CN111611630A - Mobile terminal peeping prevention method and mobile terminal - Google Patents

Mobile terminal peeping prevention method and mobile terminal Download PDF

Info

Publication number
CN111611630A
CN111611630A CN202010292080.8A CN202010292080A CN111611630A CN 111611630 A CN111611630 A CN 111611630A CN 202010292080 A CN202010292080 A CN 202010292080A CN 111611630 A CN111611630 A CN 111611630A
Authority
CN
China
Prior art keywords
mobile terminal
face
owner
environment image
peeping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010292080.8A
Other languages
Chinese (zh)
Inventor
张志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhuoyi Technology Co Ltd
Original Assignee
Shanghai Zhuoyi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhuoyi Technology Co Ltd filed Critical Shanghai Zhuoyi Technology Co Ltd
Priority to CN202010292080.8A priority Critical patent/CN111611630A/en
Publication of CN111611630A publication Critical patent/CN111611630A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The application aims at providing a mobile terminal peeping prevention method and a mobile terminal, the application obtains a non-owner face outside an owner face corresponding to the mobile terminal through obtaining an environment image, then analyzes a pupil position on the non-owner face and a human eye stereoscopic vision visual angle between the mobile terminals and judges whether the mobile terminal is peeped, the risk that the mobile terminal is peeped is monitored in all directions, and when the mobile terminal is peeped, a display screen of the mobile terminal is subjected to fuzzy processing, so that the behavior that a peeper continues to peep contents displayed by the display screen is timely and actively stopped at the first time through the mode of processing the display screen in a fuzzy mode, the peeper is prevented from continuing to peep, the owner of the mobile terminal is reminded to peep so as to take action, and the aim of peeping prevention is achieved.

