CN110958388A - Safe photographing method based on internet privacy protection - Google Patents

Safe photographing method based on internet privacy protection Download PDF

Info

Publication number
CN110958388A
CN110958388A CN201911199949.8A CN201911199949A CN110958388A CN 110958388 A CN110958388 A CN 110958388A CN 201911199949 A CN201911199949 A CN 201911199949A CN 110958388 A CN110958388 A CN 110958388A
Authority
CN
China
Prior art keywords
photo
internet
information
photographing
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911199949.8A
Other languages
Chinese (zh)
Inventor
周书田
于海洋
李培坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Wangxin Information Technology Co ltd
Original Assignee
Qingdao Wangxin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Wangxin Information Technology Co ltd filed Critical Qingdao Wangxin Information Technology Co ltd
Priority to CN201911199949.8A priority Critical patent/CN110958388A/en
Publication of CN110958388A publication Critical patent/CN110958388A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/80Camera processing pipelines; Components thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/617Upgrading or updating of programs or applications for camera control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • H04N23/661Transmitting camera control signals through networks, e.g. control via the Internet

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Studio Devices (AREA)

Abstract

The invention relates to a safe photographing method based on internet privacy protection, and belongs to the technical field of privacy information analysis and processing systems. The invention comprises the following steps: s1: the shooting safety program is built in: the system comprises a dynamic monitoring module and a networking uploading module; s2: the mobile equipment sends the identification information carried by the photo to the cloud end through the internet access module through a security program; the range information of a specific area is stored in a memory of the cloud end, and whether the identification information is matched with the stored range information is judged; issuing position information and area size to be shielded; s3: the processing of giving is taken a picture, and the high in the clouds will shelter from or need not the order of sheltering from through the internet and give to the mobile device in, handle the sensitive scope region of photo. According to the invention, the networked mobile equipment is synchronized with the cloud in real time, and before a photo is formed, the photo is processed in a shielding mode, so that privacy protection is carried out on a specific area.

Description

Safe photographing method based on internet privacy protection
Technical Field
The invention relates to a safe photographing method based on internet privacy protection, and belongs to the technical field of privacy information analysis and processing systems.
Background
With the further upgrade of the photographing equipment on the mobile equipment, the privacy problem brought by photographing is gradually emphasized. For general time and places, the privacy problem is not obvious, but for certain specific areas with fixed addresses, such as scenic spots, military restricted areas, electronic product processing plants which are not on the market and the like, even if various measures for preventing death and defending are adopted, large manpower and material resources are consumed for controlling, hidden dangers such as privacy exposure brought by photographing are avoided, and the effect is not obvious. Especially for the shooting of mobile equipment connected with the internet, a mode which can limit and obscure key elements from the internet angle is still lacked, and further dynamic shielding and protection are carried out on the content of a fixed area.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a safe photographing method for protecting privacy based on the Internet.
The invention discloses a safe photographing method based on internet privacy protection, which comprises the following steps:
s1: the shooting safety program is built in:
s11: the safety program comprises the following modules:
a dynamic monitoring module: monitoring in real time as the user moves or the camera angle is different;
networking upload module: uploading device position information, the angle of the photographing device and the focal length information to a cloud server;
s12: the safety program is arranged in the mobile equipment and is started along with the starting of the photographing program;
s2: and (3) photographing and uploading:
s21: after the mobile equipment starts the GPS positioning module and the internet surfing module, the identification information carried by the photo is sent to the cloud end through the internet surfing module through a safety program;
s22: the cloud end receives the identification information and then starts the range information stored in the background;
s23, judging whether the identification information is matched with the stored range information by the cloud processor;
s231: if the position information is matched with the range information, and the range needs to be protected, the processor issues the position information and the area size which need to be shielded, and shields the sensitive range area;
s232: if the position information is not matched with the range information, the range does not need to be protected, and shielding is not needed;
s3: and (3) taking a picture and issuing:
s31: the cloud sends a command for shielding or not shielding to the mobile equipment through the Internet;
s32: the mobile equipment processes the sensitive range area of the photo through a command issued by a security program in the process of taking the photo and when the photo is not generated;
s33: and (4) shading the photo formed by taking the photo in a sensitive range area.
Preferably, in step S21, the identification information uploaded by the security program includes: position information of the device, angle of the photographing device, and focal length information.
Preferably, in step S12, the security program is a mobile device of the user, which is taken from the factory or background-licensed through the social platform applet, and is matched to the photographing program of the user, and is started with the start of the photographing program.
Preferably, in step S22, the range information stored in the cloud is sensitive information related to privacy, which is stored in the cloud after the specific area application is approved, and includes location information and specific graphics.
Preferably, in step S32, the mobile device includes an internet access module, and performs a blocking process on the photo in real time through the WIFI or GPRS module.
Preferably, in step S33, the blocking of the sensitive range area of the photo formed by taking the picture includes: fuzzy processing, encrypted frame processing and pop-up frame reminding.
Preferably, in step S33, when the occlusion mode is the encryption frame processing, the encryption frame cancels the occlusion of the sensitive area by inputting the decryption password into the encryption frame.
Preferably, in step S33, when the pop-up box is used for reminding in a blocking manner, the pop-up box is released through networking by inputting a request that does not relate to privacy in the pop-up box and through feedback of a background technician.
The invention has the beneficial effects that: according to the safe photographing method based on the internet privacy protection, the networked mobile equipment is synchronized with the cloud end in real time, the shielding command of the cloud end for the specific area is sent to the mobile equipment, the picture is processed in a shielding mode before the picture is formed, and further privacy protection is carried out on the specific area.
Drawings
Fig. 1 is a schematic structural view of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
as shown in fig. 1, the internet privacy protection-based security photographing method according to the present invention includes the following steps:
s1: the shooting safety program is built in:
s11: the safety program comprises the following modules:
a dynamic monitoring module: monitoring in real time as the user moves or the camera angle is different;
networking upload module: uploading device position information, the angle of the photographing device and the focal length information to a cloud server;
s12: the safety program is arranged in the mobile equipment and is started along with the starting of the photographing program;
s2: and (3) photographing and uploading:
s21: after the mobile equipment starts the GPS positioning module and the internet surfing module, the identification information carried by the photo is sent to the cloud end through the internet surfing module through a safety program;
s22: the cloud end receives the identification information and then starts the range information stored in the background;
s23, judging whether the identification information is matched with the stored range information by the cloud processor;
s231: if the position information is matched with the range information, and the range needs to be protected, the processor issues the position information and the area size which need to be shielded, and shields the sensitive range area;
s232: if the position information is not matched with the range information, the range does not need to be protected, and shielding is not needed;
s3: and (3) taking a picture and issuing:
s31: the cloud sends a command for shielding or not shielding to the mobile equipment through the Internet;
s32: the mobile equipment processes the sensitive range area of the photo through a command issued by a security program in the process of taking the photo and when the photo is not generated;
s33: and (4) shading the photo formed by taking the photo in a sensitive range area.
In step S21, the identification information uploaded by the security program includes: position information of the device, angle of the photographing device, and focal length information.
In step S12, the security program is a mobile device of the user, which is taken from the factory, or background-approved by the social platform applet, matched with the photographing program of the user, and started with the start of the photographing program.
In step S22, the range information stored in the cloud is sensitive information related to privacy, including location information and specific graphics, which is stored in the cloud after the application for the specific area is approved.
In the step S32, the mobile device includes an internet access module, and performs a blocking process on the photo in real time through the WIFI or GPRS module.
Example 2:
in this embodiment, the shielding manner is mainly described in detail.
The method comprises the following steps of (1) shielding a sensitive range area of a photo formed by photographing, wherein the shielding mode comprises the following steps: fuzzy processing, encrypted frame processing and pop-up frame reminding.
The manner of occlusion is chosen by the applicant for the particular region:
the first method is as follows: when the shielding mode adopts fuzzy processing, mosaic processing is directly carried out on the photos, the density of the mosaic ensures that the images of specific angles of the photos cannot be identified, and the mosaic has no relief measures for relieving;
the second method comprises the following steps: when the shielding mode adopts the encryption frame processing, the encryption frame cancels the shielding of the sensitive range area by inputting the decryption password into the encryption frame, and belongs to one of the relief measures for relieving the misoperation;
the third method comprises the following steps: when the blocking mode adopts pop-up box reminding, the pop-up box is released through networking by inputting a request which does not relate to privacy in the pop-up box and the feedback of a background technician, and belongs to one of relief measures for removing misoperation.
Example 3:
in this embodiment, the mobile device, the cloud, the security program, and the range area are further explained.
The mobile equipment mainly comprises a smart phone with a networking function, a PAD and a camera.
The cloud end mainly refers to servers of three operators, the servers are stored in the servers of the three operators through permission of the three operators, and when the mobile equipment accesses the servers of the three operators, privacy shading is conducted on the photos immediately.
The safety program can be carried by the mobile equipment itself or installed in a network mode for the mobile equipment, can be associated with the photographing program through background permission of the mobile equipment, and can timely shield the photo. After the safety program is started, real-time networking is carried out to judge whether the safety program is located in a specific area, and if the safety program is not located in the specific area any more, shielding is not carried out; otherwise, an instruction is issued to remind the user that the user is in a specific area, the photographing is limited, the privacy problem caused by photographing is avoided, if the user wants to photograph, the photo is provided with shielding information, such as a mosaic, a pop-up frame, an encryption frame and the like, and even the photographing program does not allow the photographing.
The range area may be a range of locations defined by the applicant of the particular area, a particular figure, such as a range of surrounding outlines of a scenic spot, a pattern of sights of a scenic spot, such as outlines of off-market electronic products, a range of an electronic factory, such as a range of a military exclusion zone, an outline of military equipment, and the like.
The cloud end provides a decryption request for the file processing through shielding processing, identification is carried out through technical personnel, and if the file processing belongs to misoperation, an permission instruction is issued; if the person belongs to the blocked area, the technician can continue to issue an instruction for not allowing, and give a description, for example: the scenic spot belongs to a photographing-limiting place, and photographing is prohibited.
The invention can be widely applied to the occasion of the privacy information analysis processing system.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A safe photographing method based on internet privacy protection is characterized by comprising the following steps:
s1: the shooting safety program is built in:
s11: the safety program comprises the following modules:
a dynamic monitoring module: monitoring in real time as the user moves or the camera angle is different;
networking upload module: uploading device position information, the angle of the photographing device and the focal length information to a cloud server;
s12: the safety program is arranged in the mobile equipment and is started along with the starting of the photographing program;
s2: and (3) processing of the base station:
s21: after the mobile equipment starts the GPS positioning module and the internet surfing module, the identification information carried by the photo is sent to the cloud end through the internet surfing module through a safety program;
s22: the cloud end receives the identification information and then starts the range information stored in the background;
s23, judging whether the identification information is matched with the stored range information by the cloud processor;
s231: if the position information is matched with the range information, and the range needs to be protected, the processor issues the position information and the area size which need to be shielded, and shields the sensitive range area;
s232: if the position information is not matched with the range information, the range does not need to be protected, and shielding is not needed;
s3: and (3) taking a picture and issuing:
s31: the cloud sends a command for shielding or not shielding to the mobile equipment through the Internet;
s32: the mobile equipment processes the sensitive range area of the photo through a command issued by a security program in the process of taking the photo and when the photo is not generated;
s33: and (4) shading the photo formed by taking the photo in a sensitive range area.
2. The internet privacy protection based secure photographing method according to claim 1, wherein in the step S21, the identification information uploaded by the secure program includes: position information of the device, angle of the photographing device, and focal length information.
3. The internet privacy protection based security photographing method according to claim 1, wherein in step S12, the security program is factory-owned by the user 'S mobile device, or is background-approved by the social platform applet, is matched to the user' S photographing program, and is started with the photographing program.
4. The internet privacy-protecting secure photographing method as claimed in claim 1, wherein in step S22, the range information stored in the cloud is privacy-related sensitive information stored in the cloud after approval of the application for the specific area, including location information and specific graphics.
5. The internet privacy protection-based safe photographing method according to claim 1, wherein in the step S32, the mobile device is provided with an internet access module, and performs shielding processing on the photo in real time through a WIFI or GPRS module.
6. The internet privacy protection based security photographing method according to claim 1, wherein in step S33, the blocking of the sensitive range area of the photo formed by photographing includes: fuzzy processing, encrypted frame processing and pop-up frame reminding.
7. The internet privacy-protecting secure photographing method according to claim 6, wherein in the step S33, when the blocking manner is implemented by using an encryption box, the encryption box cancels the blocking of the sensitive area by inputting a decryption password into the encryption box.
8. The Internet privacy protection based security photographing method according to claim 6, wherein in the step S33, when the blocking manner adopts pop-up box reminding, the request which does not relate to privacy is input into the pop-up box, and the pop-up box is released through networking by feedback of a background technician.
CN201911199949.8A 2019-11-29 2019-11-29 Safe photographing method based on internet privacy protection Pending CN110958388A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911199949.8A CN110958388A (en) 2019-11-29 2019-11-29 Safe photographing method based on internet privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911199949.8A CN110958388A (en) 2019-11-29 2019-11-29 Safe photographing method based on internet privacy protection

Publications (1)

Publication Number Publication Date
CN110958388A true CN110958388A (en) 2020-04-03

Family

ID=69979085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911199949.8A Pending CN110958388A (en) 2019-11-29 2019-11-29 Safe photographing method based on internet privacy protection

Country Status (1)

Country Link
CN (1) CN110958388A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112689093A (en) * 2020-12-24 2021-04-20 深圳创维-Rgb电子有限公司 Intelligent device privacy protection method, intelligent device and storage medium
CN113190811A (en) * 2021-05-13 2021-07-30 深圳奥赛思科技有限公司 Method capable of safely transmitting network data and cloud server
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10136247A (en) * 1996-10-25 1998-05-22 Canon Inc Camera control system, camera server, control method therefor and storage medium
CN101127834A (en) * 2003-05-20 2008-02-20 松下电器产业株式会社 Image capturing system
JP2009284235A (en) * 2008-05-22 2009-12-03 Fujifilm Corp Imaging device
CN105323473A (en) * 2014-07-31 2016-02-10 三星电子株式会社 Method, device and system for modifying image including photographing restricted element
CN105791751A (en) * 2014-12-26 2016-07-20 浙江大华技术股份有限公司 Image privacy occlusion method based on ball machine and ball machine
US20160373699A1 (en) * 2013-10-18 2016-12-22 Aerovironment, Inc. Privacy Shield for Unmanned Aerial Systems
CN107094234A (en) * 2017-06-29 2017-08-25 浙江宇视科技有限公司 A kind of shooting area occlusion method and device applied to dollying terminal
CN107945103A (en) * 2017-11-14 2018-04-20 上海歌尔泰克机器人有限公司 The privacy screen method, apparatus and unmanned plane of unmanned plane image
CN108366196A (en) * 2018-01-25 2018-08-03 西安中科创达软件有限公司 A method of protection picture privacy

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10136247A (en) * 1996-10-25 1998-05-22 Canon Inc Camera control system, camera server, control method therefor and storage medium
CN101127834A (en) * 2003-05-20 2008-02-20 松下电器产业株式会社 Image capturing system
JP2009284235A (en) * 2008-05-22 2009-12-03 Fujifilm Corp Imaging device
US20160373699A1 (en) * 2013-10-18 2016-12-22 Aerovironment, Inc. Privacy Shield for Unmanned Aerial Systems
CN105323473A (en) * 2014-07-31 2016-02-10 三星电子株式会社 Method, device and system for modifying image including photographing restricted element
CN105791751A (en) * 2014-12-26 2016-07-20 浙江大华技术股份有限公司 Image privacy occlusion method based on ball machine and ball machine
CN107094234A (en) * 2017-06-29 2017-08-25 浙江宇视科技有限公司 A kind of shooting area occlusion method and device applied to dollying terminal
CN107945103A (en) * 2017-11-14 2018-04-20 上海歌尔泰克机器人有限公司 The privacy screen method, apparatus and unmanned plane of unmanned plane image
CN108366196A (en) * 2018-01-25 2018-08-03 西安中科创达软件有限公司 A method of protection picture privacy

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112689093A (en) * 2020-12-24 2021-04-20 深圳创维-Rgb电子有限公司 Intelligent device privacy protection method, intelligent device and storage medium
CN112689093B (en) * 2020-12-24 2022-06-10 深圳创维-Rgb电子有限公司 Intelligent device privacy protection method, intelligent device and storage medium
CN113190811A (en) * 2021-05-13 2021-07-30 深圳奥赛思科技有限公司 Method capable of safely transmitting network data and cloud server
CN113190811B (en) * 2021-05-13 2022-02-01 深圳奥赛思科技有限公司 Method capable of safely transmitting network data and cloud server
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system

Similar Documents

Publication Publication Date Title
CN110958388A (en) Safe photographing method based on internet privacy protection
CN104318171B (en) Android private data guard methods and system based on rights label
EP2653772B1 (en) Image recognition for personal protective equipment compliance enforcement in work areas
CN106330958B (en) Secure access method and device
US20180012094A1 (en) Spoofing attack detection during live image capture
Kaminski Drone federalism: Civilian drones and the things they carry
KR101626546B1 (en) Apparatus and method for processing image information to support protection of personal information
JP2022122858A (en) Method for providing information element that enables identification of unauthorized user in restricted area to device
CN109446822A (en) Right management method and system
CN106296936A (en) Community management system based on cloud platform
CN111866600A (en) Method, device and system for protecting privacy
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN110830722A (en) Safe photographing method based on base station privacy protection
CN106330886B (en) Method and equipment for protecting video privacy in remote monitoring
US20200050757A1 (en) Action monitoring apparatus, system, and method
CN104580155A (en) Safety protection method
CN111079176A (en) Safety photographing method for privacy protection based on built-in safety database
Begishev et al. Criminal legal support for safeguarding the citizens’ digital rights
CN110942540A (en) Nuclear security monitoring alarm method and device
CN109919021A (en) Face shoots image guard method
CN113268785B (en) Peep-proof display method based on target identification and automatic focusing
KR101676782B1 (en) Document Security Management System using MDM, Mobile Virtualization and short-distance and angle detection face recognition technologies
JP2010193508A (en) Crime prevention camera system, crime prevention camera image storage device
JP2006148252A (en) Crime prevention camera system, crime prevention camera image storage device
KR20190029952A (en) Image data processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200403

RJ01 Rejection of invention patent application after publication