It stays up to certain time, then when user's finger is removed from touch screen, is arrived between another position at some described position Information is chosen.
7. information processing method according to claim 5 or 6, in which:
Simple transformation are as follows: user selectes a certain range of content to be stored in the window that application program is presented.Become later It changes the mold block and selected information is converted to by picture format by screenshot mode, and execute following operation: calculating the picture of the picture Element obtains u × v pixel, which is divided into P mutually non-overlapping image tiles, the pixel value of the image tiles is pressed According to quantity sequential from less to more, sequence tile1, tile2 ... ... of image tiles is obtained, tilew takes in the sequence Median obtains the median image tile of the sequence, wherein taking sequence number is the image tiles of w value half when w is even number As median image tile, when w is odd number, take the image tiles that sequence number is the integer part of w value half as intermediate value Image tiles;It calculates the median image tile and w-1 quantity of the pixel of other image tiles in the sequence is poor;Later will in Value image tiles and the quantity difference of the pixel of each image tile fragment are modified, to generate offset: wherein when quantity difference is compared to When big for the 8th threshold value of positive integer, the quantity difference of median image tile and the pixel of the image tile fragment is added one, and works as quantity Difference than the 8th threshold value as positive integer opposite a few hours, median image tile and the quantity of the pixel of the image tile fragment is poor Subtract one, and when quantity difference is between the opposite to that number of the 8th threshold value and including between two endpoints, median image tile and the figure As the quantity difference of the pixel of tile fragment is constant;The quantity for traversing corresponding each pixel in image tiles later is poor, according to general before The quantity difference of the pixel of median image tile and each image tile fragment is modified the offset of generation, and binary password position is inserted Enter in the vacancy formed to the offset, and be inserted into departure indications between image tile fragment, so that realizing will be wait store with peep-proof Format conversion is carried out with the content of leakage, and then is stored into the specified region of electronic equipment, and is believed in the context of the content When breath is shown, display icon in side's is on the screen to prompt to have stored the content with peep-proof and leakage.
8. information processing method according to claim 7, in which:
During being selected at some position to the information between another position, pressure sensor is for selected position Judged, and when detecting that effective pressure stops at some position on the touchscreen, trigger signal is sent to timing Module simultaneously starts timing, stops timing when detecting that pressure limit is mobile, and same operation is executed at another position; Only when timer determines that the period at two positions is above pre-provisioning request, just it is considered effectively to select process; Wherein at some position determination carry out selected step are as follows: by the information of the application program according to default unit (such as according to Every chat record, every short message, every picture) it is divided into different parts, by the part between preceding section The upper bound of the middle line as the part will using the middle line between back to back part of the part as the lower bound of the part Region of the rectangular area as the part between at left and right sides of the upper bound, lower bound and screen;When user's finger touches, pressure Force snesor first determines the satisfactory effective touch range of pressure value, and calculates effective touch range and be located at different institutes State the pixel quantity and its ratio in part, when being fully located at some part, which be determined as to selected part, when across It crosses the centre line when touching, the part that ratio is more than half is determined as selected part, and when ratio is just half, in screen Upper prompting user selectes again, and then repeats the above operation to determine selected part.
9. information processing method according to claim 8, in which:
Enciphering transformation include the following steps in any one:
(1) user selectes a certain range of content to be stored in the window that application program is presented;Conversion module is logical later Screenshot mode is crossed, selected information picture format is converted into, and execute following operation: the image being decomposed, use is small The image is transformed to horizontal component, vertical component, diagonal components and other components by wave conversion, and by other components and The specified region of the electronic equipment is arrived in diagonal components storage, and horizontal component and vertical component are stored to remote equipment;Wherein Storing remote equipment includes: to be inserted into the key of user's input between based on horizontal component and vertical component, thus raw At the first data sequence;And it is directed to the first data sequence, random number range is set, selects random number from the random number range The increment of position as extraction extracts byte since the designated position in the first data sequence, which adds random number to obtain To next position for extracting byte, the algorithm is sequentially executed, until next byte location is greater than the number of the first data sequence According to amount, the byte of the corresponding position of extraction is extracted from the first data sequence, the random number sequence one with sequential It rises as the first transformation data sequence, is sent to the remote equipment of such as cloud server etc, so that remote equipment is according to the One transformation data sequence carries out the first verifying, and forms identifying code, while the first transformation data sequence will be removed in the first data sequence Data except column are stored into the specified region of electronic equipment;The identifying code that remote equipment returns is received, and by the identifying code It is stored in the specified region of the electronic equipment, remains use when subsequent calls;
(2) user selectes a certain range of content to be stored in the window that application program is presented;Conversion module is logical later Screenshot mode is crossed, selected information is converted into picture format, and execute following operation: at size being 2 by the picture segmentationQ*2Q The image tiles of a pixel, wherein Q is greater than the positive integer equal to 3, and when the marginal portion of picture is unsatisfactory for the image watt When piece format size, by lack part with 0 polishing;And such as down conversion is carried out for each image tiles:
Wherein work as p, q= When 0,When p ≠ 0 or q ≠ 0, S (p)=S (q)=0;Wherein p and q is coordinate, wherein 2Q*2QIt is a The image tiles of pixel are the discrete function of p and q, 2Q*2QIn a output, frequency is zero in the horizontal and vertical directions Result is exported by the first part as the image tiles, and remaining output result is by second as the image tiles Point;The each image tiles for traversing the picture obtain its respective first part and second part, and are formed first part Sequence and second part sequence, and by the storage of second part sequence to the specified region of the electronic equipment, by first part's sequence Column are formed together queue storage to remote equipment, so that remote equipment is carried out according to first part's sequence and check code with check code It is teaching and research, and form identifying code;The identifying code that remote equipment returns is received, and the identifying code is stored in the specified of the electronic equipment In region, use when subsequent calls is remained.Hereby it is possible to guarantee the safety of information in electronic equipment, guarantee that electronic equipment is lost Or unlock is cracked by nonowners, into after the application program, it can guarantee that data information is imperfect, so that cracking incomer The partial data can not be restored, ensure that information is not leaked;Simultaneously because not needing to all wait store with peep-proof and let out The content of dew is encrypted, and data-handling efficiency can be effectively improved, and improves user experience.
10. a kind of information processing system, the information processing system include memory, processor, application program, Fingerprint Identification Unit, Determination module, finger pressure sensor, unlocked state, environment light determination module, eye determination module, movement sensing module, again Force snesor, camera lens, social application program, conversion module, global positioning system program module, starts mobile communication at camera Application program, timing module, the memory include the program for executing above- mentioned information processing method, and the processor is invoked to be deposited Program in reservoir with application program, Fingerprint Identification Unit, determination module, finger pressure sensor, unlocked state, environment light to sentence Cover half block, eye determination module, movement sensing module, gravity sensor, camera, camera lens, social application program, conversion module, Perform claim requires described in 9 together for global positioning system program module, the application program for starting mobile communication, timing module The step of information processing method.
CN201811589504.6A 2018-12-25 2018-12-25 Information processing method and system Active CN109684810B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811589504.6A CN109684810B (en) 2018-12-25 2018-12-25 Information processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811589504.6A CN109684810B (en) 2018-12-25 2018-12-25 Information processing method and system