Description

Mobile terminal peeping prevention method and mobile terminal
Technical Field
The application relates to the field of computers, in particular to a mobile terminal peeping prevention method and a mobile terminal.
Background
In the prior art, when people have similar experiences in public places and swipe mobile phone microblogs for WeChat, the people carelessly lift the head, and sometimes a peeper who expands the neck to form a large frame and holds the screen of the mobile phone is arranged beside the user. For a few head-lowering families, the content on the screen of the mobile phone is easy to 'go away' in narrow spaces such as subways and elevators. Therefore, a user can select to stick a peep-proof film to the mobile phone, and the mobile phone can be prevented from being peeped by others. The basic principle of the peep-proof membrane is shown in figure 1: the 'peep-proof film' is a toughened film in appearance, but is different from a common toughened film in that the peep-proof film is not transparent but black, the price is far higher than that of a common mobile phone film, the selling price is different from 50 yuan to 300 yuan, and the basic principle of the peep-proof film is shown in figure 1.
After the peep-proof film is pasted on a mobile phone, the brightness of the screen is much darker at any time. Compared with a mobile phone pasted with a common toughened film, the brightness difference is very obvious. For this reason, the user can only turn up the screen brightness, but this increases the power consumption speed, and in less than two hours, the power is reduced from 60% to 30%.
After the peep-proof film is attached, as shown in fig. 2, the visible area facing the screen is only 60 degrees, and only a painted black screen can be seen by anyone from two sides. If the mobile phone with the peep-proof film is kept perpendicular to the sight, the screen content can be seen although the screen is darkened. If the mobile phone is turned left and right at an angle of about 40 degrees with the sight line, the screen becomes a piece of black paint. However, when the mobile phone is rotated up and down, the content displayed on the screen of the mobile phone can be seen from any angle. Because the peep-proof film has two peep-proof films, namely two peep-proof films with two sides and four peep-proof films with four sides, the all-round peep-proof can be realized only by the peep-proof films with four sides. In summary, the current "peep-proof film" technology has side effects and the product has uneven color.
Therefore, how to reduce power consumption without affecting the normal display brightness of the mobile phone is an all-round peep-proof direction that needs to be studied by technicians in the field.
Disclosure of Invention
An object of the present application is to provide a method for preventing peeping of a mobile terminal and a mobile terminal, so as to solve the problem of how to prevent peeping in all directions without generating excessive energy consumption in the prior art.
According to one aspect of the application, a method for preventing a mobile terminal from being peeped is provided, which is applied to the mobile terminal, and is characterized in that the method comprises the following steps:
acquiring an environment image of a mobile terminal, wherein the environment image comprises at least one face;
performing face recognition on the environment image, and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image;
if the non-owner face exists in the environment image, obtaining a stereoscopic vision visual angle of human eyes between a pupil position on the non-owner face and the mobile terminal based on pupil imaging angle analysis;
determining a visual viewing result of the non-owner face based on the stereoscopic vision visual angle of the human eyes;
and if the visual checking result is that the mobile terminal is peeped, carrying out fuzzy processing on a display screen of the mobile terminal.
Further, in the above method for preventing peeping of a mobile terminal, the mobile terminal includes a front wide-angle camera device, wherein the acquiring an environment image of the mobile terminal, the environment image including at least one face, includes:
and acquiring an environment image of the mobile terminal through the front wide-angle camera device.
Further, in the above anti-peeping method for a mobile terminal, the determining a visual viewing result of the non-owner face based on the stereoscopic vision viewing angle of the human eye includes:
presetting a peeping visual angle threshold interval of the mobile terminal;
judging whether the stereoscopic vision visual angle of the human eyes is within the threshold interval of the peeping visual angle of the mobile terminal,
if so, determining that the visual checking result of the non-owner face is peeping the mobile terminal;
and if not, determining that the visual checking result of the non-owner face is that the mobile terminal is not peeped.
Further, in the above method for preventing peeping at a mobile terminal, the performing face recognition on the environment image and determining whether a non-owner face other than the owner face corresponding to the mobile terminal exists in the environment image includes:
performing face recognition on the environment image to obtain the at least one face and the feature information of each face;
matching the feature information of the face with the feature information of the owner face corresponding to the mobile terminal to obtain a face matching result corresponding to the environment image;
and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image according to the face matching result.
Further, the anti-peeping method for the mobile terminal further comprises the following steps:
and if the visual checking result is that the mobile terminal is peeped, displaying peeping reminding information on a display screen of the mobile terminal.
Further, the anti-peeping method for the mobile terminal further comprises the following steps:
responding to the anti-peeping mobile operation of the owner corresponding to the owner face on the mobile terminal, re-acquiring the latest environment image of the mobile terminal, and canceling the fuzzy processing on the display screen of the mobile terminal when the latest environment image does not have the non-owner face peeping the mobile terminal.
According to another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the method of any one of the above.
According to another aspect of the present application, there is also provided a mobile terminal including:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method as in any one of the above.
Compared with the prior art, the method and the device have the advantages that the environment image of the mobile terminal is obtained, and the environment image comprises at least one face; performing face recognition on the environment image, and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image; if the non-owner face exists in the environment image, obtaining a stereoscopic vision visual angle of human eyes between a pupil position on the non-owner face and the mobile terminal based on pupil imaging angle analysis; determining a visual viewing result of the non-owner face based on the stereoscopic vision visual angle of the human eyes; if the vision checking result is that the mobile terminal is peeped, the display screen of the mobile terminal is subjected to fuzzy processing, the risk that the mobile terminal is peeped is monitored in all directions, and when the mobile terminal is peeped, the display screen of the mobile terminal is subjected to fuzzy processing, so that the behavior that a peeper continues to peep the contents displayed by the display screen is stopped actively in time in the first time in a mode of processing the display screen in a fuzzy mode, the peeper is prevented from continuing to peep, the owner of the mobile terminal is reminded to peep so that the owner can take action, and the purpose of preventing peeping is achieved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 shows a structure of a peep-proof film in the prior art according to the present application;
fig. 2 shows a schematic view of the effect of a prior art anti-peeping membrane according to the present application;
FIG. 3 illustrates a flow diagram of a method of anti-peeping a mobile terminal according to an aspect of the present application;
fig. 4 is a schematic diagram illustrating pupil imaging angle analysis in a method for preventing peeping of a mobile terminal according to an aspect of the present application;
fig. 5 is a schematic diagram illustrating a peep-proof effect of a mobile terminal peep-proof method according to an aspect of the present application;
FIG. 6 is a schematic diagram illustrating face recognition in a method for preventing peeping in a mobile terminal according to an aspect of the present application;
fig. 7 is a schematic flow chart illustrating a practical application scenario of a method for preventing a mobile terminal from peeping according to an aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change RAM (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, magnetic cassette tape, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transmyedia), such as modulated data signals and carrier waves.
Fig. 3 is a schematic flowchart illustrating a method for preventing a mobile terminal from peeping, which is applied to a process of preventing a display screen of the mobile terminal from peeping, and includes step S11, step S12, step S13, step S14, and step S15, where the method specifically includes:
step S11, obtaining an environment image of a mobile terminal, where the environment image includes at least one face, where the at least one face has a face of an owner corresponding to the mobile terminal, and certainly, the at least one face may further include a face of a person (i.e., a non-owner) other than the owner corresponding to the mobile terminal, and the face of the non-owner other than the owner corresponding to the mobile terminal includes but is not limited to a face of a user around the environment of the mobile terminal; here, the mobile terminal may be a mobile device including, but not limited to, a mobile phone, a computer, and an ipad.
In the step S11, an environment image of the mobile terminal may be acquired in real time or periodically to realize real-time/periodic observation of the environment around the mobile terminal. In a preferred embodiment of the present application, the mobile terminal is preferably a mobile phone, for example, in step S11, an environment image P of an environment around the mobile phone is obtained, where the environment image P includes at least one face, and the at least one face includes a face of the owner.
Step S12, carrying out face recognition on the environment image, and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image; here, different face recognition algorithms may be adopted in the process of face recognition on the environment image P, for example, a recognition algorithm based on a face feature point, a recognition algorithm based on the whole face image, a recognition algorithm based on a template, an algorithm for recognition by using a neural network, an algorithm for recognition by using a support vector machine, and the like. When the mobile terminal is used by the owner, the face of the owner exists in the environment image P acquired in the step S11, so that the mobile terminal is normally used by the owner.
For example, in the process of performing face recognition on the environment image P in step S12, the face recognition algorithm is used to perform face recognition on the environment image P to determine whether a non-owner face other than the owner face corresponding to the mobile terminal exists in the environment image P, so as to implement face recognition on the environment image P of the mobile terminal, and determine whether a non-owner face other than the owner face exists in the face of the environment image P, thereby effectively determining whether the mobile terminal has a peeped situation, and facilitating the owner corresponding to the mobile terminal to take corresponding anti-peeping measures based on whether the peeped situation exists.
Step S13, if the non-owner face exists in the environment image, a stereoscopic vision visual angle of human eyes between a pupil position on the non-owner face and the mobile terminal is obtained based on pupil imaging angle analysis, so that a visual checking result of the non-owner face can be conveniently determined subsequently, and whether the mobile terminal is peeped or not is judged.
For example, a non-owner face exists in the environment image P, and a stereoscopic vision viewing angle a of human eyes between a pupil position on the non-owner face and the mobile terminal is obtained based on pupil imaging angle analysis, so that a visual viewing result of the non-owner face is determined subsequently, and whether the mobile terminal is peeped or not is judged. As shown in fig. 4, the stereoscopic viewing angle a of the human eye is a stereoscopic range between the leftmost line of sight of the right eye comfort viewing zone and the rightmost line of sight of the left eye comfort viewing zone.
