CN110659512B - Picture management method, device, terminal and storage medium - Google Patents

Picture management method, device, terminal and storage medium Download PDF

Info

Publication number
CN110659512B
CN110659512B CN201910923674.1A CN201910923674A CN110659512B CN 110659512 B CN110659512 B CN 110659512B CN 201910923674 A CN201910923674 A CN 201910923674A CN 110659512 B CN110659512 B CN 110659512B
Authority
CN
China
Prior art keywords
target
picture
management
target picture
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910923674.1A
Other languages
Chinese (zh)
Other versions
CN110659512A (en
Inventor
廖新风
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN201910923674.1A priority Critical patent/CN110659512B/en
Publication of CN110659512A publication Critical patent/CN110659512A/en
Application granted granted Critical
Publication of CN110659512B publication Critical patent/CN110659512B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses a picture management method, a picture management device, a terminal and a storage medium, and belongs to the field of picture security management. The method comprises the following steps: acquiring a target picture; determining a target privacy level of the target picture according to personal information contained in the target picture; when receiving a trigger operation on the target picture, displaying a candidate management mode corresponding to the target privacy level; receiving a trigger operation on a target management mode in the candidate management modes, and acquiring encryption information set for the target picture; and encrypting and storing the target picture according to the encryption information and the target management mode. By determining the target privacy level of the target picture and selecting the target management mode of the target picture according to the target privacy level, the picture can be managed in a distinguishing way, so that a safer management mode is implemented on the picture with a high privacy level, the leakage of personal information in the picture is avoided, and the data security of the terminal is improved.

Description

Picture management method, device, terminal and storage medium
Technical Field
The embodiment of the application relates to the field of picture security, in particular to a picture management method, a picture management device, a terminal and a storage medium.
Background
Along with the popularization of intelligent terminals, users usually take pictures of cards carrying personal information and store the pictures in the intelligent terminals so as to check the pictures when the cards are used.
The picture carrying the personal information is stored in the intelligent terminal, and when the intelligent terminal is lost, the personal information can be leaked and the confidentiality is poor because the intelligent terminal does not have the function of providing special protection for the pictures.
Disclosure of Invention
The embodiment of the application provides a picture management method, a picture management device, a terminal and a storage medium. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a method for managing pictures, where the method includes:
acquiring a target picture;
determining a target privacy level of the target picture according to personal information contained in the target picture;
when the trigger operation of the target picture is received, displaying a candidate management mode corresponding to the target privacy level;
receiving a trigger operation on a target management mode in the candidate management modes, and acquiring encryption information set for the target picture;
and encrypting and storing the target picture according to the encryption information and the target management mode, wherein the encrypted and stored target picture is decrypted and viewed according to the encryption information.
In another aspect, an embodiment of the present application provides an image management apparatus, where the apparatus includes:
the first acquisition module is used for acquiring a target picture;
the determining module is used for determining the target privacy level of the target picture according to the personal information contained in the target picture;
the first display module is used for displaying a candidate management mode corresponding to the target privacy level when the trigger operation of the target picture is received;
the receiving module is used for receiving triggering operation of a target management mode in the candidate management modes and acquiring encryption information set for the target picture;
and the encryption module is used for encrypting and storing the target picture according to the encryption information and the target management mode, wherein the encrypted and stored target picture is decrypted and viewed according to the encryption information.
In another aspect, an embodiment of the present application provides a terminal, where the terminal includes a processor and a memory; the memory stores at least one instruction for execution by the processor to implement the picture management method as described in the above aspect.
In another aspect, a computer-readable storage medium is provided, which stores at least one instruction for execution by a processor to implement the picture management method as described in the above aspect.
In another aspect, a computer program product is provided, which stores at least one instruction that is loaded and executed by a processor to implement the picture management method according to the above aspect.
By adopting the picture management method provided by the embodiment of the application, after the target picture is acquired, the target privacy level of the target picture is determined according to the personal information contained in the target picture, the candidate management mode corresponding to the target privacy level is displayed by receiving the trigger operation on the target picture, and after the trigger operation on the target management mode in the candidate management mode is received and the encryption information set for the target picture is acquired, the target picture is encrypted and stored according to the encryption information and the target management mode. By determining the target privacy level of the target picture and selecting the target management mode of the target picture according to the target privacy level, the target picture can be managed in a differentiated mode, so that a safer management mode is implemented on the target picture with a high privacy level, leakage of personal information in the target picture is avoided, and data security of the terminal is improved.
Drawings
FIG. 1 illustrates a flow chart of a picture management method shown in an exemplary embodiment of the present application;
FIG. 2 is an interface diagram illustrating a process of displaying candidate management modes according to an exemplary embodiment of the present application;
FIG. 3 illustrates a process diagram for setting encryption information according to an exemplary embodiment of the present application;
FIG. 4 shows a flow diagram of a picture management method shown in another example embodiment of the present application;
FIG. 5 illustrates an interface diagram for performing a concealment management process, according to an exemplary embodiment of the present application;
FIG. 6 illustrates an interface diagram showing a process of displaying a target picture according to an exemplary embodiment of the present application;
FIG. 7 shows a flowchart of a picture management method shown in another example embodiment of the present application;
FIG. 8 illustrates an interface diagram for performing a fuzzy management process, shown in an exemplary embodiment of the present application;
FIG. 9 is an interface diagram illustrating a process of generating a target blurred picture according to an exemplary embodiment of the present application;
FIG. 10 is an interface diagram illustrating a process for displaying a target picture according to another exemplary embodiment of the present application;
fig. 11 is a block diagram illustrating a configuration of a picture management apparatus according to an exemplary embodiment of the present application;
Fig. 12 is a block diagram illustrating a structure of a terminal according to an exemplary embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Reference herein to "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Referring to fig. 1, a flowchart of a picture management method according to an exemplary embodiment of the present application is shown. The method comprises the following steps:
step 101, acquiring a target picture.
The target picture can be obtained by shooting some cards by a user through a terminal; or the terminal may receive pictures through some instant messaging software, for example, pictures received by the terminal through WeChat; or pictures saved when the user browses a web page, etc. The source of the target picture is not limited in the embodiments of the present application.
And 102, determining a target privacy level of the target picture according to the personal information contained in the target picture.
The personal information may include names, identification numbers, communication contact information, addresses, account numbers, passwords, property conditions, track tracks, and the like. For example, if the target picture is an identification card, the personal information included in the target picture may be a name, a citizen identification number, an address, and the like. The target privacy level can be from level D, level C, level B, level a, level S, etc., and from level D to level S, the higher the privacy level.
In a possible implementation manner, after the terminal takes a picture of the card to obtain the target picture, the terminal automatically identifies whether the target picture contains personal information, determines the type of the target picture according to the personal information if the target picture contains the personal information, and judges the privacy level of the target picture according to the type of the target picture.
For example, the picture type including the privacy information may be an identity card picture, a bank card picture, a household notebook picture, a social security card picture, a passport picture, a academic certificate picture, and the like, and each picture corresponds to a privacy level, for example, the privacy level corresponding to the identity card may be S level, and the privacy level corresponding to the social security card may be a level. And the picture type and the privacy grade are stored in the terminal in advance, and when the terminal identifies a target picture matched with any picture type, the privacy grade corresponding to the picture type is determined as the target privacy grade. The mode of identifying the picture type may be to identify some symbolic text information carried in the target picture, for example, the symbolic text information "national identity card number" on the identity card picture. For example, the identification card picture is stored in the terminal in advance, and when the target picture is matched with the identification card picture, the target picture is determined to be the identification card picture.
Optionally, after the terminal determines the picture type and the privacy level of the target picture, the picture type and the privacy level may be displayed on an upper layer of an application program interface, so as to remind a user that the target picture contains personal information and the target picture should be specially managed, and at the same time, how to specially manage the target picture may be displayed on the upper layer of the application program interface, so as to guide the user to perform correct management operation. Of course, the user may also be prompted by voice.
Illustratively, as shown in fig. 2, after the identity card shooting is completed, the terminal displays the target picture type 202 and the privacy level 203 on the upper layer of the application interface 201 according to the recognition result, and simultaneously displays the first prompt message 204 on the upper layer of the application interface 201 so as to guide the user to perform the next operation.
It should be noted that, when the terminal recognizes that the target picture does not carry personal information, or the privacy level is lower than the privacy level threshold, the target picture can be directly stored without performing picture type display and privacy level display. And if the privacy level is lower than the threshold value, determining that the target picture does not carry personal information. Optionally, although the terminal recognizes that the target picture does not need to be specially managed, the user may still perform special management operation on the target picture in a similar management manner.
And 103, displaying the candidate management mode corresponding to the target privacy level when the trigger operation on the target picture is received.
The triggering operation can be long-time pressing of the target picture or clicking of the target picture, and the user can also customize the triggering operation.
In a possible implementation manner, after the user presses the target picture for a long time according to the prompt, a candidate management manner for the target picture is displayed, and the candidate management manner can be displayed in the form of a function key. Optionally, the candidate management manner may include hidden management, that is, hiding and displaying the target picture in the album; fuzzy management can also be included, namely, the target picture is displayed in an album after being subjected to fuzzy processing.
Illustratively, as shown in fig. 2, after the user presses the target picture 205 for a long time, candidate management manner controls 207 are displayed on the upper layer of the target picture 205, and the candidate management manner controls 207 include hidden management controls and fuzzy management controls. The user can select to click any function control to perform management operation.
Optionally, the candidate management manner may also include an option of directly saving, and when the user considers that the target picture does not need any candidate management operation, the user may click the directly saved option.
And 104, receiving a trigger operation on a target management mode in the candidate management modes, and acquiring encryption information set for the target picture.
And the user can click any option in the candidate management mode or press any option for a long time to complete the triggering operation of the target management mode. Optionally, the encrypted information may include a text password, a graphic password, a biometric password, and the like, which is not limited in this embodiment.
In a possible implementation manner, after the user clicks hidden management in the candidate management manners, the terminal determines that the target management manner is hidden management after receiving the trigger operation, and displays a prompt for inputting encrypted information and an input control on an upper layer of an application program interface.
Illustratively, as shown in fig. 3, after a user clicks a hidden management control 302, after the terminal receives a trigger operation on the hidden management control, a prompt message 303 and an encrypted message input control 304 are displayed on an upper layer of an application program interface 301, where the prompt message 303 is used to prompt the user to input encrypted messages. The user can customize the keyword or password of the target picture, for example, the keyword is an identity card.
In a possible implementation manner, a user may preset encryption information used when storing a certain type of picture, for example, the encryption information may be preset for a picture such as an identity card, and when the user subsequently stores the type of target picture, after clicking a management manner, the terminal may directly encrypt and store the target picture with the preset encryption information without inputting the encryption information again.
And 105, encrypting and storing the target picture according to the encryption information and the target management mode, wherein the encrypted and stored target picture is decrypted and viewed according to the encryption information.
In a possible implementation manner, after the user sets the encryption information according to the guidance, the terminal stores the target picture in a corresponding position according to the set encryption information and the target management manner. For example, when the target management mode is hidden management, the terminal may hide the target picture in the album after receiving the encryption information, that is, make the target picture invisible in the album. When a user needs to check the target picture, encryption information needs to be input, so that the terminal displays the target picture according to the encryption information, and information leakage of the target picture can be avoided.
It should be noted that, in the embodiment of the present application, an example is only given to store a target picture in an album and display the target picture in the album, and in other possible implementations, the target picture may also be stored in any folder and displayed in the folder, and the storage location and the display location of the target picture are not limited in the embodiment of the present application.
To sum up, in the embodiment of the present application, after a target picture is acquired, a target privacy level of the target picture is determined according to personal information included in the target picture, a candidate management manner corresponding to the target privacy level is displayed by receiving a trigger operation on the target picture, and after a trigger operation on a target management manner in the candidate management manner is received and encryption information set for the target picture is acquired, the target picture is encrypted and stored according to the encryption information and the target management manner. By determining the target privacy level of the target picture and selecting the target management mode of the target picture according to the target privacy level, the target picture can be managed in a differentiated mode, so that a safer management mode is implemented on the target picture with a high privacy level, leakage of personal information in the target picture is avoided, and data security of the terminal is improved.
Because the types of target pictures to be protected are different, and the privacy levels thereof are also different, different management methods should be adopted for target pictures with different privacy levels. For example, for a target picture such as an identity card picture, a management mode with higher security, namely hidden management, can be adopted, the target picture cannot be seen in an album, the target picture can be found only by inputting a target keyword, and people except a user can be prevented from finding the target picture.
Referring to fig. 4, a flowchart of a picture management method according to another exemplary embodiment of the present application is shown, where the method includes:
step 401, a target picture is obtained.
The step 101 may be referred to in the implementation manner of this step, and this embodiment is not described herein again.
Step 402, determining the certificate type corresponding to the target picture according to the personal information contained in the target picture.
In a possible implementation mode, after a target picture is obtained by taking a picture of a card containing personal information through a terminal, the terminal automatically identifies the personal information contained in the target picture, and determines the certificate type of the target picture according to the personal information. For example, when the terminal recognizes the symbolic text information "national identity card number" on the target picture, it may be determined that the certificate type of the target picture is an identity card picture. Or, when the terminal recognizes that the target picture is matched with the identity card picture, the certificate type of the target picture can be determined to be the identity card picture.
And step 403, determining a target privacy level of the target picture according to the certificate type.
In a possible implementation manner, the terminal stores the corresponding relationship between the certificate type and the privacy level in advance, and after the terminal determines the certificate type of the target picture, the target privacy level can be determined according to the certificate type.
Illustratively, the correspondence between the credential type and the target privacy level is shown in Table one (with increasing privacy levels from level D to S).
Watch 1
Document type Target privacy level
Identity card picture S
Marriage certificate picture B
Social security card picture B
Common picture D
Bank card picture A
House entrance book picture S
Certificate picture of academic calendar A
Illustratively, when the certificate type of the target picture acquired by the terminal is the identity card picture, the target privacy level of the target picture is determined to be the S level from the corresponding relation shown in the table I.
Optionally, an editing function of the corresponding relationship between the certificate type and the target privacy level may also be provided, and the user may customize the corresponding relationship in the setting options.
And step 404, when the trigger operation on the target picture is received and the target privacy level is higher than the second privacy level, determining the hidden management as a candidate management mode and displaying the candidate management mode.
In a possible implementation manner, when the target privacy level of the target picture is higher than the second privacy level, that is, the target picture is more important, the target picture needs to be managed in a management manner with higher security. The embodiment provides a management mode of hidden management for the target picture, namely, the target picture is hidden in the album, so that people except a user can be prevented from finding the target picture in the album. Illustratively, the second privacy level may be level a, and the user may also customize the document type of the target picture included in the second privacy level, and the document type of the target picture included in a level higher than the second privacy level.
In a possible implementation manner, when the terminal determines that the privacy level of the target picture is S level, that is, higher than the second privacy level, when a trigger operation on the target picture is received, a function control for hidden management is displayed on the upper layer of the target picture.
Illustratively, as shown in fig. 5, when the terminal recognizes that the certificate type of the target picture 502 is an identification card picture and the target privacy level is S, the user presses the target picture 502 for a long time according to the prompt, and when the terminal receives the trigger signal, the hidden management control 503 is displayed on the upper layer of the target picture 502.
Step 405, when receiving a trigger operation on a target management mode in the candidate management modes, acquiring a target keyword and a target password set for the target picture, and determining the target keyword and the target password as encryption information.
When the target picture is managed in a hidden management mode, the target picture can be hidden in the album, when the user views the target picture again, the user cannot directly find the target picture in the album, and at the moment, a target keyword needs to be set when the target picture is stored, so that the target picture can be found according to the target keyword in subsequent searching.
In a possible implementation manner, after the user selects the management manner of the hidden management, the terminal displays a prompt message and an input box for inputting the target keyword and the target password, so that the user can set the target keyword and the target password for the target picture. And after the terminal acquires the target keyword and the target password which are set for the target picture, determining the target keyword and the target password as encryption information, and storing the encryption information in association with the target picture.
Illustratively, as shown in fig. 5, after the user clicks the hidden management control 503, when the terminal receives the trigger operation, the prompt message 504 is displayed on the upper layer of the application program interface 501, and the input control 505 is used to guide the user to input the target keyword and the target password.
Optionally, the user may set the same target keyword and the same target password for the same type of picture in advance, and when the user subsequently stores the type of picture, the user may avoid repeatedly inputting the target keyword and the target password, which is convenient for the user to memorize, thereby simplifying the operation flow.
Illustratively, as shown in fig. 5, after the user inputs the target keyword and the target password, whether the control 506 is clicked or not may be selected, if so, it indicates that the target keyword and the target password may be applied to storing similar pictures, and the target keyword and the target password do not need to be input again in subsequent storing of the similar pictures.
And 406, encrypting and storing the target picture according to the encryption information and the target management mode.
In a possible implementation manner, when the terminal acquires the encryption information of the target picture, the target picture is hidden in the album according to the encryption information and the hidden management manner, namely is not visible in the album.
Step 407, obtaining the input search terms through the search control in the album interface.
In a possible implementation manner, the target picture is managed in a hidden management manner, and when the user needs to view the target picture again, a search word can be input through a search control in the album interface, where the search word may be a target keyword set when the target picture is stored.
Illustratively, as shown in fig. 6, if the user needs to view an id card picture, the user may input a search term "id card" in a search control 602 on the album interface 601, where the search term may be a target keyword set when the target picture is stored.
And step 408, if the search word is matched with the target keyword, displaying a password input control on an album interface.
In a possible implementation manner, when the terminal acquires a search word input by a user, whether a target keyword matched with the search word exists is searched in prestored keywords, and if the target keyword matched with the search word is searched, a password input control is displayed on an album interface so that the user can input a target password to check a target picture.
Illustratively, as shown in fig. 6, when the search word input by the user matches with the target keyword, a prompt message 603 and a password input control 604 are displayed on the upper layer of the album interface 601 for guiding the user to input a password. Optionally, the certificate type 605 and the privacy level 606 of the target picture may also be displayed on the upper layer of the album interface 601.
And step 409, if the password acquired through the password input control is matched with the target password, displaying the target picture in the album interface.
In a possible implementation manner, when the terminal acquires a password input by the user, the password is matched with a target password set when the target picture is stored, and if the password is matched with the target password, the target picture is displayed on an album interface.
Illustratively, as shown in fig. 6, when the password acquired by the terminal matches the target password, the target picture 607 is displayed on the upper layer of the album interface 601. Optionally, a prompt 608 may be displayed on the upper layer of the album interface to remind the user of privacy protection.
Optionally, when the user exits the album interface, the target picture is still hidden in the album.
In this embodiment, the type of the certificate of the target picture is determined through the personal information included in the target picture, so that the privacy level of the target picture is determined, a picture management mode of hidden management is adopted for the target picture higher than the second privacy level, that is, the target picture is hidden in the album, the target picture can be found only by inputting a correct target keyword, and then the target picture can be checked only by inputting a correct password, and through double protection of the target keyword and the target password, the security protection for the target picture with a higher privacy level can be improved, and further the data security of the terminal is improved.
In a possible implementation mode, for some target pictures with lower privacy levels, a picture management mode of fuzzy management can be adopted, so that a user can conveniently and directly search the target pictures in an album without inputting keywords for searching, and the storage and viewing processes are simplified.
Referring to fig. 7, a flowchart of a picture management method according to another exemplary embodiment of the present application is shown, where the method includes:
step 701, acquiring a target picture.
Step 702, determining the certificate type corresponding to the target picture according to the personal information contained in the target picture.
And 703, determining the target privacy level of the target picture according to the certificate type.
The above steps can be implemented by referring to step 401, step 402, and step 403, which are not described herein again in this embodiment.
Step 704, when the trigger operation on the target picture is received and the target privacy level is higher than the first privacy level and lower than the second privacy level, determining the hidden management and the fuzzy management as candidate management modes and displaying the candidate management modes.
The target picture belonging to the first privacy level refers to a common picture which does not need special protection, the target picture belonging to the second privacy level refers to a target picture with higher importance, and when the target privacy level of the target picture is higher than the first privacy level and lower than the second privacy level, the target picture needs special protection but the importance of the target picture is lower. For the target pictures with privacy levels, a fuzzy management picture management mode, namely a management mode of displaying fuzzy pictures on an album interface, can be adopted, so that a user can directly find the fuzzy pictures in the album.
Illustratively, the first privacy level may be level D and the second privacy level may be level a. The user can also customize the certificate types of the target pictures respectively contained in the first privacy level and the second privacy level.
In a possible implementation manner, when the terminal receives a trigger operation on a target picture and determines that the target privacy level is higher than a first privacy level and lower than a second privacy level, a hidden management control and a fuzzy management control are displayed on an upper layer of the target picture, and a user can select any one of candidate management modes.
Illustratively, as shown in fig. 8, when the terminal recognizes that the certificate type of the target picture 802 is the social security card picture and the target privacy level is level B, the user presses the target picture 802 for a long time according to the prompt, and when the terminal receives the trigger signal, the hidden management control 803 and the fuzzy management control 804 are displayed on the upper layer of the target picture 802.
Step 705, when receiving a trigger operation on a target management mode in the candidate management modes, acquiring a target password set for the target picture, and determining the target password as encryption information.
Because the fuzzy management can display the fuzzy picture in the album, the fuzzy picture can be directly searched on the interface of the album without inputting keywords for searching, and therefore, only the target password can be set when the target picture is stored.
In a possible implementation manner, a user clicks the fuzzy management control, and when the terminal receives a trigger operation on the fuzzy management control, prompt information for inputting a target password and an input box are displayed on an application program interface so as to guide the user to input the target password. And after the terminal acquires the target password, determining the target password as encryption information, and storing the encryption information in association with the target picture.
Illustratively, as shown in fig. 8, after the user clicks the fuzzy management control 804, the terminal displays a prompt message 805 on the upper layer of the application interface 801, and a password input control 806 for inputting a target password.
Optionally, the user may set the same target password for the same type of picture in advance, and when the user subsequently stores the type of picture, the user may avoid repeatedly inputting the target password, which is convenient for the user to memorize, thereby simplifying the operation flow.
Illustratively, as shown in fig. 8, after the user inputs the target password, whether the control 807 is clicked or not may be selected, and if the control is selected, it indicates that the target password may be applied to storing similar pictures, and the target password does not need to be input again when storing similar pictures subsequently.
Optionally, a fuzzy management manner may also be adopted to input the target keyword, that is, the input control 806 may include an input control of the target password and an input control of the target keyword.
And step 706, copying the target picture to obtain a copied picture.
In a possible implementation mode, in the process of setting a target password by a user, the terminal copies the target picture to obtain a copied picture.
And 707, performing fuzzy processing on the copied picture to obtain a target fuzzy picture corresponding to the target picture.
The fuzzy processing may be performed by covering key information in the copied picture, for example, if the copied picture is a social security card picture, the "social security number", "name", and "card number" included in the copied picture may be covered. Algorithms may also be used to blur the duplicate pictures.
Schematically, as shown in fig. 9, the key information in the copied picture 901 is covered, so as to obtain the target blurred picture 902.
In other possible embodiments, the terminal may further perform blurring processing on the copied picture through a mosaic or a mask, and the specific manner of blurring processing in the embodiment of the present application is not limited.
And step 708, storing the target fuzzy picture and the target picture in a correlation mode.
Due to the adoption of the management mode of fuzzy management, the target fuzzy picture is found in the album, and in order to further view the target picture after the target fuzzy picture is found, the target picture and the target fuzzy picture need to be stored in a correlation manner so as to be viewed in the following.
And step 709, displaying a target fuzzy picture corresponding to the target picture in the album interface.
In a possible implementation manner, a management manner of hidden management is adopted, and the obtained target fuzzy picture can be displayed in an album, that is, a user can directly search in the album according to the outline of the target fuzzy picture. Optionally, the target picture is hidden in the album.
Schematically, as shown in fig. 10, a target blurred picture 1002 is displayed on the upper layer of the album interface 1001.
And step 710, displaying a password input control when a selection operation of the target fuzzy picture is received.
In a possible implementation manner, when a user finds a target fuzzy picture in an album, the user can click the target fuzzy picture, and when the terminal receives a selection operation of the target fuzzy picture, the terminal can display a password input control on an album interface, so that the user can input a password and further view the target picture.
Illustratively, as shown in fig. 10, when a user selects a target fuzzy picture 1002 in an album interface 1001, and the terminal receives the selection operation, the target fuzzy picture 1002 is displayed on the upper layer of the album interface 1001, and a prompt message 1003 and a password input control 1004 are displayed on the upper layer of the album interface 1001 for guiding the user to input a password.
It should be noted that, if a target keyword is set when the target picture is stored, the target fuzzy picture may also be searched by inputting the target keyword through a search control on the album interface.
And step 711, if the password acquired through the password input control is matched with the target password, displaying the target picture in the album interface.
In a possible implementation manner, when the terminal acquires a password input by the user, the password is matched with a target password set when the target picture is stored, and if the password is matched with the target password, the target picture is displayed on an album interface.
Illustratively, as shown in fig. 10, when the password acquired by the terminal matches the target password, a target picture 1005 is displayed on the upper layer of the album interface 1001.
Optionally, when the user exits the album interface, the target fuzzy picture is still displayed in the album, and the target picture is still hidden in the album.
In the embodiment, the document type of the target picture is determined through the personal information contained in the target picture, so that the privacy level of the target picture is determined, and the target picture with a lower privacy level is stored in a fuzzy management mode, so that the step of inputting target keywords can be avoided while the target picture is managed, the flow of storing and checking the target picture is simplified, and the convenience of picture management operation is improved.
In a possible implementation mode, after the target picture is checked every time, the target picture is continuously hidden in the album, if a user needs to continuously check the same target picture in a short time, the target password needs to be input again for each check, and the convenience for checking the target picture is possibly influenced.
Optionally, the method for setting a timer to display the target picture may include:
1. and setting a timer for the target picture.
In a possible implementation mode, after the target picture is displayed on the album interface, when the terminal detects that the target picture is hidden in the album again, a timer is set for the target picture, and the time counting is started.
2. And if the selection operation of the target fuzzy picture is received within the time length of the timer, displaying the target picture in the album interface.
The duration of the timer is a criterion for determining whether the target picture is continuously viewed, for example, the duration of the timer may be 2 minutes. Illustratively, in the process that the timer starts to count time until 2 minutes is counted, if the terminal receives the selection operation of the target fuzzy picture, the target password does not need to be input, and the target picture can be directly displayed on the upper layer of the album interface.
Optionally, within the duration of the timer, if the input of the input target keyword is received through the search control in the album interface, the target password does not need to be input, and the target picture can be directly displayed on the upper layer of the album interface.
3. The timer is deleted when the timer duration is reached.
In one possible embodiment, the timer is deleted when the timer duration is reached. For example, when the counting time of the timer reaches 2 minutes, the timer is deleted.
In this embodiment, by setting the timer for the target picture, the user can be prevented from repeatedly inputting the target password when continuously checking the target picture, thereby reducing unnecessary operations and improving the operation convenience for checking the target picture.
Referring to fig. 11, a block diagram of a picture management apparatus according to an exemplary embodiment of the present application is shown. The apparatus may be implemented as all or a portion of the terminal in software, hardware, or a combination of both. The device includes:
a first obtaining module 1101, configured to obtain a target picture;
a determining module 1102, configured to determine a target privacy level of the target picture according to personal information included in the target picture;
a first display module 1103, configured to display, when a trigger operation on the target picture is received, a candidate management manner corresponding to the target privacy level;
a receiving module 1104, configured to receive a trigger operation on a target management manner in the candidate management manners, and acquire encryption information set for the target picture;
the encrypting module 1105 is configured to encrypt and store the target picture according to the encryption information and the target management manner, where the encrypted and stored target picture is decrypted and viewed according to the encryption information.
Optionally, the first display module includes:
a first determining unit, configured to determine hidden management and fuzzy management as the candidate management manners and display the hidden management and the fuzzy management when the trigger operation on the target picture is received and the target privacy level is higher than a first privacy level and lower than a second privacy level;
A second determining unit, configured to determine and display the hidden management as the candidate management manner when the trigger operation on the target picture is received and the target privacy level is higher than the second privacy level;
the hidden management is a management mode of hiding pictures in an album interface, and the fuzzy management is a management mode of displaying fuzzy pictures in the album interface.
Optionally, the target management mode is the hidden management, and the receiving module includes:
a first acquiring unit configured to acquire a target keyword and a target password set for the target picture, and determine the target keyword and the target password as the encrypted information;
optionally, the apparatus further comprises:
the second acquisition module is used for acquiring the input search terms through the search control in the album interface;
the second display module is used for displaying a password input control on the album interface if the search word is matched with the target keyword;
and the third display module is used for displaying the target picture in the album interface if the password acquired through the password input control is matched with the target password.
Optionally, the target management manner is the fuzzy management, and the receiving module includes:
a second obtaining unit configured to obtain a target password set for the target picture, and determine the target password as the encryption information;
optionally, the apparatus further comprises:
the fourth display module is used for displaying a target fuzzy picture corresponding to the target picture in the album interface;
the fifth display module is used for displaying a password input control when the selection operation of the target fuzzy picture is received;
and the sixth display module is used for displaying the target picture in the album interface if the password acquired through the password input control is matched with the target password.
Optionally, the apparatus further comprises:
the copying module is used for copying the target picture to obtain a copied picture;
the processing module is used for carrying out fuzzy processing on the copied picture to obtain the target fuzzy picture corresponding to the target picture;
and the storage module is used for storing the target fuzzy picture and the target picture in a correlation manner.
Optionally, the apparatus further comprises:
the setting module is used for setting a timer for the target picture;
A seventh display module, configured to display a target picture in the album interface if a selection operation on the target blurred picture is received within a timer duration of the timer;
and the deleting module is used for deleting the timer when the time length of the timer is reached.
Optionally, the first determining module includes:
the third determining unit is used for determining the certificate type corresponding to the target picture according to the personal information contained in the target picture;
a fourth determining unit, configured to determine the target privacy level of the target picture according to the certificate type.
To sum up, in the embodiment of the present application, after a target picture is acquired, a target privacy level of the target picture is determined according to personal information included in the target picture, a candidate management manner corresponding to the target privacy level is displayed by receiving a trigger operation on the target picture, and after a trigger operation on a target management manner in the candidate management manner is received and encryption information set for the target picture is acquired, the target picture is encrypted and stored according to the encryption information and the target management manner. By determining the target privacy level of the target picture and selecting the target management mode of the target picture according to the target privacy level, the target picture can be managed in a differentiated mode, so that a safer management mode is implemented on the target picture with a high privacy level, leakage of personal information in the target picture is avoided, and data security of the terminal is improved.
Referring to fig. 12, a block diagram of a terminal 1200 according to an exemplary embodiment of the present application is shown. The terminal 1200 may be an electronic device installed and running an application, such as a smart phone, a tablet computer, an electronic book, a portable personal computer, or the like. The terminal 1200 in the present application may include one or more of the following components: a processor 1201, a memory 1202, and a display 1203.
Processor 1201 may include one or more processing cores. The processor 1201 interfaces various portions throughout the terminal 1200 using various interfaces and lines, and performs various functions of the terminal 1200 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 1202 and calling data stored in the memory 1202. Alternatively, the processor 1201 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 1201 may integrate one or a combination of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen 1203; the modem is used to handle wireless communications. It is understood that the modem may be implemented by a communication chip without being integrated into the processor 1201.
The Memory 1202 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 1202 includes a non-transitory computer-readable medium. The memory 1202 may be used to store instructions, programs, code sets, or instruction sets. The memory 1202 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, and the like), instructions for implementing the above-described method embodiments, and the like, and the operating system may be an Android (Android) system (including a system based on Android system depth development), an IOS system developed by apple inc (including a system based on IOS system depth development), or other systems. The storage data area may also store data created by the mobile terminal 1200 during use (e.g., phone books, audio-video data, chat log data), etc.
The display screen 1203 may be a capacitive touch display screen for receiving touch operations of a user on or near the display screen using a finger, a stylus, or any other suitable object, and displaying user interfaces of various applications. The touch display screen is generally provided at a front panel of the terminal 1200. The touch display screen may be designed as a full-face screen, a curved screen, or a profiled screen. The touch display screen can also be designed to be a combination of a full-face screen and a curved-face screen, and a combination of a special-shaped screen and a curved-face screen, which is not limited in the embodiment of the present application.
In addition, those skilled in the art will appreciate that the configuration of terminal 1200 illustrated in the above-described figures is not meant to be limiting with respect to terminal 1200, and that a mobile terminal may include more or less components than those illustrated, or some of the components may be combined, or a different arrangement of components. For example, the mobile terminal 1200 further includes a radio frequency circuit, a shooting component, a sensor, an audio circuit, a Wireless Fidelity (WiFi) component, a power supply, a bluetooth component, and other components, which are not described herein again.
The embodiment of the present application further provides a computer-readable medium, where at least one instruction is stored, and the at least one instruction is loaded and executed by the processor to implement the picture management method according to the above embodiments.
The embodiment of the present application further provides a computer program product, where at least one instruction is stored, and the at least one instruction is loaded and executed by the processor to implement the picture management method according to the above embodiments.
Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in the embodiments of the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (12)

1. A picture management method, the method comprising:
acquiring a target picture;
determining a target privacy level of the target picture according to personal information contained in the target picture;
when the trigger operation on the target picture is received and the target privacy level is higher than a first privacy level and lower than a second privacy level, determining hidden management and fuzzy management as candidate management modes and displaying the candidate management modes;
when the trigger operation on the target picture is received and the target privacy level is higher than the second privacy level, determining the hidden management as the candidate management mode and displaying the candidate management mode; the hidden management is a management mode of hiding the picture in an album interface and indicating the target picture to be stored in the album, and the fuzzy management is a management mode of displaying the fuzzy picture in the album interface;
receiving a trigger operation on a target management mode in the candidate management modes, and acquiring encryption information set for the target picture;
Encrypting and storing the target picture according to the encryption information and the target management mode, wherein the encrypted and stored target picture is decrypted and viewed according to the encryption information;
copying the target picture to obtain a copied picture;
covering key information in the copied picture to obtain a target fuzzy picture corresponding to the target picture;
and storing the target fuzzy picture and the target picture in a correlation manner.
2. The method according to claim 1, wherein the target management manner is the hidden management, and the obtaining of the encryption information set for the target picture includes:
acquiring a target keyword and a target password which are set for the target picture, and determining the target keyword and the target password as the encrypted information;
after the target picture is encrypted and stored according to the encryption information and the target management mode, the method further comprises the following steps:
acquiring input search terms through a search control in the album interface;
if the search word is matched with the target keyword, displaying a password input control on the album interface;
And if the password acquired through the password input control is matched with the target password, displaying the target picture in the album interface.
3. The method according to claim 1, wherein the target management manner is the blur management, and the obtaining of the encryption information set for the target picture includes:
acquiring a target password set for the target picture, and determining the target password as the encryption information;
after the target picture is encrypted and stored according to the encryption information and the target management mode, the method further comprises the following steps:
displaying a target fuzzy picture corresponding to the target picture in the album interface;
when receiving a selection operation on the target fuzzy picture, displaying a password input control;
and if the password acquired through the password input control is matched with the target password, displaying the target picture in the album interface.
4. The method of claim 3, wherein after displaying the target picture in the album interface, the method further comprises:
setting a timer for the target picture;
If the selection operation of the target fuzzy picture is received within the timer duration of the timer, displaying the target picture in the album interface;
and deleting the timer when the time length of the timer is reached.
5. The method according to any one of claims 1 to 4, wherein the determining the target privacy level of the target picture according to the personal information contained in the target picture comprises:
determining a certificate type corresponding to the target picture according to the personal information contained in the target picture;
and determining the target privacy level of the target picture according to the certificate type.
6. A picture management apparatus, characterized in that the apparatus comprises:
the first acquisition module is used for acquiring a target picture;
the determining module is used for determining the target privacy level of the target picture according to the personal information contained in the target picture;
the first display module is used for displaying a candidate management mode corresponding to the target privacy level when the trigger operation of the target picture is received;
the receiving module is used for receiving triggering operation of a target management mode in the candidate management modes and acquiring encryption information set for the target picture;
The encryption module is used for encrypting and storing the target picture according to the encryption information and the target management mode, wherein the encrypted and stored target picture is decrypted and viewed according to the encryption information;
the copying module is used for copying the target picture to obtain a copied picture;
the processing module is used for covering the key information in the copied picture to obtain a target fuzzy picture corresponding to the target picture;
the storage module is used for storing the target fuzzy picture and the target picture in a correlation manner;
wherein the first display module comprises:
a first determining unit, configured to determine hidden management and fuzzy management as the candidate management manners and display the hidden management and the fuzzy management when the trigger operation on the target picture is received and the target privacy level is higher than a first privacy level and lower than a second privacy level;
a second determining unit, configured to determine and display the hidden management as the candidate management manner when the trigger operation on the target picture is received and the target privacy level is higher than the second privacy level;
the hidden management is a management mode of hiding the picture in an album interface and indicating the target picture to be stored in the album, and the fuzzy management is a management mode of displaying the fuzzy picture in the album interface.
7. The apparatus of claim 6, wherein the target management manner is the hidden management, and the receiving module comprises:
a first acquiring unit configured to acquire a target keyword and a target password set for the target picture, and determine the target keyword and the target password as the encrypted information;
the device further comprises:
the second acquisition module is used for acquiring the input search terms through the search control in the album interface;
the second display module is used for displaying a password input control on the album interface if the search word is matched with the target keyword;
and the third display module is used for displaying the target picture in the album interface if the password acquired through the password input control is matched with the target password.
8. The apparatus of claim 6, wherein the target management manner is the fuzzy management, and the receiving module comprises:
a second obtaining unit configured to obtain a target password set for the target picture, and determine the target password as the encryption information;
the device further comprises:
the fourth display module is used for displaying a target fuzzy picture corresponding to the target picture in the album interface;
The fifth display module is used for displaying a password input control when the selection operation of the target fuzzy picture is received;
and the sixth display module is used for displaying the target picture in the album interface if the password acquired through the password input control is matched with the target password.
9. The apparatus of claim 8, further comprising:
the setting module is used for setting a timer for the target picture;
a seventh display module, configured to display a target picture in the album interface if a selection operation on the target blurred picture is received within a timer duration of the timer;
and the deleting module is used for deleting the timer when the time length of the timer is reached.
10. The apparatus according to any one of claims 6 to 9, wherein the determining module comprises:
the third determining unit is used for determining the certificate type corresponding to the target picture according to the personal information contained in the target picture;
a fourth determining unit, configured to determine the target privacy level of the target picture according to the certificate type.
11. A terminal comprising a processor and a memory; the memory stores at least one instruction for execution by the processor to implement the picture management method of any of claims 1 to 5.
12. A computer-readable storage medium having stored thereon at least one instruction for execution by a processor to implement the picture management method of any of claims 1 to 5.
CN201910923674.1A 2019-09-27 2019-09-27 Picture management method, device, terminal and storage medium Active CN110659512B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910923674.1A CN110659512B (en) 2019-09-27 2019-09-27 Picture management method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910923674.1A CN110659512B (en) 2019-09-27 2019-09-27 Picture management method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110659512A CN110659512A (en) 2020-01-07
CN110659512B true CN110659512B (en) 2022-02-11

Family

ID=69039549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910923674.1A Active CN110659512B (en) 2019-09-27 2019-09-27 Picture management method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110659512B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538997A (en) * 2020-03-31 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Image processing method, image processing device, storage medium and terminal
CN111786876B (en) * 2020-06-29 2022-11-04 北京字节跳动网络技术有限公司 Information processing method, device, electronic equipment and computer readable medium
CN112637635B (en) * 2020-12-15 2023-07-04 西安万像电子科技有限公司 File confidentiality method and system, computer readable storage medium and processor
CN112653713A (en) * 2021-01-22 2021-04-13 深圳市房多多网络科技有限公司 Image downloading protection method and device and computing equipment
CN112764553B (en) * 2021-01-26 2024-04-02 维沃移动通信有限公司 Chat expression collection method and device and electronic equipment
CN114860120A (en) * 2021-02-04 2022-08-05 华为技术有限公司 Execution method and device for control operation, storage medium and control
CN116361843A (en) * 2021-12-28 2023-06-30 华为技术有限公司 Data protection method and electronic equipment
CN115563643A (en) * 2022-03-18 2023-01-03 荣耀终端有限公司 User data protection method based on content identification, electronic equipment and storage medium
CN114676441B (en) * 2022-03-18 2024-07-16 上海电力大学 Multi-dimensional information privacy protection contour query method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015006912A1 (en) * 2013-07-16 2015-01-22 Nokia Corporation Methods, apparatuses, and computer program products for hiding access to information in an image
CN104657668A (en) * 2015-02-06 2015-05-27 深圳市金立通信设备有限公司 Terminal
CN105389516A (en) * 2015-11-09 2016-03-09 小米科技有限责任公司 Sensitive picture reminding method and apparatus
CN108010519A (en) * 2017-11-10 2018-05-08 上海爱优威软件开发有限公司 A kind of information search method and system
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109784067A (en) * 2018-12-15 2019-05-21 平安科技(深圳)有限公司 Picture management method, device, electronic equipment and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9405935B2 (en) * 2014-11-26 2016-08-02 Ncr Corporation Secure image processing
CN105354509B (en) * 2015-10-28 2018-03-27 广东欧珀移动通信有限公司 The processing method and processing system of picture
US10546185B2 (en) * 2015-12-01 2020-01-28 Casio Computer Co., Ltd. Image processing apparatus for performing image processing according to privacy level
US9948651B1 (en) * 2015-12-14 2018-04-17 Symantec Corporation Automatic shared personal image privacy level detection and management
US9779256B2 (en) * 2016-03-07 2017-10-03 Roger G Marshall Iamnotanumber© card system: an image-based technique for the creation and deployment of numberless card systems
CN106127076B (en) * 2016-06-30 2019-04-12 维沃移动通信有限公司 A kind of inspection method and mobile terminal of photograph album photo
CN108733690B (en) * 2017-04-18 2022-02-18 阿里巴巴集团控股有限公司 Image data storage method and device and electronic equipment
CN107146192A (en) * 2017-05-02 2017-09-08 湖北工程学院 A kind of safety of image guard method and device
CN107590770A (en) * 2017-08-31 2018-01-16 努比亚技术有限公司 Image obscures encryption method, mobile terminal and storage medium
CN107992765A (en) * 2017-11-28 2018-05-04 珠海格力电器股份有限公司 Picture hiding method and device
CN107948517B (en) * 2017-11-30 2020-05-15 Oppo广东移动通信有限公司 Preview picture blurring processing method, device and equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015006912A1 (en) * 2013-07-16 2015-01-22 Nokia Corporation Methods, apparatuses, and computer program products for hiding access to information in an image
CN104657668A (en) * 2015-02-06 2015-05-27 深圳市金立通信设备有限公司 Terminal
CN105389516A (en) * 2015-11-09 2016-03-09 小米科技有限责任公司 Sensitive picture reminding method and apparatus
CN108010519A (en) * 2017-11-10 2018-05-08 上海爱优威软件开发有限公司 A kind of information search method and system
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109784067A (en) * 2018-12-15 2019-05-21 平安科技(深圳)有限公司 Picture management method, device, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
当"在线相册"遭遇"隐私门";张健敏;《上海信息化》;20071130(第2007年11期);30-31 *

Also Published As

Publication number Publication date
CN110659512A (en) 2020-01-07

Similar Documents

Publication Publication Date Title
CN110659512B (en) Picture management method, device, terminal and storage medium
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US9788197B2 (en) Method and browser for browsing web page, and storage medium
EP2573986A1 (en) Methods and systems for increasing the security of electronic messages
CN103886025B (en) The display methods and device of picture in webpage
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
CN112804445B (en) Display method and device and electronic equipment
CN107450839A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN106529277A (en) Message preview method and device
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN109219003B (en) Information encryption method and device, storage medium and electronic equipment
CN105630855A (en) File sharing method, file sharing system and terminal
CN112685493A (en) Report processing method and device, electronic equipment and storage medium
CN106599648A (en) Application startup method and terminal
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN107085694B (en) Information display processing method and device
CN108174018A (en) A kind of information processing method and terminal
CN106874718A (en) privacy processing method, device and terminal
CN104182479B (en) A kind of method and device handling information
WO2023051508A1 (en) Graphic code display method and apparatus
CN106161365B (en) Data processing method and device and terminal
CN111125742B (en) File management method, intelligent terminal and device with storage function
CN113782027A (en) Audio processing method and audio processing device
CN109542305B (en) Application control method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant