CN111064653A - Image exchange method, device and system and electronic equipment - Google Patents

Image exchange method, device and system and electronic equipment Download PDF

Info

Publication number
CN111064653A
CN111064653A CN201911082167.6A CN201911082167A CN111064653A CN 111064653 A CN111064653 A CN 111064653A CN 201911082167 A CN201911082167 A CN 201911082167A CN 111064653 A CN111064653 A CN 111064653A
Authority
CN
China
Prior art keywords
user
image
target image
user equipment
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911082167.6A
Other languages
Chinese (zh)
Other versions
CN111064653B (en
Inventor
贺三元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koubei Shanghai Information Technology Co Ltd
Original Assignee
Koubei Shanghai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koubei Shanghai Information Technology Co Ltd filed Critical Koubei Shanghai Information Technology Co Ltd
Priority to CN201911082167.6A priority Critical patent/CN111064653B/en
Publication of CN111064653A publication Critical patent/CN111064653A/en
Application granted granted Critical
Publication of CN111064653B publication Critical patent/CN111064653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/23Reliability checks, e.g. acknowledgments or fault reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides an image exchange method, which comprises the following steps: the method comprises the steps of obtaining a first target image sent by user equipment of a first user, and obtaining a second target image sent by user equipment of a second user; and if the first target image and the second target image are authenticated, sending the first target image to the user equipment of the second user, and sending the second target image to the user equipment of the first user. According to the image exchange method, after the first target image and the second target image are authenticated, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user. Therefore, both image exchange parties can obtain the image of the other party, and the image of the other party obtained by both image exchange parties is the authenticated image, so that the image exchange can be completed, and the risk of leakage of own image information is reduced.

Description

Image exchange method, device and system and electronic equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to an image exchange method, apparatus, system, and electronic device.
Background
With the rapid development of computer technology and internet technology, various network social platforms emerge in large numbers. The advent of social networking platforms brings great convenience to people's social activities and business activities, such as: people can complete activities such as friend making, chatting, business and the like through the social networking platform.
Networks often suffer from reliability issues while providing convenience to us. For example, two parties who socialize using a social networking platform often exchange photos with each other to increase the knowledge of the other party. For another example, when a business transaction is performed, two parties of the business transaction often exchange photos with each other through the social networking platform before negotiation cooperation or offline signing up, so as to increase the understanding of the two parties and the trust level of each other. However, in the process of exchanging photos with each other through the social networking platform, the following situations often occur: 1. the method comprises the following steps that a party who sends a photo sends the photo to the other party, and the other party does not reply the photo, so that the party can obtain the photo of the other party under the condition of not exchanging the photo; 2. at least one of two parties exchanging photos with each other does not send own photos, which causes one party to maliciously obtain the photos of the other party through false photos. In either case, this is a problem in that the photograph that should be exchanged is maliciously obtained. Therefore, the current scenes of exchanging photos with each other through the social networking platform have the security problem of the photo exchange process.
Further, the above problem may also exist in other scenes where images are exchanged.
Disclosure of Invention
The application provides an image exchange method to solve the safety problem of an image exchange process.
The embodiment of the application provides an image exchange method, which comprises the following steps:
the method comprises the steps of obtaining a first target image sent by user equipment of a first user, and obtaining a second target image sent by user equipment of a second user;
and if the first target image and the second target image are authenticated, sending the first target image to the user equipment of the second user, and sending the second target image to the user equipment of the first user.
Optionally, the authenticating the first target image and the second target image includes: the user characteristic information corresponding to the first target image is matched with the user characteristic information of the first user, and the user characteristic information corresponding to the second target image is matched with the user characteristic information of the second user.
Optionally, the obtaining a first target image sent by a user equipment of a first user and obtaining a second target image sent by a user equipment of a second user includes:
obtaining a first target image sent by user equipment of a first user;
authenticating the first target image;
and if the first target image passes the authentication, obtaining a second target image sent by the user equipment of a second user.
Optionally, the obtaining a second target image sent by the user equipment of the second user if the first target image is authenticated includes:
if the first target image passes the authentication, generating an image exchange request message for requesting the user equipment of the second user to send the second target image;
providing the image exchange request message to the user equipment of the second user;
and obtaining a second target image sent by the user equipment of the second user aiming at the image exchange request message.
Optionally, the generating an image exchange request message requesting the user equipment of the second user to send the second target image includes:
generating a first blurred image according to the first target image, and generating an image exchange request message for the first blurred image, wherein the first blurred image is an image obtained by reducing the definition of the first target image;
the user device providing the image exchange request message to the second user comprises:
providing an image exchange request message for the first blurred image and the first blurred image to a user equipment of the second user.
Optionally, matching the user characteristic information corresponding to the first target image with the user characteristic information of the first user includes: and matching the user biological characteristic information obtained by identification from the first target image with the user biological characteristic information reserved by the first user.
Optionally, the method further includes:
comparing the user biological characteristic information identified from the first target image with the user biological characteristic information reserved by the first user;
and if the similarity between the user biological characteristic information identified from the first target image and the user biological characteristic information reserved by the first user reaches or exceeds a first similarity threshold, determining that the user biological characteristic information identified from the first target image is matched with the user biological characteristic information reserved by the first user.
Optionally, the comparing the user biometric information identified from the first target image with the user biometric information reserved by the first user includes: and comparing the user facial feature information identified from the first target image with the user facial feature information reserved by the first user.
Optionally, the obtaining a first target image sent by a user equipment of a first user includes:
sending an image acquisition instruction to the user equipment of the first user, wherein the image acquisition instruction is used for calling a camera device corresponding to the user equipment of the first user to acquire an image containing the biological characteristics of the current user;
acquiring an image which is sent by the user equipment of the first user aiming at the image acquisition instruction and contains the biological characteristics of the current user;
and taking the image containing the current user biological characteristics as the first target image.
Optionally, the obtaining a first target image sent by a user equipment of a first user includes:
obtaining a candidate target image sent by the user equipment of the first user, wherein the candidate target image is an image containing user characteristics
Sending an image acquisition instruction to the user equipment of the first user, wherein the image acquisition instruction is used for calling a camera device corresponding to the user equipment of the first user to acquire an image containing the biological characteristics of the current user;
acquiring an image which is sent by the user equipment of the first user aiming at the image acquisition instruction and contains the biological characteristics of the current user;
judging whether the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic;
and if the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic, taking the candidate target image sent by the user equipment of the first user as the first target image.
Optionally, if the user biometric information corresponding to the candidate target image sent by the user equipment of the first user is not matched with the user biometric information corresponding to the image containing the current user biometric, the candidate target image sent by the user equipment of the first user is obtained again until the user biometric information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biometric information corresponding to the image containing the current user biometric.
Optionally, if the user biometric information corresponding to the candidate target image sent by the user equipment of the first user does not match the user biometric information corresponding to the image containing the current user biometric, the image containing the current user biometric is taken as the first target image.
Optionally, the determining whether the user biological information corresponding to the candidate target image sent by the user equipment of the first user matches with the user biological feature information corresponding to the image containing the current user biological feature includes:
judging whether the similarity between the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user and the user biological characteristic information corresponding to the image containing the current user biological characteristic reaches or is greater than a second similarity threshold value;
and if so, determining that the biological feature information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological feature information corresponding to the image containing the biological feature of the current user.
Optionally, if the similarity between the user biometric information included in the original image sent by the user equipment of the first user and the user biometric information included in the first user image does not reach the second similarity threshold, it is determined that the biometric information corresponding to the candidate target image sent by the user equipment of the first user does not match the user biometric information corresponding to the image including the biometric characteristic of the current user.
Optionally, the matching of the user characteristic information corresponding to the second target image and the user characteristic information of the second user includes: and matching the user biological characteristic information obtained by identification from the second target image with the user biological characteristic information reserved by the second user.
Optionally, the method further includes: and if the first target image is not authenticated, another first target image sent by the user equipment of the first user is obtained again until the first target image is authenticated.
Optionally, if the first image is authenticated and the second image is not authenticated, another second target image sent by the user equipment of another second user is obtained again until the second target image is authenticated.
Optionally, if the first image is authenticated and the second image is not authenticated, providing feedback information of a second user verification failure to at least one of the user device of the first user and the user device of the second user.
Optionally, the obtaining a first target image sent by a user equipment of a first user includes:
receiving an image exchange initiation request message sent by user equipment of the first user, wherein the image exchange initiation request message is a request message for initiating image exchange to the second user;
and obtaining a first target image sent by the user equipment of the first user aiming at the image exchange initiation request message.
Optionally, the generating an image exchange request message requesting the user equipment of the second user to send the second target image includes:
acquiring identification information of a second user carried in an image exchange initiation request message sent by user equipment of the first user, wherein the image exchange initiation request message is a request message for initiating image exchange to the second user;
and generating an image exchange request message for requesting the user equipment of the second user to send the second target image according to the identification information of the second user.
Optionally, the obtaining a first target image sent by a user equipment of a first user and obtaining a second target image sent by a user equipment of a second user further includes:
obtaining a first target image sent by the user equipment of the first user and a second target image sent by the user equipment of the second user according to the first photo exchange initiation request of the user equipment of the first user and the second photo exchange initiation request of the user equipment of the second user;
if the first target image and the second target image are authenticated, sending the first target image to the user equipment of the second user, and sending the second target image to the user equipment of the first user, including:
and if the first target image and the second target image are authenticated and the initiating time interval of the first photo exchange initiating request and the second photo exchange initiating request is within a specified time period, sending the first target image to the user equipment of the second user and sending the second target image to the user equipment of the first user.
In an embodiment of the present application, in another aspect, an image exchange apparatus is provided, including:
the target image obtaining unit is used for obtaining a first target image sent by user equipment of a first user and obtaining a second target image sent by user equipment of a second user;
and the target image sending unit is used for sending the first target image to the user equipment of the second user and sending the second target image to the user equipment of the first user if the first target image and the second target image are authenticated.
In an embodiment of the present application, in another aspect, an image exchange system is provided, including: the method comprises the steps that a server, user equipment of a first user and user equipment of a second user are connected;
the server is used for acquiring a first target image sent by the user equipment of the first user and acquiring a second target image sent by the user equipment of the second user; if the first target image and the second target image are authenticated, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user;
the user equipment of the first user is used for sending a first target image to the server; receiving a second target image sent by the server; displaying the second target image;
the user equipment of the second user is used for sending a second target image to the server; receiving a first target image sent by the server; and displaying the first target image.
In another aspect, an embodiment of the present application provides an image exchange method, including:
the method comprises the steps that user equipment of a second user obtains a first blurred image provided by a server, wherein the first blurred image is obtained by reducing the definition of a first target image corresponding to a first user;
the user equipment of the second user provides a second target image corresponding to the second user to the server, wherein the second target image is an image which needs to be sent to the user equipment of the first user through the server;
and the user equipment of the second user obtains the first target image provided by the server.
Optionally, the method further includes: and the user equipment of the second user displays the first blurred image.
Optionally, the method further includes: and the user equipment of the second user displays the first target image.
Optionally, the first blurred image is an image obtained by reducing the sharpness of the first target image below a specified sharpness threshold.
In another aspect, an embodiment of the present application provides an image switching apparatus, which is applied to a user equipment of a second user, and includes:
the server comprises a blurred image obtaining unit, a blurred image obtaining unit and a blurred image processing unit, wherein the blurred image obtaining unit is used for obtaining a first blurred image provided by the server, and the first blurred image is an image obtained by reducing the definition of a first target image corresponding to a first user;
a second target image providing unit, configured to provide a second target image corresponding to a second user to the server, where the second target image is an image that needs to be sent to user equipment of the first user through the server;
and the first target image obtaining unit is used for obtaining a first target image provided by the server.
In an embodiment of the present application, in another aspect, an image exchange system is provided, including: user equipment and a server of a second user;
the user equipment of the second user is used for obtaining a first blurred image provided by the server, wherein the first blurred image is obtained by reducing the definition of a first target image corresponding to the first user; providing a second target image corresponding to a second user to the server, wherein the second target image is an image which needs to be sent to user equipment of the first user through the server; obtaining a first target image provided by the server; displaying the first target image;
the server is used for providing the first blurred image for the user equipment of the second user.
An embodiment of the present application, in a first aspect, provides an electronic device, including:
a processor; and
and the memory is used for storing a computer program, and the equipment executes the image exchange method after being powered on and running the computer program through the processor.
In an embodiment of the present application, a first aspect provides a storage medium, where a computer program is stored, and the computer program is executed by a processor to execute the image exchange method.
Compared with the prior art, the method has the following advantages:
according to the image exchange method, after the first target image sent by the user equipment of the first user and the second target image sent by the user equipment of the second user pass authentication, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user. Therefore, both sides of the image exchange can obtain the authenticated image of the other side, so that the situation that one side does not provide the image or maliciously obtains the image of the other side through a false image is avoided in the image exchange scene, and the safety of the image exchange process is ensured.
Drawings
Fig. 1 is a schematic diagram of an application scenario embodiment of an image exchange method provided in the present application.
Fig. 2 is a flowchart of an image exchange method provided in the first embodiment of the present application.
Fig. 3 is a flowchart of an image obtaining method provided in the first embodiment of the present application.
Fig. 4 is a flowchart of a second target image obtaining method provided in the first embodiment of the present application.
Fig. 5 is a flowchart of another image exchange method provided in the first embodiment of the present application.
Fig. 6 is a schematic diagram of an image exchange apparatus according to a second embodiment of the present application.
Fig. 7 is a schematic view of an electronic device according to an embodiment of the present application.
Fig. 8 is a flowchart of an image exchange method provided in a fifth embodiment of the present application.
Fig. 9 is a schematic diagram of an image exchange apparatus according to a sixth embodiment of the present application.
Fig. 10 is a schematic diagram of an image exchange system provided in a ninth embodiment of the present application.
Fig. 11 is a schematic diagram of an image exchange system provided in a tenth embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of implementation in many different ways than those herein set forth and of similar import by those skilled in the art without departing from the spirit of this application and is therefore not limited to the specific implementations disclosed below.
In order to more clearly show the image exchange method provided by the present application, an application scenario of the image exchange method provided by the present application is introduced first. Some embodiments provided by the present application may be applied to a scenario in which a server interacts with an image exchange initiator device and an image exchange receiver device, as shown in fig. 1, which is a schematic diagram of an application scenario embodiment of an image exchange method provided by the present application. When using a social networking platform to perform social networking, it is generally necessary for both parties performing social networking to install an application program of the social networking platform on their respective devices. In this scenario embodiment of the application, one of two parties in social networking service initiating image exchange is denoted as an image exchange initiator, an application device of the image exchange initiator is denoted as an image exchange initiator device 102, one of the two parties in social networking service receiving image exchange is denoted as an image exchange receiver, and an application device of the image exchange receiver is denoted as an image exchange receiver device 103. The image exchange initiator device 102 and the image exchange receiver device 103 may be devices such as a smart phone, a tablet computer, and a PC, which are capable of installing an Application program of a social network platform, and the image exchange method provided in the scene embodiment of the present Application is specifically described by taking the example that the image exchange initiator device 102 and the image exchange receiver device 103 are both smart phones, at this time, the Application program of the social network platform is a mobile phone APP (Application). Before image exchange is carried out between two social networking parties through a social networking platform, the accounts of the social networking platform need to be registered through respective mobile phone APPs, and then the two social networking parties can carry out image exchange through account login APPs on respective smart phones. In the scene embodiment of the application, the images exchanged by the two social networking parties are generally photographs containing biological feature information such as own facial feature information. When a user registers an account of the social networking platform, the social networking platform collects user characteristic information of the user, such as: the method comprises the steps of acquiring face feature information, age information, personal preference information and the like, correspondingly storing the acquired user feature information and respective accounts in a server 101 of the social networking platform, so that when a subsequent user logs in an APP through the account, the subsequent user can identify and authenticate the logged-in user according to the face feature information and the like acquired during registration, and the logged-in user is ensured to be the registered user. In a scenario embodiment of the data exchange method provided by the present application, the server 101 of the social networking platform may be a server of the social networking platform, and the way in which the social networking platform collects the user feature information of the user may be to collect an image including a feature of a registered user, and then perform user feature identification on the image including the feature of the registered user to obtain user feature information corresponding to the image including the feature of the registered user. In the scene embodiment of the data exchange method provided by the application, the facial feature information and the like collected when the user registers the platform account are further used as the subsequent authentication basis for the images used for exchange by the two parties. I.e. the user characteristic information as a reservation for the image used for the authentication exchange.
In a scene embodiment of the data exchange method provided by the present application, a target image sent by the image exchange initiator device 102 to the server 101 of the social networking platform is marked as a first target image, where the first target image is an image containing a user feature, for example, the first target image is an image containing a biological feature of a user. After obtaining the first target image, the server 101 of the social network platform identifies the user characteristics in the first target image, obtains user characteristic information corresponding to the first target image, and authenticates the first target image according to the user characteristic information corresponding to the first target image and user characteristic information reserved by the first user when registering an account. After the first target image passes the authentication, the server 101 of the social network platform generates an image exchange request message for the image exchange receiver according to the identification information containing the image exchange receiver device 103, and finds an account corresponding to the image exchange receiver, so that the image exchange request message is provided to the image exchange receiver device 103 installed with the social network platform APP through the account corresponding to the image exchange receiver. Specifically, the server 101 of the social networking platform may perform blurring processing on the first user image, generate an image exchange request message for the first blurred image, and then provide the image exchange request message for the first blurred image and the first blurred image after the blurring processing to the image exchange receiver device 103.
After obtaining the image exchange request message by obtaining the image exchange receiver device 103, if the image exchange is desired, the image exchange receiver 102 sends the image of the own party to the server 101 of the social networking platform through the image exchange receiver device 103 for the image exchange request message. After receiving the second target image, the server 101 of the social networking platform authenticates the second target image. Specifically, the second target image is an image including a user feature, for example, the second target image is an image including a user biometric feature. After obtaining the second target image, the server 101 of the social network platform identifies the user characteristics in the second target image, obtains user characteristic information corresponding to the second target image, and authenticates the second target image according to the user characteristic information corresponding to the second target image and the user characteristic information reserved by the second user when registering an account. If the second target image is authenticated, the server 101 of the social networking platform provides the second target image to the image exchange initiator device 102, and provides the first target image to the image exchange receiver device 103, so as to complete the image exchange between the two social networking parties through the social networking platform.
In the scene embodiment of the image exchange method provided by the present application, the first target image may be obtained in the following two ways: the first mode is as follows: after obtaining the image exchange initiation request message, the server 101 of the social networking platform sends an image acquisition instruction to the image exchange initiator device 102, where the image acquisition instruction is used to invoke a camera device corresponding to the image exchange initiator device 102 to acquire an image containing a current user biological feature, and the image containing the current user biological feature sent by the image exchange initiator device 102 for the image acquisition instruction is used as a first target image; the second way is: after obtaining the image exchange initiation request message, the server 101 of the social networking platform sends an instruction for uploading a candidate target image to the image exchange initiator device 102, the image exchange initiator selects a candidate target image that the image exchange initiator wants to send, the candidate target image is an image containing user characteristics, in order to ensure that the candidate target image is the image of the image exchange initiator itself, at this time, the server 101 of the social networking platform sends an image acquisition instruction to the image exchange initiator device 102, the image acquisition instruction is used for calling a camera device corresponding to the image exchange initiator device 102 to acquire an image containing the current user biological characteristics, the image exchange initiator device 102 identifies the image containing the current user biological characteristics sent by the image acquisition instruction, and identifies the user biological characteristic information corresponding to the candidate target image and the user biological characteristic information corresponding to the image containing the current user biological characteristics And matching the user biological characteristic information corresponding to the target image with the user biological characteristic information corresponding to the image containing the current user biological characteristic, and if the matching is passed, taking the candidate target image as the first user image. The second target image is obtained in a manner similar to that of the first target image. In the scene embodiment of the image exchange method provided by the present application, the image matching method generally includes the following steps: and performing user feature identification on the image to be matched to obtain user feature information corresponding to the image to be matched, comparing the user feature information corresponding to different images to be matched, and judging whether the matching is passed according to the similarity of the biological feature information obtained by comparison and whether the similarity reaches or exceeds a similarity threshold value.