And step S14, determining the visual viewing result of the non-owner face based on the stereoscopic vision visual angle of the human eyes. Here, the visual viewing result may be used to indicate that the non-owner corresponding to the non-owner face in the environment image P peeps the mobile terminal, and may also be used to indicate that there is no peeping of the mobile terminal in the environment image P, so that it can be determined whether to perform peeping prevention processing on the display screen of the mobile terminal based on the visual viewing result in the following. For example, a pupil recognition technology is started, a visual checking result of the non-owner face is determined based on the stereoscopic vision visual angle a of the eyes, and the relevance between the position of the eye in the non-owner face and a mobile phone screen is detected, so that whether peeping behavior exists or not can be judged.
And step S15, if the visual viewing result is that the mobile terminal is peeped, performing fuzzy processing on a display screen of the mobile terminal. Here, but not limited to, adopting gaussian fuzzy technology to carry out fuzzy processing to mobile terminal's display screen, make mobile terminal exist when being peeped by non owner, not only can prevent that peeper (non owner promptly) from continuing to peep, can also play the effect of reminding the owner, through the fuzzy processing to mobile terminal, when having avoided the power consumption problem that the adjustment screen luminance of tradition to the display screen leads to, only need mobile terminal work under the bright screen environment of owner's normal use, according to presetting frequency acquisition environment image, can not cause the power consumption loss that arouses by adjustment luminance promptly.
For example, as shown in fig. 5, after the condition that the mobile terminal is peeped is obtained from the visual viewing result, the image displayed on the display screen of the mobile phone is blurred by using the gaussian blurring technique, so that the peeper is prevented from continuing to peep and simultaneously plays a role in reminding the owner, and power loss caused by brightness adjustment of the mobile phone is avoided.
The steps S11 to S15 are performed to obtain a non-owner face other than the owner face corresponding to the mobile terminal by obtaining the environment image, and then analyze the eye stereoscopic vision angle between the pupil position on the non-owner face and the mobile terminal and determine whether the mobile terminal is peeped, so that not only is the risk of the mobile terminal being peeped monitored in all directions realized, but also the display screen of the mobile terminal is blurred when the mobile terminal is peeped, so that the behavior of continuing peeping the content displayed on the display screen by the peeper is actively stopped at the first time in a manner of blurring the display screen, the peeper is prevented from continuing to peep, the owner of the mobile terminal is reminded to peep so that the owner can take action, and the purpose of preventing peeping is achieved.
In another embodiment of the present application, a method for preventing peeping in a mobile terminal includes a front wide-angle camera device, where, in step S11, an environment image of the mobile terminal is obtained, where the environment image includes at least one face, and the method specifically includes: the environment image of the mobile terminal is acquired through the front wide-angle camera device, and the front wide-angle camera device comprises but is not limited to a camera, a camera and the like.
In an actual preferred application scene, the environmental image P in the surrounding environment in front of the display screen of the mobile phone is acquired through the front wide-angle camera device of the mobile phone, so that the acquisition of the environmental image P corresponding to the face of the owner existing in front of the display screen of the mobile phone and the face of the non-owner possibly existing in front of the display screen of the mobile phone is realized, the face recognition can be subsequently carried out on the acquired environmental image P to determine whether the mobile phone is peeped, the mobile phone can achieve the effect of peeping prevention on the mobile phone through the front wide-angle camera device and a software library realized by combining an peeping prevention method, the software reusability is high, the hardware cost of a user is reduced, and the resource waste and the environmental pollution caused by the manufacturing of a peeping prevention film can be avoided. Different with traditional peep-proof means, screen brightness need not be adjusted in this application, and mobile terminal only need work under the bright screen environment of user's normal use, realizes with the help of the leading wide angle camera of cell-phone from taking, uses the camera to gather the environment image according to certain frequency, can not cause the loss of power consumption that arouses by adjustment luminance.
Following the above embodiment of the present application, the step S14 determines the visual viewing result of the non-owner face based on the stereoscopic vision viewing angle of the human eye, specifically including:
presetting a peeping visual angle threshold interval of the mobile terminal; the peeping visual view angle threshold interval is used for indicating a non-owner except the owner of the mobile terminal, and the stereoscopic vision range of the display screen of the mobile terminal can be viewed through the upper, lower, left, right and peripheral visual views when the owner uses the mobile terminal.
Judging whether the stereoscopic vision visual angle of the human eyes is within a threshold interval of a peeping visual angle of the mobile terminal, if so, determining that the visual checking result of the face of the non-owner is peeping the mobile terminal, namely indicating that the non-owner except the owner of the mobile terminal is in a state of peeping the mobile terminal;
if not, determining that the visual checking result of the face of the non-owner is that the mobile terminal is not peeped, namely indicating that the non-owner except the owner of the mobile terminal does not peep the mobile terminal.
For example, in the step S14, a threshold interval S of the peeping visual angle of the mobile terminal is preset first; secondly, judging whether the human eye stereoscopic vision viewing angle a of the face of a non-owner except the owner corresponding to the mobile terminal in the environment image P obtained by calculation is within a peeping visual viewing angle threshold interval S of the mobile terminal, if so, indicating that the non-owner except the owner of the mobile terminal is in a state of peeping the mobile terminal, and determining that the visual checking result of the face of the non-owner is peeping the mobile terminal; if not, indicating that non-owners except the owner of the mobile terminal do not peep the mobile terminal, and determining that the visual checking result of the face of the non-owner is that the mobile terminal is not peeped, so that whether the non-owner except the owner corresponding to the mobile terminal peeps the mobile terminal or not is monitored in an omnibearing and three-dimensional manner, the owner can conveniently find out the existing peeping phenomenon as early as possible, corresponding anti-peeping countermeasures are taken, and therefore a peeper (such as the non-owner) is prevented from continuing to peep.
Next to the foregoing embodiment of the present application, the step S12 performs face recognition on the environment image, and determines whether a non-owner face other than the owner face corresponding to the mobile terminal exists in the environment image, specifically including:
performing face recognition on the environment image to obtain the at least one face and the feature information of each face;
matching the feature information of the face with the feature information of the owner face corresponding to the mobile terminal to obtain a face matching result corresponding to the environment image;
and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image according to the face matching result, so that the screening of the non-owner face is realized.
For example, as shown in fig. 6, a face recognition algorithm is used to perform face recognition on the environment image P, so as to obtain a face M1 and feature information M1 of the face M1; matching the feature information M1 of the face M1 with the feature information T of the owner face corresponding to the mobile phone to obtain a face matching result corresponding to the environment image P; if the feature information M1 of the face M1 matches with the feature information T of the owner face corresponding to the mobile phone, that is, the face M1 is indicated to be the owner face, therefore, it can be determined and determined according to the face matching result that no non-owner face other than the owner face corresponding to the mobile phone exists in the environment image P, and the non-owner face in the environment image P is screened, so that it is determined that no non-owner face exists in the environment image P.
For another example, a face recognition algorithm is adopted to perform face recognition on the environment image P to obtain a face N1 and feature information N1 of the face N1, and a face M1 and feature information M1 of the face M1; matching the feature information N1 of the face N1 with the feature information T of the owner face corresponding to the mobile phone to obtain a face matching result that the feature information N1 of the face N1 is not matched with the feature information T of the owner face, and indicating that the face N1 is not the same face as the owner face; matching the feature information M1 of the face M1 with the feature information T of the owner face corresponding to the mobile phone to obtain a face matching result of the feature information M1 of the face M1 matched with the feature information T of the owner face, and indicating that the face M1 and the owner face are the same face; and then, judging and determining that a non-owner face except the owner face corresponding to the mobile phone exists in the environment image P according to the face matching result, wherein the non-owner face is a face N1, so that the non-owner face is screened.
For another example, a face recognition algorithm is adopted to perform face recognition on the environment image P to obtain three faces F1, F2 and F3 and feature information F1, F2 and F3 of each face; matching the feature information F1 of the face F1 with the feature information T of the owner face corresponding to the mobile phone to obtain a face matching result that the feature information F1 of the face F1 is not matched with the feature information T of the owner face, and indicating that the face F1 is not the same face as the owner face; matching the feature information F2 of the face F2 with the feature information T of the owner face corresponding to the mobile phone to obtain a face matching result that the feature information F2 of the face F2 is not matched with the feature information T of the owner face, and indicating that the face F2 is not the same face as the owner face; matching the feature information F3 of the face F3 with the feature information T of the owner face corresponding to the mobile phone to obtain a face matching result of the feature information F3 of the face F3 matched with the feature information T of the owner face, and indicating that the face F3 and the owner face are the same face; and then, judging and determining that a non-owner face except the owner face corresponding to the mobile phone exists in the environment image P according to the face matching result, wherein the non-owner face is the faces F1 and F2, so that the non-owner face is screened.
Another embodiment of the present application provides a method for preventing peeping of a mobile terminal, further including:
if the vision checking result is peeping the mobile terminal, displaying peeping reminding information on a display screen of the mobile terminal, realizing the reminding of the owner, so that the owner can take corresponding anti-peeping measures for the existing peeping situation, and avoiding the continuous occurrence of peeping. Here, the displaying of the peeping reminding information on the display screen of the mobile terminal may include, but is not limited to, reminding in a pop-up mode, reminding in a text display mode, reminding in an audio mode, and the like.