Publications (2)

Publication Number Publication Date
CN109684810A true CN109684810A (en) 2019-04-26
CN109684810B CN109684810B (en) 2020-05-05

Family

ID=66189345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811589504.6A Active CN109684810B (en) 2018-12-25 2018-12-25 Information processing method and system

Country Status (1)

Country Link
CN (1) CN109684810B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577052A (en) * 2013-11-15 2014-02-12 惠州Tcl移动通信有限公司 Method and system for conducting batched selection in information list through mobile terminal
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN105530356A (en) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 Mobile communication terminal and data protection method and device thereof
CN105553940A (en) * 2015-12-09 2016-05-04 北京中科云集科技有限公司 Safety protection method based on big data processing platform
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN108289141A (en) * 2017-12-27 2018-07-17 努比亚技术有限公司 A kind of the screen locking unlocking method and mobile terminal of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577052A (en) * 2013-11-15 2014-02-12 惠州Tcl移动通信有限公司 Method and system for conducting batched selection in information list through mobile terminal
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN105553940A (en) * 2015-12-09 2016-05-04 北京中科云集科技有限公司 Safety protection method based on big data processing platform
CN105530356A (en) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 Mobile communication terminal and data protection method and device thereof
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN108289141A (en) * 2017-12-27 2018-07-17 努比亚技术有限公司 A kind of the screen locking unlocking method and mobile terminal of mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN109684810B (en) 2020-05-05

Similar Documents

Publication Publication Date Title
CN109543390A (en) A kind of information security management method and system
JP4177598B2 (en) Face image recording apparatus, information management system, face image recording method, and information management method
KR101242390B1 (en) Method, apparatus and computer-readable recording medium for identifying user
US9122913B2 (en) Method for logging a user in to a mobile device
EP1990770B1 (en) Face authentication device, face authentication method, and program
CN105869235B (en) A kind of safety door inhibition method and system
US8550339B1 (en) Utilization of digit sequences for biometric authentication
CN103886237A (en) Control method and system for electronic device with fingerprint sensor and touch screen
CN108171137B (en) Face recognition method and system
KR20140072858A (en) Method and computer program for providing authentication to control access to a computer system
CN108734838B (en) Intelligent lock with video-based biological feature verification device
CN105261105A (en) Safety access control method
CN103617385A (en) Terminal and method for unlocking screen
CN109814964B (en) Interface display method, terminal equipment and computer readable storage medium
TWI754964B (en) Authentication system, authentication device, authentication method, and program product
JP7090008B2 (en) Identity verification support device and identity verification support method
JP2006235718A (en) Facial authentication device, its facial authentication method, electronic equipment integrated with the facial authentication device and recording medium with the facial authentication program stored thereon
JPWO2017170384A1 (en) Biometric data processing apparatus, biometric data processing system, biometric data processing method, biometric data processing program, and storage medium for storing biometric data processing program
US11792189B1 (en) Systems and methods for authenticating a user using an image capture device
Mecke et al. Open sesame! user perception of physical, biometric, and behavioural authentication concepts to open doors
CN109543389A (en) A kind of information protecting method and system
CN109684810A (en) A kind of information processing method and system
CN105760733B (en) Data ciphering method and module, data access method and module
CN110727355A (en) User terminal for operating virtual key based on motion sensor
TWI771819B (en) Authentication system, authentication device, authentication method, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200408

Address after: 215123 unit e4-1, No. 88, Jinjihu Avenue, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant after: Suzhou zhihuigu Technology Service Co., Ltd

Address before: 510000 A30 house 68 (1), Nanxiang Road, Whampoa District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU ZHIHONG TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant