CN110958388A - Safe photographing method based on internet privacy protection - Google Patents
Safe photographing method based on internet privacy protection Download PDFInfo
- Publication number
- CN110958388A CN110958388A CN201911199949.8A CN201911199949A CN110958388A CN 110958388 A CN110958388 A CN 110958388A CN 201911199949 A CN201911199949 A CN 201911199949A CN 110958388 A CN110958388 A CN 110958388A
- Authority
- CN
- China
- Prior art keywords
- photo
- internet
- information
- photographing
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/80—Camera processing pipelines; Components thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/617—Upgrading or updating of programs or applications for camera control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/60—Control of cameras or camera modules
- H04N23/66—Remote control of cameras or camera parts, e.g. by remote control devices
- H04N23/661—Transmitting camera control signals through networks, e.g. control via the Internet
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Studio Devices (AREA)
Abstract
The invention relates to a safe photographing method based on internet privacy protection, and belongs to the technical field of privacy information analysis and processing systems. The invention comprises the following steps: s1: the shooting safety program is built in: the system comprises a dynamic monitoring module and a networking uploading module; s2: the mobile equipment sends the identification information carried by the photo to the cloud end through the internet access module through a security program; the range information of a specific area is stored in a memory of the cloud end, and whether the identification information is matched with the stored range information is judged; issuing position information and area size to be shielded; s3: the processing of giving is taken a picture, and the high in the clouds will shelter from or need not the order of sheltering from through the internet and give to the mobile device in, handle the sensitive scope region of photo. According to the invention, the networked mobile equipment is synchronized with the cloud in real time, and before a photo is formed, the photo is processed in a shielding mode, so that privacy protection is carried out on a specific area.
Description
Technical Field
The invention relates to a safe photographing method based on internet privacy protection, and belongs to the technical field of privacy information analysis and processing systems.
Background
With the further upgrade of the photographing equipment on the mobile equipment, the privacy problem brought by photographing is gradually emphasized. For general time and places, the privacy problem is not obvious, but for certain specific areas with fixed addresses, such as scenic spots, military restricted areas, electronic product processing plants which are not on the market and the like, even if various measures for preventing death and defending are adopted, large manpower and material resources are consumed for controlling, hidden dangers such as privacy exposure brought by photographing are avoided, and the effect is not obvious. Especially for the shooting of mobile equipment connected with the internet, a mode which can limit and obscure key elements from the internet angle is still lacked, and further dynamic shielding and protection are carried out on the content of a fixed area.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a safe photographing method for protecting privacy based on the Internet.
The invention discloses a safe photographing method based on internet privacy protection, which comprises the following steps:
s1: the shooting safety program is built in:
s11: the safety program comprises the following modules:
a dynamic monitoring module: monitoring in real time as the user moves or the camera angle is different;
networking upload module: uploading device position information, the angle of the photographing device and the focal length information to a cloud server;
s12: the safety program is arranged in the mobile equipment and is started along with the starting of the photographing program;
s2: and (3) photographing and uploading:
s21: after the mobile equipment starts the GPS positioning module and the internet surfing module, the identification information carried by the photo is sent to the cloud end through the internet surfing module through a safety program;
s22: the cloud end receives the identification information and then starts the range information stored in the background;
s23, judging whether the identification information is matched with the stored range information by the cloud processor;
s231: if the position information is matched with the range information, and the range needs to be protected, the processor issues the position information and the area size which need to be shielded, and shields the sensitive range area;
s232: if the position information is not matched with the range information, the range does not need to be protected, and shielding is not needed;
s3: and (3) taking a picture and issuing:
s31: the cloud sends a command for shielding or not shielding to the mobile equipment through the Internet;
s32: the mobile equipment processes the sensitive range area of the photo through a command issued by a security program in the process of taking the photo and when the photo is not generated;
s33: and (4) shading the photo formed by taking the photo in a sensitive range area.
Preferably, in step S21, the identification information uploaded by the security program includes: position information of the device, angle of the photographing device, and focal length information.
Preferably, in step S12, the security program is a mobile device of the user, which is taken from the factory or background-licensed through the social platform applet, and is matched to the photographing program of the user, and is started with the start of the photographing program.
Preferably, in step S22, the range information stored in the cloud is sensitive information related to privacy, which is stored in the cloud after the specific area application is approved, and includes location information and specific graphics.
Preferably, in step S32, the mobile device includes an internet access module, and performs a blocking process on the photo in real time through the WIFI or GPRS module.
Preferably, in step S33, the blocking of the sensitive range area of the photo formed by taking the picture includes: fuzzy processing, encrypted frame processing and pop-up frame reminding.
Preferably, in step S33, when the occlusion mode is the encryption frame processing, the encryption frame cancels the occlusion of the sensitive area by inputting the decryption password into the encryption frame.
Preferably, in step S33, when the pop-up box is used for reminding in a blocking manner, the pop-up box is released through networking by inputting a request that does not relate to privacy in the pop-up box and through feedback of a background technician.
The invention has the beneficial effects that: according to the safe photographing method based on the internet privacy protection, the networked mobile equipment is synchronized with the cloud end in real time, the shielding command of the cloud end for the specific area is sent to the mobile equipment, the picture is processed in a shielding mode before the picture is formed, and further privacy protection is carried out on the specific area.
Drawings
Fig. 1 is a schematic structural view of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
as shown in fig. 1, the internet privacy protection-based security photographing method according to the present invention includes the following steps:
s1: the shooting safety program is built in:
s11: the safety program comprises the following modules:
a dynamic monitoring module: monitoring in real time as the user moves or the camera angle is different;
networking upload module: uploading device position information, the angle of the photographing device and the focal length information to a cloud server;
s12: the safety program is arranged in the mobile equipment and is started along with the starting of the photographing program;
s2: and (3) photographing and uploading:
s21: after the mobile equipment starts the GPS positioning module and the internet surfing module, the identification information carried by the photo is sent to the cloud end through the internet surfing module through a safety program;
s22: the cloud end receives the identification information and then starts the range information stored in the background;
s23, judging whether the identification information is matched with the stored range information by the cloud processor;
s231: if the position information is matched with the range information, and the range needs to be protected, the processor issues the position information and the area size which need to be shielded, and shields the sensitive range area;
s232: if the position information is not matched with the range information, the range does not need to be protected, and shielding is not needed;
s3: and (3) taking a picture and issuing:
s31: the cloud sends a command for shielding or not shielding to the mobile equipment through the Internet;
s32: the mobile equipment processes the sensitive range area of the photo through a command issued by a security program in the process of taking the photo and when the photo is not generated;
s33: and (4) shading the photo formed by taking the photo in a sensitive range area.
In step S21, the identification information uploaded by the security program includes: position information of the device, angle of the photographing device, and focal length information.
In step S12, the security program is a mobile device of the user, which is taken from the factory, or background-approved by the social platform applet, matched with the photographing program of the user, and started with the start of the photographing program.
In step S22, the range information stored in the cloud is sensitive information related to privacy, including location information and specific graphics, which is stored in the cloud after the application for the specific area is approved.
In the step S32, the mobile device includes an internet access module, and performs a blocking process on the photo in real time through the WIFI or GPRS module.
Example 2:
in this embodiment, the shielding manner is mainly described in detail.
The method comprises the following steps of (1) shielding a sensitive range area of a photo formed by photographing, wherein the shielding mode comprises the following steps: fuzzy processing, encrypted frame processing and pop-up frame reminding.
The manner of occlusion is chosen by the applicant for the particular region:
the first method is as follows: when the shielding mode adopts fuzzy processing, mosaic processing is directly carried out on the photos, the density of the mosaic ensures that the images of specific angles of the photos cannot be identified, and the mosaic has no relief measures for relieving;
the second method comprises the following steps: when the shielding mode adopts the encryption frame processing, the encryption frame cancels the shielding of the sensitive range area by inputting the decryption password into the encryption frame, and belongs to one of the relief measures for relieving the misoperation;
the third method comprises the following steps: when the blocking mode adopts pop-up box reminding, the pop-up box is released through networking by inputting a request which does not relate to privacy in the pop-up box and the feedback of a background technician, and belongs to one of relief measures for removing misoperation.
Example 3:
in this embodiment, the mobile device, the cloud, the security program, and the range area are further explained.
The mobile equipment mainly comprises a smart phone with a networking function, a PAD and a camera.
The cloud end mainly refers to servers of three operators, the servers are stored in the servers of the three operators through permission of the three operators, and when the mobile equipment accesses the servers of the three operators, privacy shading is conducted on the photos immediately.
The safety program can be carried by the mobile equipment itself or installed in a network mode for the mobile equipment, can be associated with the photographing program through background permission of the mobile equipment, and can timely shield the photo. After the safety program is started, real-time networking is carried out to judge whether the safety program is located in a specific area, and if the safety program is not located in the specific area any more, shielding is not carried out; otherwise, an instruction is issued to remind the user that the user is in a specific area, the photographing is limited, the privacy problem caused by photographing is avoided, if the user wants to photograph, the photo is provided with shielding information, such as a mosaic, a pop-up frame, an encryption frame and the like, and even the photographing program does not allow the photographing.
The range area may be a range of locations defined by the applicant of the particular area, a particular figure, such as a range of surrounding outlines of a scenic spot, a pattern of sights of a scenic spot, such as outlines of off-market electronic products, a range of an electronic factory, such as a range of a military exclusion zone, an outline of military equipment, and the like.
The cloud end provides a decryption request for the file processing through shielding processing, identification is carried out through technical personnel, and if the file processing belongs to misoperation, an permission instruction is issued; if the person belongs to the blocked area, the technician can continue to issue an instruction for not allowing, and give a description, for example: the scenic spot belongs to a photographing-limiting place, and photographing is prohibited.
The invention can be widely applied to the occasion of the privacy information analysis processing system.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. A safe photographing method based on internet privacy protection is characterized by comprising the following steps:
s1: the shooting safety program is built in:
s11: the safety program comprises the following modules:
a dynamic monitoring module: monitoring in real time as the user moves or the camera angle is different;
networking upload module: uploading device position information, the angle of the photographing device and the focal length information to a cloud server;
s12: the safety program is arranged in the mobile equipment and is started along with the starting of the photographing program;
s2: and (3) processing of the base station:
s21: after the mobile equipment starts the GPS positioning module and the internet surfing module, the identification information carried by the photo is sent to the cloud end through the internet surfing module through a safety program;
s22: the cloud end receives the identification information and then starts the range information stored in the background;
s23, judging whether the identification information is matched with the stored range information by the cloud processor;
s231: if the position information is matched with the range information, and the range needs to be protected, the processor issues the position information and the area size which need to be shielded, and shields the sensitive range area;
s232: if the position information is not matched with the range information, the range does not need to be protected, and shielding is not needed;
s3: and (3) taking a picture and issuing:
s31: the cloud sends a command for shielding or not shielding to the mobile equipment through the Internet;
s32: the mobile equipment processes the sensitive range area of the photo through a command issued by a security program in the process of taking the photo and when the photo is not generated;
s33: and (4) shading the photo formed by taking the photo in a sensitive range area.
2. The internet privacy protection based secure photographing method according to claim 1, wherein in the step S21, the identification information uploaded by the secure program includes: position information of the device, angle of the photographing device, and focal length information.
3. The internet privacy protection based security photographing method according to claim 1, wherein in step S12, the security program is factory-owned by the user 'S mobile device, or is background-approved by the social platform applet, is matched to the user' S photographing program, and is started with the photographing program.
4. The internet privacy-protecting secure photographing method as claimed in claim 1, wherein in step S22, the range information stored in the cloud is privacy-related sensitive information stored in the cloud after approval of the application for the specific area, including location information and specific graphics.
5. The internet privacy protection-based safe photographing method according to claim 1, wherein in the step S32, the mobile device is provided with an internet access module, and performs shielding processing on the photo in real time through a WIFI or GPRS module.
6. The internet privacy protection based security photographing method according to claim 1, wherein in step S33, the blocking of the sensitive range area of the photo formed by photographing includes: fuzzy processing, encrypted frame processing and pop-up frame reminding.
7. The internet privacy-protecting secure photographing method according to claim 6, wherein in the step S33, when the blocking manner is implemented by using an encryption box, the encryption box cancels the blocking of the sensitive area by inputting a decryption password into the encryption box.
8. The Internet privacy protection based security photographing method according to claim 6, wherein in the step S33, when the blocking manner adopts pop-up box reminding, the request which does not relate to privacy is input into the pop-up box, and the pop-up box is released through networking by feedback of a background technician.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911199949.8A CN110958388A (en) | 2019-11-29 | 2019-11-29 | Safe photographing method based on internet privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911199949.8A CN110958388A (en) | 2019-11-29 | 2019-11-29 | Safe photographing method based on internet privacy protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110958388A true CN110958388A (en) | 2020-04-03 |
Family
ID=69979085
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911199949.8A Pending CN110958388A (en) | 2019-11-29 | 2019-11-29 | Safe photographing method based on internet privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110958388A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112689093A (en) * | 2020-12-24 | 2021-04-20 | 深圳创维-Rgb电子有限公司 | Intelligent device privacy protection method, intelligent device and storage medium |
CN113190811A (en) * | 2021-05-13 | 2021-07-30 | 深圳奥赛思科技有限公司 | Method capable of safely transmitting network data and cloud server |
CN114793172A (en) * | 2022-04-15 | 2022-07-26 | 广东迅数智联科技有限公司 | Private letter processing method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10136247A (en) * | 1996-10-25 | 1998-05-22 | Canon Inc | Camera control system, camera server, control method therefor and storage medium |
CN101127834A (en) * | 2003-05-20 | 2008-02-20 | 松下电器产业株式会社 | Image capturing system |
JP2009284235A (en) * | 2008-05-22 | 2009-12-03 | Fujifilm Corp | Imaging device |
CN105323473A (en) * | 2014-07-31 | 2016-02-10 | 三星电子株式会社 | Method, device and system for modifying image including photographing restricted element |
CN105791751A (en) * | 2014-12-26 | 2016-07-20 | 浙江大华技术股份有限公司 | Image privacy occlusion method based on ball machine and ball machine |
US20160373699A1 (en) * | 2013-10-18 | 2016-12-22 | Aerovironment, Inc. | Privacy Shield for Unmanned Aerial Systems |
CN107094234A (en) * | 2017-06-29 | 2017-08-25 | 浙江宇视科技有限公司 | A kind of shooting area occlusion method and device applied to dollying terminal |
CN107945103A (en) * | 2017-11-14 | 2018-04-20 | 上海歌尔泰克机器人有限公司 | The privacy screen method, apparatus and unmanned plane of unmanned plane image |
CN108366196A (en) * | 2018-01-25 | 2018-08-03 | 西安中科创达软件有限公司 | A method of protection picture privacy |
-
2019
- 2019-11-29 CN CN201911199949.8A patent/CN110958388A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10136247A (en) * | 1996-10-25 | 1998-05-22 | Canon Inc | Camera control system, camera server, control method therefor and storage medium |
CN101127834A (en) * | 2003-05-20 | 2008-02-20 | 松下电器产业株式会社 | Image capturing system |
JP2009284235A (en) * | 2008-05-22 | 2009-12-03 | Fujifilm Corp | Imaging device |
US20160373699A1 (en) * | 2013-10-18 | 2016-12-22 | Aerovironment, Inc. | Privacy Shield for Unmanned Aerial Systems |
CN105323473A (en) * | 2014-07-31 | 2016-02-10 | 三星电子株式会社 | Method, device and system for modifying image including photographing restricted element |
CN105791751A (en) * | 2014-12-26 | 2016-07-20 | 浙江大华技术股份有限公司 | Image privacy occlusion method based on ball machine and ball machine |
CN107094234A (en) * | 2017-06-29 | 2017-08-25 | 浙江宇视科技有限公司 | A kind of shooting area occlusion method and device applied to dollying terminal |
CN107945103A (en) * | 2017-11-14 | 2018-04-20 | 上海歌尔泰克机器人有限公司 | The privacy screen method, apparatus and unmanned plane of unmanned plane image |
CN108366196A (en) * | 2018-01-25 | 2018-08-03 | 西安中科创达软件有限公司 | A method of protection picture privacy |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112689093A (en) * | 2020-12-24 | 2021-04-20 | 深圳创维-Rgb电子有限公司 | Intelligent device privacy protection method, intelligent device and storage medium |
CN112689093B (en) * | 2020-12-24 | 2022-06-10 | 深圳创维-Rgb电子有限公司 | Intelligent device privacy protection method, intelligent device and storage medium |
CN113190811A (en) * | 2021-05-13 | 2021-07-30 | 深圳奥赛思科技有限公司 | Method capable of safely transmitting network data and cloud server |
CN113190811B (en) * | 2021-05-13 | 2022-02-01 | 深圳奥赛思科技有限公司 | Method capable of safely transmitting network data and cloud server |
CN114793172A (en) * | 2022-04-15 | 2022-07-26 | 广东迅数智联科技有限公司 | Private letter processing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110958388A (en) | Safe photographing method based on internet privacy protection | |
CN104318171B (en) | Android private data guard methods and system based on rights label | |
EP2653772B1 (en) | Image recognition for personal protective equipment compliance enforcement in work areas | |
CN106330958B (en) | Secure access method and device | |
US20180012094A1 (en) | Spoofing attack detection during live image capture | |
Kaminski | Drone federalism: Civilian drones and the things they carry | |
KR101626546B1 (en) | Apparatus and method for processing image information to support protection of personal information | |
JP2022122858A (en) | Method for providing information element that enables identification of unauthorized user in restricted area to device | |
CN109446822A (en) | Right management method and system | |
CN106296936A (en) | Community management system based on cloud platform | |
CN111866600A (en) | Method, device and system for protecting privacy | |
KR102365589B1 (en) | Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system | |
CN110830722A (en) | Safe photographing method based on base station privacy protection | |
CN106330886B (en) | Method and equipment for protecting video privacy in remote monitoring | |
US20200050757A1 (en) | Action monitoring apparatus, system, and method | |
CN104580155A (en) | Safety protection method | |
CN111079176A (en) | Safety photographing method for privacy protection based on built-in safety database | |
Begishev et al. | Criminal legal support for safeguarding the citizens’ digital rights | |
CN110942540A (en) | Nuclear security monitoring alarm method and device | |
CN109919021A (en) | Face shoots image guard method | |
CN113268785B (en) | Peep-proof display method based on target identification and automatic focusing | |
KR101676782B1 (en) | Document Security Management System using MDM, Mobile Virtualization and short-distance and angle detection face recognition technologies | |
JP2010193508A (en) | Crime prevention camera system, crime prevention camera image storage device | |
JP2006148252A (en) | Crime prevention camera system, crime prevention camera image storage device | |
KR20190029952A (en) | Image data processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200403 |
|
RJ01 | Rejection of invention patent application after publication |