The application scenario of the image exchange method is not specifically limited, for example: the image exchange method provided by the application can also be applied to a scene where the server side, the image exchange initiator device and the image exchange receiver device work independently, and is not repeated herein.
The above embodiments of the application scenarios of the image exchange method are provided to facilitate understanding of the image exchange method provided in the present application, and are not intended to limit the image exchange method provided in the present application.
First embodiment
A first embodiment of the present application provides an image exchange method, which is described in detail below with reference to fig. 2 to 5.
As shown in fig. 2, fig. 2 is a flowchart of an image exchange method provided in a first embodiment of the present application.
In step S201, a first target image sent by a user equipment of a first user is obtained, and a second target image sent by a user equipment of a second user is obtained.
The method comprises the following steps that a first user is an image exchange initiator, and user equipment of the first user is image exchange initiator equipment; the second user is an image exchange receiver, and the user equipment of the second user is image exchange receiver equipment.
In the first embodiment of the present application, a specific process of obtaining a first target image sent by a user equipment of a first user and obtaining a second target image sent by a user equipment of a second user is shown in fig. 3, where fig. 3 is a flowchart of an image obtaining method provided in the first embodiment of the present application.
In step S301, a first target image transmitted by a user device of a first user is obtained.
In the image exchange method provided in the first embodiment of the present application, the obtaining of the first target image is a step executed in response to an image exchange initiation request message sent by the user equipment of the first user. Receiving an image exchange initiation request message sent by user equipment of a first user, wherein the image exchange initiation request message is a request message for initiating image exchange to a second user; and obtaining a first target image sent by the user equipment of the first user aiming at the image exchange initiation request message. Since the image exchange method provided in the first embodiment of the present application needs to determine whether both the first target image and the second target image can pass the authentication after the first target image and the second target image are obtained, and whether the authentication of the first target image and the second target image passes the authentication is determined by determining whether the user feature information corresponding to the first target image matches the user feature information of the first user, and whether the user feature information corresponding to the second target image matches the user feature information of the second user, the first target image in the first embodiment of the present application is an image including user features, for example: an image containing a biometric characteristic of the user. Wherein the user biometric features include at least user facial features. The first target image can be obtained in the following two ways in the first embodiment of the present application:
the first mode is as follows: sending an image acquisition instruction to user equipment of a first user, wherein the image acquisition instruction is used for calling a camera device corresponding to the user equipment of the first user to acquire an image containing the biological characteristics of the current user; acquiring an image which is sent by user equipment of a first user aiming at an image acquisition instruction and contains the biological characteristics of the current user; and taking an image containing the biological characteristics of the current user as a first target image. By the method, the obtained first target image can be ensured to be the image of the current initiating image exchange initiator.
The second way is: the method comprises the steps of obtaining a candidate target image sent by user equipment of a first user, wherein the candidate target image is an image containing user characteristics and sends an image acquisition instruction to the user equipment of the first user, and the image acquisition instruction is used for calling a camera device corresponding to the user equipment of the first user to acquire the image containing the biological characteristics of the current user; acquiring an image which is sent by user equipment of a first user aiming at an image acquisition instruction and contains the biological characteristics of the current user; judging whether user biological characteristic information corresponding to a candidate target image sent by user equipment of a first user is matched with user biological characteristic information corresponding to an image containing the current user biological characteristic; and if the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic, taking the candidate target image sent by the user equipment of the first user as the first target image. The candidate target image may be an image stored by the first user in a user equipment album of the first user. The first target image is obtained in the second mode, the first target image can be ensured to be a photo that the current initiating image exchange initiator wants to send, and the candidate target image can be taken as the first target image only when the user biological feature information corresponding to the candidate target image is matched with the user biological feature information corresponding to the image containing the current user biological feature, so that the obtained first target image can be further ensured to be the image of the current initiating image exchange initiator.
When the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is not matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic, the candidate target image sent by the user equipment of the first user is obtained again until the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic; or directly using the image containing the current user biological characteristics as the first target image. In this way, flexibility of the first user in transmitting the image through the user device of the first user can be ensured, and furthermore, the probability of success in obtaining the first target image is increased.
The specific process when judging whether the user biological information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic is as follows: judging whether the similarity between the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user and the user biological characteristic information corresponding to the image containing the current user biological characteristic reaches or is greater than a similarity threshold value; if yes, determining that the biological feature information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological feature information corresponding to the image containing the biological feature of the current user. And if the similarity between the user biological characteristic information contained in the original image sent by the user equipment of the first user and the user biological characteristic information contained in the first user image does not reach a similarity threshold value, determining that the biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is not matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic. Since the plurality of similarities and the similarity thresholds corresponding to the similarities are involved in the first embodiment of the present application, in order to facilitate distinguishing the similarity thresholds corresponding to different similarities, in the embodiment of the present application, a similarity threshold corresponding to whether the user biometric information corresponding to the candidate target image sent by the user equipment of the first user corresponds to the user biometric information corresponding to the image including the current user biometric information is recorded as the second similarity threshold.
In step S302, the first target image is authenticated.
Since the first target image is an image including a user feature, the method for authenticating the first target image in the first embodiment of the present application is as follows: and judging whether the user characteristic information corresponding to the first target image is the user characteristic information reserved by the first user.
In step S303, if the first target image is authenticated, the second target image sent by the user equipment of the second user is obtained.
In the first embodiment of the present application, the first target image is authenticated to be the user feature information corresponding to the first target image, and the user feature information of the first user is matched. Specifically, matching the user characteristic information corresponding to the first target image with the user characteristic information of the first user includes: and matching the user biological characteristic information obtained by identification from the first target image with the user biological characteristic information reserved by the first user.
In order to determine whether the user biometric information identified from the first target image matches with the user biometric information reserved by the first user, in the first embodiment of the present application, the user biometric information identified from the first target image needs to be compared with the user biometric information reserved by the first user; in the first embodiment of the present application, a similarity threshold corresponding to a similarity between user biometric information identified from a first target image and user biometric information reserved by a first user is recorded as a first similarity threshold, and at this time, if the similarity between the user biometric information identified from the first target image and the user biometric information reserved by the first user reaches or exceeds the first similarity threshold, it is determined that the user biometric information identified from the first target image matches the user biometric information reserved by the first user.
Since the common user biometric feature is generally facial feature information of the user, comparing the user biometric feature information identified from the first target image with the user biometric feature information reserved by the first user in the first embodiment of the present application includes: and comparing the user facial feature information obtained by identification from the first target image with the user facial feature information reserved by the first user.
In order to prevent an error in matching or an image selected by the first user being inappropriate, which may result in the first user not being able to successfully transmit the first target image, in the first embodiment of the present application, if the original image transmitted by the user device of the first user does not match the biometric information of the first user in the image of the first user, the first target image transmitted by the user device of another first user is obtained again until the first target image passes authentication. That is, the user characteristic information corresponding to the first target image matches the user characteristic information of the first user. In the first embodiment of the present application, if the first target image is not authenticated, the user equipment that further obtains the second user does not send the second target image. As shown in fig. 4, fig. 4 is a flowchart of a second target image obtaining method provided in the first embodiment of the present application.
In step S401, if the first target image is authenticated, an image exchange request message requesting the user equipment of the second user to transmit the second target image is generated.
After the first target image is verified, in order to obtain a second target image sent by the user equipment of the second user, an image exchange request message for requesting the user equipment of the second user to send the second target image needs to be generated.
Specifically, the manner of generating the image exchange request message requesting the user equipment of the second user to send the second target image is as follows: acquiring identification information of a second user carried in an image exchange initiating request message sent by user equipment of a first user, wherein the image exchange initiating request message is a request message for initiating image exchange to the second user; and generating an image exchange request message for requesting the user equipment of the second user to send the second target image according to the identification information of the second user.
Specifically, the manner of generating the image exchange request message requesting the user equipment of the second user to send the second target image may also be: a first blurred image is generated from the first target image, and an image exchange request message for the first blurred image is generated, the first blurred image being an image in which the sharpness of the first target image is reduced.
In step S402, an image exchange request message is provided to the user equipment of the second user.
After the image exchange request message is generated, the server needs to provide the image exchange request message to the user equipment of the second user, and at this time, the server needs to find the account corresponding to the second user again according to the identification information of the second user, so that the image exchange request message is provided to the user equipment of the second user through the account corresponding to the image exchange receiver. As a preferred mode, the user equipment for providing the image exchange request message to the second user includes: and providing the image exchange request message for the first blurred image and the first blurred image to the user equipment of the second user. The first blurred image is an image obtained by reducing the definition of the first target image below a specified definition threshold. The first blurred image is used as the image exchange request message, the interest of the image exchange receiver in exchanging the image can be increased to a certain extent, and due to the transmitted image obtained by reducing the definition of the first target image, even if the image exchange receiver does not agree with the image exchange or the first blurred image is illegally obtained by others, the image information of the image exchange initiator cannot be exposed.
In step S403, a second target image sent by the user equipment of the second user for the image exchange request message is obtained.
Obtaining a second target image sent by the user equipment of the second user for the image exchange request message, comprising: the second target image sent by the user equipment of the second user according to the image exchange request message is obtained, because the image exchange method provided in the first embodiment of the present application needs to determine whether both the first target image and the second target image can pass the authentication after obtaining the first target image and the second target image, and whether the authentication of the first target image and the second target image passes the authentication is determined by determining whether the user characteristic information corresponding to the first target image matches the user characteristic information of the first user, and whether the user characteristic information corresponding to the second target image matches the user characteristic information of the second user, the second target image in the first embodiment of the present application is an image including the biometric information of the second user. The second target image may be obtained in two ways similar to obtaining the first target image in the second embodiment of the present application:
the first mode is as follows: sending an image acquisition instruction to user equipment of a second user, wherein the image acquisition instruction is used for calling a camera device corresponding to the user equipment of the second user to acquire an image containing the biological characteristics of the current user; acquiring an image containing the biological characteristics of the current user, which is sent by user equipment of a second user aiming at an image acquisition instruction; and taking the image containing the biological characteristics of the current user as a second target image.
The second way is: acquiring a candidate target image sent by user equipment of a second user, wherein the candidate target image is an image containing user characteristics and sends an image acquisition instruction to the user equipment of the second user, and the image acquisition instruction is used for calling a camera device corresponding to the user equipment of the second user to acquire the image containing the biological characteristics of the current user; acquiring an image containing the biological characteristics of the current user, which is sent by user equipment of a second user aiming at an image acquisition instruction; judging whether the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the second user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic; and if the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the second user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic, taking the candidate target image sent by the user equipment of the second user as the second target image. Wherein the candidate target image may be an image stored by the second user in a user device album of the second user.
In order to prevent the second user from being able to successfully transmit the second target image due to an error in matching or an improper image selected by the second user, in the second embodiment of the present application, if the original image transmitted by the user device of the second user does not match the biometric information of the second user in the image of the second user, the second target image transmitted by the user device of another second user is obtained again until the second target image passes authentication. That is, the user characteristic information corresponding to the second target image matches the user characteristic information of the second user.
In the first implementation of the application, if the first image passes the authentication and the second image does not pass the authentication, another second target image sent by the user equipment of the second user is obtained again until the second target image passes the authentication; or providing feedback information of the second user authentication failure to at least one of the user equipment of the first user and the user equipment of the second user.
Referring to fig. 2 again, in step S202, if the first target image and the second target image are both authenticated, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user.
Having described in detail how to authenticate separately in step S201, in this step S202, as long as both the first target image and the second target image are authenticated, the first target image is transmitted to the user equipment of the second user, and the second target image is transmitted to the user equipment of the first user.
In the first embodiment of the present application, the first target image and the second target image are both authenticated as: the user characteristic information corresponding to the first target image is matched with the user characteristic information of the first user, and the user characteristic information corresponding to the second target image is matched with the user characteristic information of the second user.
In the first embodiment of the present application, if any one of the first target image and the second target image is not authenticated, the first target image is not sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user.
As a preferred implementation, the method for exchanging graphics provided in the first embodiment of the present application may also perform self-distribution, where obtaining a first target image sent by a user device of a first user and obtaining a second target image sent by a user device of a second user includes: according to a first photo exchange initiation request of user equipment of a first user and a second photo exchange initiation request of user equipment of a second user, obtaining a first target image sent by the user equipment of the first user and obtaining a second target image sent by the user equipment of the second user; correspondingly, if the first target image and the second target image are both authenticated, the sending of the first target image to the user equipment of the second user and the sending of the second target image to the user equipment of the first user comprises: and if the first target image and the second target image are authenticated and the initiating time interval of the first photo exchange initiating request and the initiating time interval of the second photo exchange initiating request are within a specified time period, sending the first target image to the user equipment of the second user and sending the second target image to the user equipment of the first user.
According to the image exchange method, after the first target image and the second target image are authenticated, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user. Specifically, when the user characteristic information corresponding to the first target image matches with the user characteristic information of the first user and the user characteristic information corresponding to the second target image matches with the user characteristic information of the second user, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user. Therefore, both sides of the image exchange can obtain the image of the other side, and the image of the other side obtained by both sides of the image exchange is the authenticated image, so that the image exchange can be completed, the possibility that the image information of the own side is maliciously obtained by the other side is reduced, and the risk of the leakage of the image information of the own side is reduced.
As shown in fig. 5, fig. 5 is a flowchart of another image exchange method provided in the first embodiment of the present application.
Step 501: the server side performs registration authentication according to registration request messages sent by the equipment used by the first user and the equipment used by the second user; step 501-1: the server stores the facial feature information transmitted by the device used by the first user and the device used by the second user.
Step 502: the method comprises the steps that equipment used by a first user sends an image exchange initiation request message to a server; step 502-1: the server generates a first target image acquisition instruction aiming at the image exchange initiation request message; step 502-2: the server side provides the first target image obtaining instruction for the equipment of the first user.
Step 503: the equipment used by the first user sends a first target image aiming at the first target image obtaining instruction to the server side.
Step 504: the server authenticates a first target image sent by equipment of a first user; step 504-1: if the first target image passes the authentication, generating an image exchange request message for requesting the equipment of the second user to send the second target image; step 504-2: and the server side sends an image exchange request message to the equipment of the second user.
Step 505: and the equipment of the second user sends a second target image aiming at the image exchange request message to the server side.
Step 506: the server authenticates a second target image sent by equipment of a second user; step 506-1: the second target image passes authentication, and the second target image is sent to the user equipment of the first user, step 506-2: and the second target image passes the authentication, and the first target image is sent to the user equipment of the second user.
Step 507-1: the user equipment of the first user presents the second target image, step 507-2: the user device of the second user presents the first target image.
Second embodiment
In the first embodiment described above, an image exchange method is provided, and correspondingly, a second embodiment of the present application provides an image exchange apparatus. Since the apparatus embodiment is substantially similar to the method first embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiments for relevant points. The device embodiments described below are merely illustrative.
Fig. 6 is a schematic diagram of an image exchange apparatus according to a second embodiment of the present application.
The image exchange apparatus includes:
a target image obtaining unit 601, configured to obtain a first target image sent by a user equipment of a first user, and obtain a second target image sent by a user equipment of a second user;
a target image sending unit 602, configured to send the first target image to the user equipment of the second user and send the second target image to the user equipment of the first user if both the first target image and the second target image are authenticated;
optionally, the authenticating the first target image and the second target image includes: the user characteristic information corresponding to the first target image is matched with the user characteristic information of the first user, and the user characteristic information corresponding to the second target image is matched with the user characteristic information of the second user.
Optionally, the target image obtaining unit 601 is specifically configured to obtain a first target image sent by a user equipment of a first user; authenticating the first target image; and if the first target image passes the authentication, obtaining a second target image sent by the user equipment of a second user.
Optionally, the obtaining a second target image sent by the user equipment of the second user if the first target image is authenticated includes:
if the first target image passes the authentication, generating an image exchange request message for requesting the user equipment of the second user to send the second target image;
providing the image exchange request message to the user equipment of the second user;
and obtaining a second target image sent by the user equipment of the second user aiming at the image exchange request message.
Optionally, the generating an image exchange request message requesting the user equipment of the second user to send the second target image includes:
generating a first blurred image according to the first target image, and generating an image exchange request message for the first blurred image, wherein the first blurred image is an image obtained by reducing the definition of the first target image;
the user device providing the image exchange request message to the second user comprises:
providing an image exchange request message for the first blurred image and the first blurred image to a user equipment of the second user.
Optionally, matching the user characteristic information corresponding to the first target image with the user characteristic information of the first user includes: and matching the user biological characteristic information obtained by identification from the first target image with the user biological characteristic information reserved by the first user.
Optionally, the image exchange apparatus further includes:
the characteristic information comparison unit is used for comparing the user biological characteristic information identified from the first target image with the user biological characteristic information reserved by the first user;
and the matching result determining unit is used for determining that the user biological characteristic information identified from the first target image is matched with the user biological characteristic information reserved by the first user if the similarity between the user biological characteristic information identified from the first target image and the user biological characteristic information reserved by the first user reaches or exceeds a first similarity threshold.
Optionally, the comparing the user biometric information identified from the first target image with the user biometric information reserved by the first user includes: and comparing the user facial feature information identified from the first target image with the user facial feature information reserved by the first user.
Optionally, the target image obtaining unit 601 is specifically configured to send an image acquisition instruction to the user equipment of the first user, where the image acquisition instruction is used to invoke a camera device corresponding to the user equipment of the first user to acquire an image including a current user biological feature; acquiring an image which is sent by the user equipment of the first user aiming at the image acquisition instruction and contains the biological characteristics of the current user; and taking the image containing the current user biological characteristics as the first target image.
Optionally, the target image obtaining unit 601 is specifically configured to obtain a candidate target image sent by the user equipment of the first user, where the candidate target image is an image including user features and sends an image acquisition instruction to the user equipment of the first user, and the image acquisition instruction is used to invoke a camera device corresponding to the user equipment of the first user to acquire an image including a biological feature of the current user; acquiring an image which is sent by the user equipment of the first user aiming at the image acquisition instruction and contains the biological characteristics of the current user; judging whether the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic; and if the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological characteristic information corresponding to the image containing the current user biological characteristic, taking the candidate target image sent by the user equipment of the first user as the first target image.
Optionally, if the user biometric information corresponding to the candidate target image sent by the user equipment of the first user is not matched with the user biometric information corresponding to the image containing the current user biometric, the candidate target image sent by the user equipment of the first user is obtained again until the user biometric information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biometric information corresponding to the image containing the current user biometric.
Optionally, if the user biometric information corresponding to the candidate target image sent by the user equipment of the first user does not match the user biometric information corresponding to the image containing the current user biometric, the image containing the current user biometric is taken as the first target image.
Optionally, the determining whether the user biological information corresponding to the candidate target image sent by the user equipment of the first user matches with the user biological feature information corresponding to the image containing the current user biological feature includes:
judging whether the similarity between the user biological characteristic information corresponding to the candidate target image sent by the user equipment of the first user and the user biological characteristic information corresponding to the image containing the current user biological characteristic reaches or is greater than a second similarity threshold value;
and if so, determining that the biological feature information corresponding to the candidate target image sent by the user equipment of the first user is matched with the user biological feature information corresponding to the image containing the biological feature of the current user.
Optionally, if the similarity between the user biometric information included in the original image sent by the user equipment of the first user and the user biometric information included in the first user image does not reach the second similarity threshold, it is determined that the biometric information corresponding to the candidate target image sent by the user equipment of the first user does not match the user biometric information corresponding to the image including the biometric characteristic of the current user.
Optionally, the target image sending unit 602 is specifically configured to match the user biometric information identified from the second target image with the user biometric information reserved by the second user.
Optionally, the method further includes: and if the first target image is not authenticated, another first target image sent by the user equipment of the first user is obtained again until the first target image is authenticated.
Optionally, if the first image is authenticated and the second image is not authenticated, another second target image sent by the user equipment of another second user is obtained again until the second target image is authenticated.
Optionally, if the first image is authenticated and the second image is not authenticated, providing feedback information of a second user verification failure to at least one of the user device of the first user and the user device of the second user.
Optionally, the obtaining a first target image sent by a user equipment of a first user includes:
receiving an image exchange initiation request message sent by user equipment of the first user, wherein the image exchange initiation request message is a request message for initiating image exchange to the second user;
and obtaining a first target image sent by the user equipment of the first user aiming at the image exchange initiation request message.
Optionally, the generating an image exchange request message requesting the user equipment of the second user to send the second target image includes:
acquiring identification information of a second user carried in an image exchange initiation request message sent by user equipment of the first user, wherein the image exchange initiation request message is a request message for initiating image exchange to the second user;
and generating an image exchange request message for requesting the user equipment of the second user to send the second target image according to the identification information of the second user.
Optionally, the obtaining a first target image sent by a user equipment of a first user and obtaining a second target image sent by a user equipment of a second user further includes:
obtaining a first target image sent by the user equipment of the first user and a second target image sent by the user equipment of the second user according to the first photo exchange initiation request of the user equipment of the first user and the second photo exchange initiation request of the user equipment of the second user;
if the first target image and the second target image are authenticated, sending the first target image to the user equipment of the second user, and sending the second target image to the user equipment of the first user, including:
and if the first target image and the second target image are authenticated and the initiating time interval of the first photo exchange initiating request and the second photo exchange initiating request is within a specified time period, sending the first target image to the user equipment of the second user and sending the second target image to the user equipment of the first user.
Third embodiment
A third embodiment of the present application provides an electronic device corresponding to the image exchange method provided in the first embodiment of the present application.
As shown in fig. 7, fig. 7 is a schematic view of an electronic device according to an embodiment of the present application. The electronic device includes:
a processor 701; and
a memory 702 is used for storing a computer program, and the image exchange method described in the first embodiment of the present application is executed after the apparatus is powered on and the computer program is run by the processor.
It should be noted that, for the detailed description of the image exchange method executed by the electronic device according to the third embodiment of the present application, reference may be made to the related description of the first embodiment of the present application, and details are not repeated here.
Fourth embodiment
In correspondence with the image exchange method provided in the first embodiment of the present application, a fourth embodiment of the present application provides a storage medium storing a computer program that is executed by a processor to execute the image exchange method described in the first embodiment of the present application.
It should be noted that, for the detailed description of the storage medium provided in the fourth embodiment of the present application, reference may be made to the related description of the first embodiment of the present application, and details are not repeated here.
Fifth embodiment
In the first embodiment described above, an image exchange method is provided, and correspondingly, a fifth embodiment of the present application provides another image exchange method. Since the image exchange method in the fifth embodiment is basically similar to the method in the first embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment. The device embodiments described below are merely illustrative.
As shown in fig. 8, fig. 8 is a flowchart of an image exchange method provided in a fifth embodiment of the present application.
In step S801, the user equipment of the second user obtains the first blurred image provided by the server.
The first blurred image is an image obtained by reducing the sharpness of a first target image corresponding to the first user. The first blurred image is an image in which the sharpness of the first target image is reduced below a specified sharpness threshold.
In step S802, the user equipment of the second user provides the server with a second target image corresponding to the second user.
The second target image is an image which needs to be sent to the user equipment of the first user through the server.
In step S803, the user equipment of the second user obtains the first target image provided by the server.
As a preferred implementation, the sixth embodiment of the present application further includes: the user device of the second user presents the first blurred image.
As a preferred implementation, the sixth embodiment of the present application further includes: the user device of the second user presents the first target image.
Sixth embodiment
In the fifth embodiment described above, an image exchange method is provided, and correspondingly, a sixth embodiment of the present application provides an image exchange apparatus. Since the apparatus embodiment is substantially similar to the method fifth embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiments for relevant points. The device embodiments described below are merely illustrative.
Fig. 9 is a schematic diagram of an image exchange apparatus according to a sixth embodiment of the present application.
The image exchange apparatus includes:
a target image obtaining unit 901, configured to obtain a first blurred image provided by a server, where the first blurred image is an image obtained by reducing the sharpness of a first target image corresponding to a first user;
a second target image providing unit 902, configured to provide a second target image corresponding to a second user to the server, where the second target image is an image that needs to be sent to the user equipment of the first user through the server;
a first target image obtaining unit 903, configured to obtain a first target image provided by the server.
The image exchange apparatus further includes: and the blurred image display unit is used for displaying the first blurred image.
The image exchange apparatus further includes: and the first target image display unit is used for displaying the first target image.
Optionally, the first blurred image is an image obtained by reducing the sharpness of the first target image below a specified sharpness threshold.
Seventh embodiment
A seventh embodiment of the present application provides an electronic apparatus, which corresponds to the image exchange method provided in the fifth embodiment of the present application.
As shown in fig. 7, fig. 7 is a schematic view of an electronic device according to an embodiment of the present application. The electronic device includes:
a processor 701; and
the memory 702 stores a computer program, and the image exchange method according to the fifth embodiment of the present application is executed after the apparatus is powered on and the computer program is executed by the processor.
It should be noted that, for the detailed description of the image exchange method executed by the electronic device according to the third embodiment of the present application, reference may be made to the related description of the fifth embodiment of the present application, and details are not repeated here.
Eighth embodiment
In correspondence with the image exchange method provided in the fifth embodiment of the present application, an eighth embodiment of the present application provides a storage medium storing a computer program that is executed by a processor to execute the image exchange method described in the fifth embodiment of the present application.
It should be noted that, for the detailed description of the storage medium provided in the eighth embodiment of the present application, reference may be made to the related description of the fifth embodiment of the present application, and details are not described here again.
Ninth embodiment
In the first embodiment described above, an image exchange method is provided, and correspondingly, a ninth embodiment of the present application provides another image exchange system. Since the image exchange system in the ninth embodiment is basically similar to the first embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment. The device embodiments described below are merely illustrative.
As shown in fig. 10, fig. 10 is a schematic diagram of an image exchange system provided in a ninth embodiment of the present application.
The image exchange system includes: a server 1001, a user equipment 1002 of a first user, a user equipment 1003 of a second user;
the user equipment 1003 of the second user is configured to obtain a first blurred image provided by the server 1001, where the first blurred image is an image obtained by reducing the sharpness of a first target image corresponding to the first user; providing a second target image corresponding to a second user to the server 1001, where the second target image is an image that needs to be sent to the user equipment of the first user through the server 1001; obtaining a first target image provided by the server 1001; displaying the first target image;
the server 1001 is configured to provide the first blurred image to the user equipment 1003 of the second user.
Tenth embodiment
In the fifth embodiment described above, an image exchange method is provided, and correspondingly, a tenth embodiment of the present application provides another image exchange system. Since the image exchange system in the tenth embodiment is basically similar to the first embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment. The device embodiments described below are merely illustrative.
As shown in fig. 11, fig. 11 is a schematic diagram of an image exchange system provided in a tenth embodiment of the present application.
The image exchange system includes: user equipment 1101 of a second user, a server 1102;
the user equipment 1101 of the second user is configured to obtain a first blurred image provided by the server 1102, where the first blurred image is an image obtained by reducing the sharpness of a first target image corresponding to the first user; providing a second target image corresponding to a second user to the server 1102, wherein the second target image is an image which needs to be sent to user equipment of the first user through the server 1102; obtaining a first target image provided by the server 1102; displaying the first target image;
the server 1102 is configured to provide the first blurred image to the user equipment 1101 of the second user.
Although the present invention has been described with reference to the preferred embodiments, it should be understood that the scope of the present invention is not limited to the embodiments described above, and that various changes and modifications may be made by one skilled in the art without departing from the spirit and scope of the present invention.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
1. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage media, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transmyedia), such as modulated data signals and carrier waves.
2. As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

Claims (10)

1. An image exchange method, comprising:
the method comprises the steps of obtaining a first target image sent by user equipment of a first user, and obtaining a second target image sent by user equipment of a second user;
and if the first target image and the second target image are authenticated, sending the first target image to the user equipment of the second user, and sending the second target image to the user equipment of the first user.
2. The image exchange method according to claim 1, wherein the first target image and the second target image are both authenticated, including: the user characteristic information corresponding to the first target image is matched with the user characteristic information of the first user, and the user characteristic information corresponding to the second target image is matched with the user characteristic information of the second user.
3. The image exchange method according to claim 1, wherein the obtaining a first target image sent by a user equipment of a first user and obtaining a second target image sent by a user equipment of a second user comprises:
obtaining a first target image sent by user equipment of a first user;
authenticating the first target image;
and if the first target image passes the authentication, obtaining a second target image sent by the user equipment of a second user.
4. An image exchange apparatus, comprising:
the target image obtaining unit is used for obtaining a first target image sent by user equipment of a first user and obtaining a second target image sent by user equipment of a second user;
and the target image sending unit is used for sending the first target image to the user equipment of the second user and sending the second target image to the user equipment of the first user if the first target image and the second target image are authenticated.
5. An image exchange system, comprising: the method comprises the steps that a server, user equipment of a first user and user equipment of a second user are connected;
the server is used for acquiring a first target image sent by the user equipment of the first user and acquiring a second target image sent by the user equipment of the second user; if the first target image and the second target image are authenticated, the first target image is sent to the user equipment of the second user, and the second target image is sent to the user equipment of the first user; the user equipment of the first user is used for sending a first target image to the server; receiving a second target image sent by the server; displaying the second target image;
the user equipment of the second user is used for sending a second target image to the server; receiving a first target image sent by the server; and displaying the first target image.
6. An image exchange method, comprising:
the method comprises the steps that user equipment of a second user obtains a first blurred image provided by a server, wherein the first blurred image is obtained by reducing the definition of a first target image corresponding to a first user;
the user equipment of the second user provides a second target image corresponding to the second user to the server, wherein the second target image is an image which needs to be sent to the user equipment of the first user through the server;
and the user equipment of the second user obtains the first target image provided by the server.
7. An image exchange apparatus, applied to a user device of a second user, comprising:
the server comprises a blurred image obtaining unit, a blurred image obtaining unit and a blurred image processing unit, wherein the blurred image obtaining unit is used for obtaining a first blurred image provided by the server, and the first blurred image is an image obtained by reducing the definition of a first target image corresponding to a first user;
a second target image providing unit, configured to provide a second target image corresponding to a second user to the server, where the second target image is an image that needs to be sent to user equipment of the first user through the server;
and the first target image obtaining unit is used for obtaining a first target image provided by the server.
8. An image exchange system, comprising: user equipment and a server of a second user;
the user equipment of the second user is used for obtaining a first blurred image provided by the server, wherein the first blurred image is obtained by reducing the definition of a first target image corresponding to the first user; providing a second target image corresponding to a second user to the server, wherein the second target image is an image which needs to be sent to user equipment of the first user through the server; obtaining a first target image provided by the server; displaying the first target image;
the server is used for providing the first blurred image for the user equipment of the second user.
9. An electronic device, comprising:
a processor; and
a memory for storing a computer program which, when the apparatus is powered on and the computer program is run by the processor, performs the image exchange method of any one of claims 1 to 3, and claim 6.
10. A storage medium storing a computer program that is executed by a processor to perform the image exchange method according to any one of claims 1 to 3 and 6.
CN201911082167.6A 2019-11-07 2019-11-07 Image exchange method, device and system and electronic equipment Active CN111064653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911082167.6A CN111064653B (en) 2019-11-07 2019-11-07 Image exchange method, device and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911082167.6A CN111064653B (en) 2019-11-07 2019-11-07 Image exchange method, device and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN111064653A true CN111064653A (en) 2020-04-24
CN111064653B CN111064653B (en) 2020-12-25

Family

ID=70297953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911082167.6A Active CN111064653B (en) 2019-11-07 2019-11-07 Image exchange method, device and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN111064653B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024109706A1 (en) * 2022-11-22 2024-05-30 北京字跳网络技术有限公司 Media content display method and apparatus, and device, readable storage medium and product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158817A (en) * 2010-12-14 2011-08-17 上海合合信息科技发展有限公司 Method and system for acquiring contact information of others by network
CN103154958A (en) * 2010-09-30 2013-06-12 谷歌公司 Image-based key exchange
CN103401852A (en) * 2013-07-23 2013-11-20 徐华 Two-dimensional code smart business card system based on authentication and design method thereof
CN103428371A (en) * 2013-09-12 2013-12-04 福州玛雅软件科技有限公司 E-card exchanging method based on mobile terminal
US20150099550A1 (en) * 2008-01-10 2015-04-09 Ximoxi, Inc. Location-based discovery of network members by personal attributes for alternate channel communication
CN108124024A (en) * 2016-11-28 2018-06-05 宁波市镇海甬讯信息科技有限公司 Transfer the method and system of contact details

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150099550A1 (en) * 2008-01-10 2015-04-09 Ximoxi, Inc. Location-based discovery of network members by personal attributes for alternate channel communication
CN103154958A (en) * 2010-09-30 2013-06-12 谷歌公司 Image-based key exchange
CN102158817A (en) * 2010-12-14 2011-08-17 上海合合信息科技发展有限公司 Method and system for acquiring contact information of others by network
CN103401852A (en) * 2013-07-23 2013-11-20 徐华 Two-dimensional code smart business card system based on authentication and design method thereof
CN103428371A (en) * 2013-09-12 2013-12-04 福州玛雅软件科技有限公司 E-card exchanging method based on mobile terminal
CN108124024A (en) * 2016-11-28 2018-06-05 宁波市镇海甬讯信息科技有限公司 Transfer the method and system of contact details

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024109706A1 (en) * 2022-11-22 2024-05-30 北京字跳网络技术有限公司 Media content display method and apparatus, and device, readable storage medium and product

Also Published As

Publication number Publication date
CN111064653B (en) 2020-12-25

Similar Documents

Publication Publication Date Title
CN109191112B (en) Identity verification method and device
US20210166241A1 (en) Methods, apparatuses, storage mediums and terminal devices for authentication
EP3256976B1 (en) Toggling biometric authentication
CN110380864B (en) Method, device and system for acquiring and verifying face data
CN101356773B (en) Ad-hoc creation of group based on contextual information
EP3200417B1 (en) Method and device for information interaction and association between human biological feature data and account
US9059858B1 (en) User characteristic based digital signature of documents
TWI616821B (en) Bar code generation method, bar code based authentication method and related terminal
EP3744067B1 (en) Method and apparatus for managing user authentication in a blockchain network
CN111788572A (en) Method and system for face recognition
CN108965250B (en) Digital certificate installation method and system
US10284565B2 (en) Security verification method, apparatus, server and terminal device
CN109831441B (en) Identity authentication method, system and related components
CN109660594A (en) Orientation method for pushing, methods of exhibiting, device and the equipment of service processing result
CN110247898B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
US20150188916A1 (en) Vpn connection authentication system, user terminal, authentication server, biometric authentication result evidence information verification server, vpn connection server, and computer program product
KR102559827B1 (en) System for authenticating image based on blockchain and hash encryption technique and method thereof
CN111737675A (en) Block chain-based electronic signature method and device
CN115438325A (en) Electronic contract signing method, device, equipment and storage medium
CN114268461B (en) User identity authentication method, device, server, terminal and storage medium
CN111064653B (en) Image exchange method, device and system and electronic equipment
CN116391347A (en) Code-based two-factor authentication
EP2761823B1 (en) Methods and apparatuses for electronic message authentication
CN112217873B (en) Device sharing method, related device and storage medium
EP3334086A1 (en) Online authentication method based on smart card, smart card and authentication server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant