CN110135204A - Data guard method and device - Google Patents

Data guard method and device Download PDF

Info

Publication number
CN110135204A
CN110135204A CN201910295232.7A CN201910295232A CN110135204A CN 110135204 A CN110135204 A CN 110135204A CN 201910295232 A CN201910295232 A CN 201910295232A CN 110135204 A CN110135204 A CN 110135204A
Authority
CN
China
Prior art keywords
display screen
target display
user
input information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910295232.7A
Other languages
Chinese (zh)
Inventor
苏睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Kerui Intelligent Technology Co Ltd
Original Assignee
Chongqing Kerui Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Kerui Intelligent Technology Co Ltd filed Critical Chongqing Kerui Intelligent Technology Co Ltd
Priority to CN201910295232.7A priority Critical patent/CN110135204A/en
Publication of CN110135204A publication Critical patent/CN110135204A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Abstract

The disclosure provides a kind of data guard method and device, is related to electronic information technical field, be able to solve user has the security risk of leaking data during using electronic equipment.The specific technical proposal is: obtaining the scene image in predeterminable area, predeterminable area includes the region opposite with the target display screen of data to be protected is shown;When scene image includes subject image element, control target display screen display waits interface, and interface is waited to show data to be protected for stopping;The input information of the user of target display screen is obtained, and the user of target display screen is verified according to input information;After the user of target display screen is proved to be successful, control target display screen continues to show data to be protected.The disclosure is used for data protection.

Description

Data guard method and device
Technical field
This disclosure relates to electronic information technical field more particularly to data guard method and device.
Background technique
With the enhancing of computer function and popularizing for computer applications, many affairs are required using at computer now Reason, and data shown on computer display screen, may be stolen by the modes such as take pictures leads to leakage of data.And for protecting number According to relying primarily on secrecy rules and regulations, secrecy ideological education technically prevents mobile communication etc. using electromagnetic shielding device.But The protection of these safeguard measures is limited, and safety is poor, and user still remains data during using electronic equipment The security risk of leakage.
Summary of the invention
The embodiment of the present disclosure provides a kind of data guard method and device, is able to solve user in the mistake using electronic equipment There are problems that the security risk of leaking data in journey.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of data guard method is provided, this method comprises:
The scene image in predeterminable area is obtained, predeterminable area includes opposite with the target display screen of data to be protected is shown Region;
When scene image includes subject image element, control target display screen display waits interface, and interface is waited to be used for Stop showing data to be protected;
Obtain the input information of the user of target display screen, and according to input information to the user of target display screen into Row verifying;
After the user of target display screen is proved to be successful, control target display screen continues to show data to be protected.
By identifying whether the scene image of predeterminable area includes subject image element, it is determined whether someone's shooting, if It determines that someone shoots, prompts user to verify, if be proved to be successful, can continue to show data to be protected, improve The safety of data protection, meanwhile, continue to show data to be protected because verifying can be carried out, reduces misrecognition to user Caused by influence.
In one embodiment, input information includes the key assignments of key;Use according to input information to target display screen Person verifies, comprising:
When the key assignments instruction for inputting the key that information includes switches to normal display, the user of target display screen is determined It is proved to be successful.
In one embodiment, input information includes facial image, and facial image is used to indicate the use of target display screen The face characteristic of person;The user of target display screen is verified according to input information, comprising:
According to facial image when determining the user of target display screen is legitimate user, making for target display screen is determined User is proved to be successful.
In one embodiment, the user of target display screen is verified according to input information, comprising:
When input information is consistent with preset encrypted message, determine that the user of target display screen is proved to be successful.
In one embodiment, this method further include:
After user's authentication failed of target display screen, predeterminable area is shot.
According to the second aspect of an embodiment of the present disclosure, a kind of data protecting device is provided, comprising: obtain module, the first control Molding block, authentication module and the second control module;
Wherein, module is obtained, for obtaining the scene image in predeterminable area, predeterminable area includes and shows number to be protected According to the opposite region of target display screen;
First control module, for when scene image includes subject image element, control target display screen display to be waited Interface waits interface to show data to be protected for stopping;
Authentication module, the input information of the user for obtaining target display screen, and it is aobvious to target according to input information The user of display screen verifies;
Second control module, for after the user of target display screen is proved to be successful, control target display screen to continue to show Show data to be protected.
In one embodiment, input information includes the key assignments of key;Authentication module includes key assignments authentication unit;
Key assignments authentication unit determines when for switching to normal display in the key assignments instruction for inputting the key that information includes The user of target display screen is proved to be successful.
In one embodiment, input information includes facial image, and facial image is used to indicate the use of target display screen The face characteristic of person;Authentication module includes face verification unit;
Face verification unit, for according to facial image when determining the user of target display screen is legitimate user, Determine that the user of target display screen is proved to be successful.
In one embodiment, authentication module includes password authentication unit;
Password authentication unit, for determining making for target display screen when input information is consistent with preset encrypted message User is proved to be successful.
In one embodiment, data protecting device further includes shooting module;
Shooting module, for being shot to predeterminable area after user's authentication failed of target display screen.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart for data guard method that the embodiment of the present disclosure provides;
Fig. 2 is a kind of position effect schematic diagram for image collecting device that the embodiment of the present disclosure provides;
Fig. 3 is a kind of structure chart for data protecting device that the embodiment of the present disclosure provides;
Fig. 4 is a kind of structure chart for data protecting device that the embodiment of the present disclosure provides;
Fig. 5 is a kind of structure chart for data protecting device that the embodiment of the present disclosure provides;
Fig. 6 is a kind of structure chart for data protecting device that the embodiment of the present disclosure provides;
Fig. 7 is a kind of structure chart for data protecting device that the embodiment of the present disclosure provides.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The embodiment of the present disclosure provides a kind of data guard method, is applied to data protecting device, as shown in Figure 1, the data Guard method the following steps are included:
101, the scene image in predeterminable area is obtained.
Predeterminable area includes the region opposite with the target display screen of data to be protected is shown, predeterminable area is can to shoot To the region of target display screen.
Optionally, Image Acquisition can be carried out to predeterminable area by image collecting device and generates scene image.Image Acquisition device can be a part of data protecting device, be also possible to through external interface and data protecting device connection communication External image acquisition device;Image collecting device is also possible to a part of target display screen, or passes through external interface With the external image acquisition device of target display screen connection communication.Data protecting device can be a part of target display screen, The external device (ED) either being connect with target display screen.
For example, data protecting device is a device inside target display screen, image is installed on target display screen and is adopted Acquisition means can carry out Image Acquisition to the predeterminable area opposite with target display screen.
Specifically, above-mentioned image collecting device can be camera, the frequency of Image Acquisition can be 30 times/second.Wait protect Shield data can be preset classified papers etc., show that the opposite region of the target display screen of data to be protected belongs to target and shows The direction of panel pair, for example, as shown in Fig. 2, image collecting device is set to target display screen upper edge, certainly, image is adopted Acquisition means can have multiple, also can be set in different ground France, towards with target display screen just facing towards identical, acquisition The region of image can be used as predeterminable area.
In an alternative embodiment, camera starts after being configurable to booting, i.e., sets belonging to target display screen After standby (such as: computer etc.) booting, camera starting obtains the image in predeterminable area.
In an alternative embodiment, ecret protection application program is can be set in computer, when user starts the privacy When protecting application program, image collecting device starting.This mode can reduce power consumption.
102, when scene image includes subject image element, control target display screen display waits interface.
Subject image element embodies the key message of shooting behavior, for example, posture of taking pictures, photographic device etc..Target image Element may include the image of some specific people, also may include image (such as the figure of camera of image collecting device Picture), if image recognition result instruction scene image includes subject image element, someone can be determined to target display screen It takes on the sly.Interface is waited to show data to be protected for stopping.
Before step 102, scene image can be identified, to scene image carry out image recognition can there are many Mode is enumerated two specific examples and is illustrated herein:
In first example, image recognition is carried out to scene image and obtains image recognition result, comprising:
Obtain images match model;Image recognition is carried out to scene image using images match model and generates image recognition As a result, whether image recognition result is used to indicate in scene image comprising subject image element.
Obtain images match model, using images match model judge in scene image whether include subject image element more It is accurate to add, and reduces erroneous judgement.
It should be noted that images match model can be pre-set, can also be obtained by training study, for example, Obtain images match model, comprising:
Initial matching model and sample image are obtained, sample image includes first kind sample image and the second class sample graph Picture, wherein first kind sample image includes subject image element, and the second class sample image does not include subject image element;It utilizes Initial matching model handles sample image to obtain the decision content of sample image;According to the decision content of sample image and reference The difference of value obtains images match model after being adjusted to the parameter of initial matching model.
It should be noted that reference value can be it is preset.Herein, column take a particular example further explanation figure As the acquisition process of Matching Model.For example, first kind sample image and the second class sample image are marked respectively, can incite somebody to action First kind sample image is labeled as (1,0), and the second class sample image is labeled as (0,1), then using initial matching model to sample This image A (sample image A is any one sample image, is only illustrated by taking sample image A as an example herein) is handled, Two steps can be divided into using treatment process of the initial matching model to sample image A;The first step utilizes first network model Feature extraction is carried out to sample image A, obtains the characteristic value of sample image A, the characteristic value of sample image A is for indicating sample graph As the characteristics of image of A;Second step carries out the characteristic value of sample image A using the second network model sample image A is calculated Decision content.If sample image A is first kind sample image, reference value is (1,0), if the judgement of sample image A Value is (0.5,0), and the change of parameter in first network model and the second network model is calculated using the difference of decision content and reference value Then change value is adjusted the first network model and the second network model, and is trained next time.Into excessively a large amount of instruction Practice, so that it may obtain images match model.
If being more than using difference of the images match model to the scene image decision content handled and reference value Preset range, then illustrate that scene image differs larger with the characteristics of image of sample image, using images match model to scene The difference of decision content and reference value that image is handled within a preset range, then illustrates scene image and sample image Characteristics of image is close, it is likely that includes subject image element.According to the decision content of sample image and reference value to initial matching mould Type carries out parameter adjustment, and obtained images match model is more accurate for the processing of image, can more accurately determine scene Whether there is the behavior of taking on the sly in image.
In second example, it can establish database, include a large amount of subject image elements in database, then by scene Image is matched with the subject image element in database, and then whether determine in scene image includes subject image element, For example, carrying out image recognition to scene image obtains image recognition result, comprising:
Image recognition is carried out to scene image and obtains at least one pictorial element;By at least one pictorial element and target figure Pixel element is matched, if successful match, it is determined that includes subject image element at least one pictorial element, if matching Failure, it is determined that do not include subject image element at least one pictorial element;Image recognition result is generated according to matching result.
It should be noted that each pictorial element includes at least one pixel, a target at least one pictorial element Pictorial element also includes at least one pixel, at least one pictorial element with subject image element match can pass through by Pixel in two pictorial element same positions is compared to determine.It is with the pictorial element A at least one pictorial element Example, if the pixel value of two pixels on pictorial element A and subject image element same position is less than or equal to preset difference value, Two pixels are then determined as same pixel pair, if the quantity of pictorial element A and subject image element same pixel pair is being schemed The all pixels for including as elements A and subject image element are greater than or equal to preset ratio to ratio shared in quantity, then really Determine pictorial element A and subject image element matching.Certainly, only exemplary illustration herein, does not represent the disclosure and is confined to this. The matching of pictorial element A and subject image element is the matching of Pixel-level, and therefore, matching result is more acurrate, moreover, to database In subject image element can be updated, allow subject image element to cover various behaviors of taking on the sly, data protection Safety is higher.
In one embodiment, if scene image includes subject image element, waiting circle that target display screen is shown Face, which can be a warning image, further can cut off the display source of target display screen, and controls target display screen and show Warn image.
It should be noted that warning image can be and be stored in advance in target display screen, can also be filled by data protection It sets and is transmitted to target display screen.The display source for cutting off target display screen, ensure that data to be protected are not revealed, while aobvious in target Show that screen display warns image, reminds user to reinforce the protection to data, further improve Information Security.
Further, by taking target display screen does not include data protecting device as an example, scene figure is determined in data protecting device When as comprising subject image element, data protecting device sends caution signal, mesh to target display screen by data transmission interface It marks display screen and display source is cut off according to caution signal, and show warning image;When scene image does not include subject image element, Data protecting device can not send signal to target display screen, can also be sent by data transmission interface to target display screen Safety signal.The data transmission interface can be high-definition multimedia interface (English: High Definition Multimedia Interface, HDMI) or digital visual interface (English: Digital Visual Interface, DVI), it is also possible to universal serial bus (English: Universal Serial Bus, USB) interface, the disclosure does not limit this System.
103, the input information of the user of target display screen, and the use according to input information to target display screen are obtained Person verifies.
Input information can have the different forms of expression, be verified according to input information to the user of target display screen Three kinds of implementations can also be enumerated herein and are described as follows there are many implementation:
In the first implementation, input information includes the key assignments of key;According to input information to target display screen User verifies, comprising:
When the key assignments instruction for inputting the key that information includes switches to normal display, the user of target display screen is determined It is proved to be successful.
User is verified by key, and key can be physical button and be also possible to virtual key, for example, user Press a combination button or some special key, so that it may by verifying, switch to normal display interface.
In the second implementation, input information includes facial image, and facial image is used to indicate target display screen The face characteristic of user;The user of target display screen is verified according to input information, comprising:
According to facial image when determining the user of target display screen is legitimate user, making for target display screen is determined User is proved to be successful.
In the third implementation, the user of target display screen is verified according to input information, comprising:
When input information is consistent with preset encrypted message, determine that the user of target display screen is proved to be successful.
User is verified by inputting password, which can be voice messaging, be also possible to text Word information, be also possible to number, letter or diversified forms combination encrypted message, the disclosure to this with no restriction.
104, after the user of target display screen is proved to be successful, control target display screen continues to show data to be protected.
In one embodiment, this method further include: after user's authentication failed of target display screen, to predeterminable area It is shot.
It should be noted that being shot to predeterminable area, it can be the shooting module that data protecting device includes and carry out Shooting, is also possible to data protecting device and controls other filming apparatus to shoot predeterminable area, and the disclosure does not limit this System.
In conjunction with step 101-104, in a kind of application scenarios, data protecting device is monitored predeterminable area, to protect The data to be protected that eye protection mark display screen is shown are not leaked.When someone shoots target display screen, data protecting device is known The scene image being clipped in predeterminable area includes subject image element, then controls the display of target display screen and wait interface, this just makes It obtains target display screen not continuing to show data to be protected, avoids leaking data.But in monitoring process, it is possible to exist Misrecognition;Or legitimate user is made that some movements for being similar to shooting, at this point, legitimate user can not continue normally to make With, can by press Macintosh, switch to normal display interface;It can also be switched to by recognition of face or password authentification Normal display interface.Certainly, data protecting device all can serve as evidence and save for presetting the scene image in scene, After legitimate user switches to the page for normally showing data to be protected, scene image before is still saved, and also avoiding can The people for carrying out page switching steals data using own right, and safety is higher.
The data guard method that the embodiment of the present disclosure provides, by identifying whether the scene image of predeterminable area includes target Pictorial element, it is determined whether someone's shooting, if it is determined that someone's shooting prompts user to verify, if be proved to be successful, Can continue to show data to be protected, improve the safety of data protection, meanwhile, because can carry out verifying continue display to Data are protected, misrecognition influence caused by user is reduced.
Based on data guard method described in the corresponding embodiment of above-mentioned Fig. 1, following is embodiment of the present disclosure, It can be used for executing embodiments of the present disclosure.
The embodiment of the present disclosure provides a kind of data protecting device, as shown in figure 3, the data protecting device 30 includes: to obtain Module 301, the first control module 302, authentication module 303 and the second control module 304;
Wherein, module 301 is obtained, for obtaining the scene image in predeterminable area, predeterminable area includes and shows wait protect Protect the opposite region of the target display screen of data;
First control module 302, for when scene image includes subject image element, control target display screen to be shown To interface, waits interface to be used to indicate and the user of target display screen is verified;
Authentication module 303, the input information of the user for obtaining target display screen, and according to input information to target The user of display screen verifies;
Second control module 304, for after the user of target display screen is proved to be successful, control target display screen to continue Show data to be protected.
In one embodiment, input information includes the key assignments of key;As shown in figure 4, authentication module 303 is tested including key assignments Demonstrate,prove unit 3031;
Key assignments authentication unit 3031, when for switching to normal display in the key assignments instruction for inputting the key that information includes, Determine that the user of target display screen is proved to be successful.
In one embodiment, input information includes facial image, and facial image is used to indicate the use of target display screen The face characteristic of person;As shown in figure 5, authentication module 303 includes face verification unit 3032;
Face verification unit 3032, for determining that the user of target display screen is legitimate user according to facial image When, determine that the user of target display screen is proved to be successful.
In one embodiment, as shown in fig. 6, authentication module 303 includes password authentication unit 3033;
Password authentication unit 3033, for determining target display screen when input information is consistent with preset encrypted message User be proved to be successful.
In one embodiment, as shown in fig. 7, data protecting device 30 further includes shooting module 305;
Shooting module 305, for being shot to predeterminable area after user's authentication failed of target display screen.
The data protecting device that the embodiment of the present disclosure provides, by identifying whether the scene image of predeterminable area includes target Pictorial element, it is determined whether someone's shooting, if it is determined that someone's shooting prompts user to verify, if be proved to be successful, Can continue to show data to be protected, improve the safety of data protection, meanwhile, because can carry out verifying continue display to Data are protected, misrecognition influence caused by user is reduced.
Based on data guard method described in the corresponding embodiment of above-mentioned Fig. 1, the embodiment of the present disclosure also provides one kind Computer readable storage medium, for example, non-transitorycomputer readable storage medium can be read-only memory (English: Read Only Memory, ROM), it is random access memory (English: Random Access Memory, RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..It is stored with computer instruction on the storage medium, for executing the corresponding embodiment of above-mentioned Fig. 1 Described in data guard method, details are not described herein again.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.

Claims (10)

1. a kind of data guard method, which is characterized in that the described method includes:
The scene image in predeterminable area is obtained, the predeterminable area includes opposite with the target display screen of data to be protected is shown Region;
When the scene image includes subject image element, controls the target display screen display and wait interface, the waiting Interface shows the data to be protected for stopping;
The input information of the user of the target display screen is obtained, and according to the input information to the target display screen User verifies;
After the user of the target display screen is proved to be successful, controls the target display screen and continue to show the number to be protected According to.
2. the method according to claim 1, wherein the input information includes the key assignments of key;According to described Input information verifies the user of the target display screen, comprising:
When the key assignments instruction for the key that the input information includes switches to normal display, making for the target display screen is determined User is proved to be successful.
3. the method according to claim 1, wherein the input information includes facial image, the face figure Face characteristic as being used to indicate the user of the target display screen;According to the input information to the target display screen User verifies, comprising:
According to the facial image when determining the user of the target display screen is legitimate user, determine that the target is aobvious The user of display screen is proved to be successful.
4. the method according to claim 1, wherein being made according to the input information to the target display screen User verifies, comprising:
When the input information is consistent with preset encrypted message, determine that the user of the target display screen is proved to be successful.
5. method according to claim 1-4, which is characterized in that the method also includes:
After user's authentication failed of the target display screen, the predeterminable area is shot.
6. a kind of data protecting device characterized by comprising obtain module, the first control module, authentication module and the second control Molding block;
Wherein, the acquisition module, for obtaining the scene image in predeterminable area, the predeterminable area includes and shows wait protect Protect the opposite region of the target display screen of data;
First control module, for controlling the target display screen when the scene image includes subject image element Display waits interface, and the waiting interface shows the data to be protected for stopping;
The authentication module, the input information of the user for obtaining the target display screen, and according to the input information The user of the target display screen is verified;
Second control module, for controlling the target and showing after the user of the target display screen is proved to be successful Screen continues to show the data to be protected.
7. device according to claim 6, which is characterized in that the input information includes the key assignments of key;The verifying Module includes key assignments authentication unit;
When the key assignments instruction of the key assignments authentication unit, the key for including in the input information switches to normal display, Determine that the user of the target display screen is proved to be successful.
8. device according to claim 6, which is characterized in that the input information includes facial image, the face figure Face characteristic as being used to indicate the user of the target display screen;The authentication module includes face verification unit;
The face verification unit, for determining that the user of the target display screen is legal makes according to the facial image When user, determine that the user of the target display screen is proved to be successful.
9. device according to claim 6, which is characterized in that the authentication module includes password authentication unit;
The password authentication unit, for when the input information is consistent with preset encrypted message, determining that the target is aobvious The user of display screen is proved to be successful.
10. according to the described in any item devices of claim 6-9, which is characterized in that the data protecting device further includes shooting Module;
The shooting module, for clapping the predeterminable area after user's authentication failed of the target display screen It takes the photograph.
CN201910295232.7A 2019-04-12 2019-04-12 Data guard method and device Pending CN110135204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910295232.7A CN110135204A (en) 2019-04-12 2019-04-12 Data guard method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910295232.7A CN110135204A (en) 2019-04-12 2019-04-12 Data guard method and device

Publications (1)

Publication Number Publication Date
CN110135204A true CN110135204A (en) 2019-08-16

Family

ID=67569987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910295232.7A Pending CN110135204A (en) 2019-04-12 2019-04-12 Data guard method and device

Country Status (1)

Country Link
CN (1) CN110135204A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259461A (en) * 2020-01-20 2020-06-09 北京科芮智盈技术有限公司 Anti-stealing-lighting method, terminal equipment and system
CN113869294A (en) * 2021-12-03 2021-12-31 深圳竹云科技有限公司 Data protection method based on computer vision and related equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169329A (en) * 2017-05-24 2017-09-15 维沃移动通信有限公司 A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN107505710A (en) * 2017-08-22 2017-12-22 童迎伟 It is a kind of that there is the wearing head for playing content protection function to show terminal and VR glasses
CN108595990A (en) * 2018-03-30 2018-09-28 武志学 Show equipment protection method, device, electronic equipment and readable storage medium storing program for executing
CN109241757A (en) * 2018-08-22 2019-01-18 石数字技术成都有限公司 A kind of file browsing method based on recognition of face

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169329A (en) * 2017-05-24 2017-09-15 维沃移动通信有限公司 A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN107505710A (en) * 2017-08-22 2017-12-22 童迎伟 It is a kind of that there is the wearing head for playing content protection function to show terminal and VR glasses
CN108595990A (en) * 2018-03-30 2018-09-28 武志学 Show equipment protection method, device, electronic equipment and readable storage medium storing program for executing
CN109241757A (en) * 2018-08-22 2019-01-18 石数字技术成都有限公司 A kind of file browsing method based on recognition of face

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259461A (en) * 2020-01-20 2020-06-09 北京科芮智盈技术有限公司 Anti-stealing-lighting method, terminal equipment and system
CN113869294A (en) * 2021-12-03 2021-12-31 深圳竹云科技有限公司 Data protection method based on computer vision and related equipment

Similar Documents

Publication Publication Date Title
CN109191730B (en) Information processing apparatus
CN110096972A (en) Data guard method, apparatus and system
US11321575B2 (en) Method, apparatus and system for liveness detection, electronic device, and storage medium
US11232181B2 (en) Face authentication system, face authentication method, biometrics authentication system, biometrics authentication method, and storage medium
CN106529339A (en) Picture display method, device and terminal
US10395022B2 (en) Access control for a resource
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
CN110619239A (en) Application interface processing method and device, storage medium and terminal
CN110135204A (en) Data guard method and device
CN111259461A (en) Anti-stealing-lighting method, terminal equipment and system
CN108334761B (en) User authority identification method and device
CN110084076A (en) Evidence display methods and device
KR101754014B1 (en) Information Leakage Prevention Apparatus Based Face Recognition And Method of Threof
US20200026866A1 (en) Method and device for covering private data
CN112912882A (en) Control method and device of terminal equipment and storage medium
JP2009156948A (en) Display control device, display control method, and display control program
CN111832458A (en) Anti-theft method and system
CN110188576A (en) Data guard method and device
CN111177770A (en) Protection method of sensitive information, mobile equipment and storage device
KR101757682B1 (en) Outside diversion preventing method of security image and system therof
CN110162949B (en) Method and device for controlling image display
CN112396008A (en) Sensitive information desensitization method and device, storage medium and electronic equipment
CN110163010A (en) Data guard method and device
CN112051977B (en) Screen control method, device and system
CN110084075A (en) Image processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room A09, 26 / F, building 5, digital China Science and Technology Park, 20 zhangbasi Road, hi tech Zone, Xi'an City, Shaanxi Province 710003

Applicant after: Xi'an Kerui Zhiying Information Technology Co.,Ltd.

Applicant after: Su Rui

Address before: 400800 Intelligent Terminal Industrial Park of Pingshan Industrial Park, Qijiang District, Chongqing

Applicant before: Chongqing Kerui Intelligent Technology Co.,Ltd.

Applicant before: Su Rui

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190816

RJ01 Rejection of invention patent application after publication