Of course, if the visual check result is peeping the mobile terminal, the peeping reminding information can be displayed on the display screen of the mobile terminal while the display screen of the mobile terminal is subjected to fuzzy processing, so that the peeping reminding information is timely and actively stopped to continue peeping the content displayed on the display screen by a peeper in the first time, and meanwhile, the purpose of peeping-proof reminding of the owner is achieved through the peeping reminding information, so that the owner can take corresponding peeping-proof countermeasures for the existing peeping situation, and the continuous occurrence of the peeping action is avoided. Another embodiment of the present application provides a method for preventing peeping of a mobile terminal, where the method further includes:
responding to the anti-peeping mobile operation of the owner corresponding to the owner face on the mobile terminal, re-acquiring the latest environment image of the mobile terminal, and canceling the fuzzy processing on the display screen of the mobile terminal when the latest environment image does not have the non-owner face peeping the mobile terminal. Here, the peep-proof moving operation includes, but is not limited to, moving/rotating the mobile terminal in four dimensions of up, down, left, right, and the like.
For example, in the process that the owner uses the mobile phone, when peeping occurs, the display screen of the mobile phone is in a fuzzy display state, the owner finds that a person on the right of the owner peeps the mobile phone of the owner, then the owner turns the mobile phone to the left to a position where the peeper cannot see, after the owner turns the mobile phone to the left, the mobile phone responds to the operation of turning the owner to the left of the mobile phone to obtain the latest environment image P 'of the surrounding environment of the mobile phone again, and when a non-owner face peeping the mobile phone does not exist in the latest environment image P', the fuzzy processing on the display screen of the mobile phone is cancelled, so that when the non-owner does not peep the mobile phone to the surrounding environment, the previous fuzzy processing on the mobile phone can be cancelled, that is to restore the display screen of the mobile phone to a normal screen display.
In an actual application scenario of the present application, as shown in fig. 7, when a mobile phone owner uses the mobile phone, an environment image P (corresponding to an environment image in fig. 7) of an environment around the mobile phone is obtained in real time/periodically, and the environment image P is analyzed by a face recognition image technology; then, judging whether a human face except the host exists or not, and if not, ending; if yes, performing pupil imaging analysis on the face in the environment image P; then, judging whether peeping is possible or not, and if the stereoscopic vision visual angle a of the human eyes of the non-owner face is not within the threshold interval S of the peeping visual angle of the mobile phone, ending the process; if the stereoscopic vision visual angle a of the human eyes of the non-owner face is within the threshold interval S of the peeping visual angle of the mobile phone, peeping is possible; then, carrying out fuzzy processing on the display screen of the mobile phone, namely the current display of the mobile phone is fuzzy; at the moment, the owner knows that someone peeps the own mobile phone, and then the owner rotates the angle of the mobile phone to prevent the peeper from continuing to peep; and finally, when the owner turns the mobile phone to eliminate the possibility of peeping, the mobile phone displays normally, and then all peeping-preventing processes are ended. The method realizes the omnibearing monitoring of the risk of peeping the mobile phone, and carries out fuzzy processing on the display screen of the mobile phone when the mobile phone is peeped, so that the behavior that a peeper continues to peep the content displayed by the display screen is timely and actively stopped at the first time in a mode of carrying out fuzzy processing on the display screen, the peeper is prevented from continuing to peep, the owner of the mobile phone is reminded that someone peeps so that the owner can take action, and the aim of preventing peeping is fulfilled.
According to another aspect of the present application, there is also provided a computer readable medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the method of controlling user base alignment as described above.
According to another aspect of the present application, there is also provided a mobile terminal for preventing peeping of the mobile terminal, characterized in that the apparatus comprises:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method of controlling user base station on a device as described above.
Here, for details of each embodiment of the device, reference may be specifically made to corresponding parts of the embodiment of the method for controlling user base pairing at the device side, and details are not described here.
In summary, the method includes the steps that an environment image of the mobile terminal is obtained, wherein the environment image comprises at least one face; performing face recognition on the environment image, and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image; if the non-owner face exists in the environment image, obtaining a stereoscopic vision visual angle of human eyes between a pupil position on the non-owner face and the mobile terminal based on pupil imaging angle analysis; determining a visual viewing result of the non-owner face based on the stereoscopic vision visual angle of the human eyes; if the vision checking result is that the mobile terminal is peeped, the display screen of the mobile terminal is subjected to fuzzy processing, the risk that the mobile terminal is peeped is monitored in all directions, and when the mobile terminal is peeped, the display screen of the mobile terminal is subjected to fuzzy processing, so that the behavior that a peeper continues to peep the contents displayed by the display screen is stopped actively in time in the first time in a mode of processing the display screen in a fuzzy mode, the peeper is prevented from continuing to peep, the owner of the mobile terminal is reminded to peep so that the owner can take action, and the purpose of preventing peeping is achieved.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (8)

1. A peep-proof method for a mobile terminal is applied to the mobile terminal, and is characterized by comprising the following steps:
acquiring an environment image of a mobile terminal, wherein the environment image comprises at least one face;
performing face recognition on the environment image, and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image;
if the non-owner face exists in the environment image, obtaining a stereoscopic vision visual angle of human eyes between a pupil position on the non-owner face and the mobile terminal based on pupil imaging angle analysis;
determining a visual viewing result of the non-owner face based on the stereoscopic vision visual angle of the human eyes;
and if the visual checking result is that the mobile terminal is peeped, carrying out fuzzy processing on a display screen of the mobile terminal.
2. The method of claim 1, wherein the mobile terminal comprises a front wide-angle camera, wherein the acquiring an environment image of the mobile terminal, the environment image comprising at least one human face, comprises:
and acquiring an environment image of the mobile terminal through the front wide-angle camera device.
3. The method of claim 1, wherein determining the visual view of the non-owner face based on the stereoscopic viewing angle comprises:
presetting a peeping visual angle threshold interval of the mobile terminal;
judging whether the stereoscopic vision visual angle of the human eyes is within the threshold interval of the peeping visual angle of the mobile terminal,
if so, determining that the visual checking result of the non-owner face is peeping the mobile terminal;
and if not, determining that the visual checking result of the non-owner face is that the mobile terminal is not peeped.
4. The method according to claim 1, wherein the performing face recognition on the environment image and determining whether a non-owner face other than the owner face corresponding to the mobile terminal exists in the environment image comprises:
performing face recognition on the environment image to obtain the at least one face and the feature information of each face;
matching the feature information of the face with the feature information of the owner face corresponding to the mobile terminal to obtain a face matching result corresponding to the environment image;
and judging whether a non-owner face except the owner face corresponding to the mobile terminal exists in the environment image according to the face matching result.
5. The method of claim 1, wherein the method further comprises:
and if the visual checking result is that the mobile terminal is peeped, displaying peeping reminding information on a display screen of the mobile terminal.
6. The method according to any one of claims 1 to 5, further comprising:
responding to the anti-peeping mobile operation of the owner corresponding to the owner face on the mobile terminal, re-acquiring the latest environment image of the mobile terminal, and canceling the fuzzy processing on the display screen of the mobile terminal when the latest environment image does not have the non-owner face peeping the mobile terminal.
7. A computer readable medium having computer readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 6.
8. A mobile terminal for privacy protection of the mobile terminal, the mobile terminal comprising:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-6.
CN202010292080.8A 2020-04-14 2020-04-14 Mobile terminal peeping prevention method and mobile terminal Pending CN111611630A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010292080.8A CN111611630A (en) 2020-04-14 2020-04-14 Mobile terminal peeping prevention method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010292080.8A CN111611630A (en) 2020-04-14 2020-04-14 Mobile terminal peeping prevention method and mobile terminal

Publications (1)

Publication Number Publication Date
CN111611630A true CN111611630A (en) 2020-09-01

Family

ID=72202227

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010292080.8A Pending CN111611630A (en) 2020-04-14 2020-04-14 Mobile terminal peeping prevention method and mobile terminal

Country Status (1)

Country Link
CN (1) CN111611630A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711241A (en) * 2021-03-26 2021-04-27 北京孵家科技股份有限公司 Creative optimization management and control method, device and system based on artificial intelligence
CN112784323A (en) * 2020-12-31 2021-05-11 深圳阜时科技有限公司 Information protection device and electronic equipment
CN112818419A (en) * 2021-02-03 2021-05-18 深圳市辰星瑞腾科技有限公司 Computer anti-disclosure system with sentinel function
CN113268785A (en) * 2021-07-19 2021-08-17 军事科学院系统工程研究院网络信息研究所 Peep-proof display method based on target identification and automatic focusing
CN113378246A (en) * 2021-07-19 2021-09-10 军事科学院系统工程研究院网络信息研究所 Hidden peep-proof display method based on infrared vision enhancement

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062490A (en) * 2018-01-03 2018-05-22 深圳市金立通信设备有限公司 Glance prevention method, terminal and computer-readable medium
CN108416235A (en) * 2018-03-30 2018-08-17 百度在线网络技术(北京)有限公司 The anti-peeping method, apparatus of display interface, storage medium and terminal device
CN109033901A (en) * 2018-08-01 2018-12-18 平安科技(深圳)有限公司 Glance prevention method, device, computer equipment and the storage medium of intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062490A (en) * 2018-01-03 2018-05-22 深圳市金立通信设备有限公司 Glance prevention method, terminal and computer-readable medium
CN108416235A (en) * 2018-03-30 2018-08-17 百度在线网络技术(北京)有限公司 The anti-peeping method, apparatus of display interface, storage medium and terminal device
CN109033901A (en) * 2018-08-01 2018-12-18 平安科技(深圳)有限公司 Glance prevention method, device, computer equipment and the storage medium of intelligent terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784323A (en) * 2020-12-31 2021-05-11 深圳阜时科技有限公司 Information protection device and electronic equipment
CN112784323B (en) * 2020-12-31 2024-05-03 深圳阜时科技有限公司 Information protection device and electronic equipment
CN112818419A (en) * 2021-02-03 2021-05-18 深圳市辰星瑞腾科技有限公司 Computer anti-disclosure system with sentinel function
CN112818419B (en) * 2021-02-03 2021-07-20 深圳市辰星瑞腾科技有限公司 Computer anti-disclosure system with sentinel function
CN112711241A (en) * 2021-03-26 2021-04-27 北京孵家科技股份有限公司 Creative optimization management and control method, device and system based on artificial intelligence
CN113268785A (en) * 2021-07-19 2021-08-17 军事科学院系统工程研究院网络信息研究所 Peep-proof display method based on target identification and automatic focusing
CN113378246A (en) * 2021-07-19 2021-09-10 军事科学院系统工程研究院网络信息研究所 Hidden peep-proof display method based on infrared vision enhancement
CN113378246B (en) * 2021-07-19 2024-05-14 军事科学院系统工程研究院网络信息研究所 Concealed peep-proof display method based on infrared visual enhancement

Similar Documents

Publication Publication Date Title
CN111611630A (en) Mobile terminal peeping prevention method and mobile terminal
US10810326B2 (en) Screen privacy protection method and system for mobile terminal device
US9600688B2 (en) Protecting display of potentially sensitive information
US10929561B2 (en) Removing personally identifiable data before transmission from a device
US20130235058A1 (en) Automatically modifying presentation of mobile-device content
WO2016109092A1 (en) Automatic adjustment of a display to obscure data
US10176785B2 (en) System and method of adjusting a device display based on eyewear properties
JP2014513317A (en) Method and device for displaying images
TW201633215A (en) System and method for protecting eyes
US20210082371A1 (en) Techniques for eye fatigue mitigation
US20240056811A1 (en) Verification methods and apparatuses for electronic device insurance
US9449427B1 (en) Intensity modeling for rendering realistic images
US20160205355A1 (en) Monitoring installation and method for presenting a monitored area
US11010980B2 (en) Augmented interface distraction reduction
KR20220029212A (en) Electronic apparatus and controlling method thereof
JP2020187354A (en) Display device capable of automatically adjusting displayed image and method thereof
WO2019109722A1 (en) Privacy shielding processing method, device, electronic apparatus, and storage medium
CN114021211A (en) Intelligent peep-proof system
WO2018178563A1 (en) Transparency system for commonplace camera
CN110162949B (en) Method and device for controlling image display
Tang et al. {Eye-Shield}:{Real-Time} Protection of Mobile Device Screen Information from Shoulder Surfing
US20190272805A1 (en) Display control apparatus, display control method, and program
CN111399627B (en) Energy-saving method and system for 3D display device
CN116452781A (en) Image display method, device, electronic equipment and storage medium
EP3420715B1 (en) A display exposure monitoring module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination