CN112051977B - Screen control method, device and system - Google Patents

Screen control method, device and system Download PDF

Info

Publication number
CN112051977B
CN112051977B CN202010917296.9A CN202010917296A CN112051977B CN 112051977 B CN112051977 B CN 112051977B CN 202010917296 A CN202010917296 A CN 202010917296A CN 112051977 B CN112051977 B CN 112051977B
Authority
CN
China
Prior art keywords
image
target
determining
screen
risk level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010917296.9A
Other languages
Chinese (zh)
Other versions
CN112051977A (en
Inventor
苏宁博
卢涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202010917296.9A priority Critical patent/CN112051977B/en
Publication of CN112051977A publication Critical patent/CN112051977A/en
Application granted granted Critical
Publication of CN112051977B publication Critical patent/CN112051977B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1423Digital output to display device ; Cooperation and interconnection of the display device with other functional units controlling a plurality of local displays, e.g. CRT and flat panel display
    • G06F3/1446Digital output to display device ; Cooperation and interconnection of the display device with other functional units controlling a plurality of local displays, e.g. CRT and flat panel display display composed of modules, e.g. video walls
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Abstract

The application discloses a screen control method, a device and a system. Wherein the method comprises the following steps: under the condition that a target object is detected in a preset range of the large screen, determining the current risk level of the large screen; determining a target image source device based on the current risk level and the security levels of a plurality of image source devices, wherein a large screen is formed by splicing a plurality of screens, and each screen is used for displaying a display image of the corresponding image source device; and controlling a target screen corresponding to the target image source equipment to display a preset image. The application solves the technical problem of lower safety of the large screen in the related technology.

Description

Screen control method, device and system
Technical Field
The application relates to the field of large screens, in particular to a screen control method, device and system.
Background
In the scene of the large screen, the large screen is formed by splicing a plurality of screens, the whole large screen has a wider viewing range, peeping shooting is easy to occur, information displayed on the large screen is leaked, and the use safety of the large screen is affected.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the application provides a screen control method, a device and a system, which are used for at least solving the technical problem of low safety of a large screen in the related technology.
According to an aspect of an embodiment of the present application, there is provided a screen control method including: under the condition that a target object is detected in a preset range of the large screen, determining the current risk level of the large screen; determining a target image source device based on the current risk level and the security levels of a plurality of image source devices, wherein a large screen is formed by splicing a plurality of screens, and each screen is used for displaying a display image of the corresponding image source device; and controlling a target screen corresponding to the target image source equipment to display a preset image.
Optionally, determining the current risk level of the large screen includes: determining the type and the number of the detected target objects; the current risk level is determined based on the type and number of target objects.
Optionally, determining the current risk level based on the type and number of target objects includes: acquiring a plurality of first intervals, wherein each first interval comprises: preset types and preset numbers and corresponding risk levels; matching the types and the numbers of the target objects with a plurality of first intervals, and determining first intervals successfully matched; and determining the risk level corresponding to the successfully matched first interval as the current risk level.
Optionally, determining the target image source device based on the current risk level and the security levels of the plurality of image source devices includes: determining a target security level corresponding to the current risk level; and acquiring the image source equipment with the security level being greater than or equal to the target security level from the plurality of image source equipment to obtain the target image source equipment.
Optionally, determining the target security level corresponding to the current risk level includes: acquiring a plurality of second intervals, wherein each second interval comprises: presetting a risk level and a corresponding preset safety level; matching the current risk level with a plurality of second intervals, and determining a second interval successfully matched; and determining the preset security level corresponding to the second interval successfully matched as the target security level.
Optionally, controlling the target screen corresponding to the target image source device to display the preset image includes: the method comprises the steps of sending a target instruction to a target acquisition end corresponding to target image source equipment, wherein the target acquisition end is used for stopping acquiring a display image of the target image source equipment based on the target instruction; and sending the preset image to a target receiving end corresponding to the target screen, wherein the target receiving end is used for controlling the target screen to display the preset image.
Optionally, detecting the target object within the preset range includes: acquiring a second image in a preset range; the second image is identified and it is determined whether the second image contains the target object.
Optionally, identifying the second image, determining whether the second image contains the target object includes: identifying a second image, determining at least one object contained in the second image; judging whether at least one object is a target object or not; if any one object is a target object, determining that the second image contains the target object; if none of the at least one object is a target object, it is determined that the target object is not contained in the second image.
Optionally, identifying the second image, determining whether the second image contains the target object includes: identifying a second image, determining an image of at least one object contained in the second image; matching the image of the at least one object with the image of the target object; if the image of any one object is successfully matched with the image of the target object, determining that the second image contains the target object; if the at least one object fails to match the images of the target object, it is determined that the target object is not contained in the second image.
According to another aspect of the embodiment of the present application, there is also provided a screen control apparatus including: the first determining module is used for determining the current risk level of the large screen under the condition that the target object is detected in the preset range of the large screen; the second determining module is used for determining target image source equipment based on the current risk level and the security levels of the plurality of image source equipment, wherein the large screen is formed by splicing a plurality of screens, and each screen is used for displaying the display image of the corresponding image source equipment; and the control module is used for controlling the target screen corresponding to the target image source equipment to display the preset image.
According to another aspect of the embodiment of the present application, there is also provided a screen control system including: the large screen is formed by splicing a plurality of screens, and each screen is used for displaying a display image of the corresponding image source equipment; the image server is connected with the plurality of screens, and is used for determining the current risk level of the large screen under the condition that the target object is detected in the preset range of the large screen, determining the target image source equipment based on the current risk level and the security levels of the plurality of image source equipment, and controlling the target screen corresponding to the target image source equipment to display the preset image.
According to another aspect of the embodiment of the present application, there is also provided a computer readable storage medium, including a stored program, where the device in which the computer readable storage medium is controlled to execute the above-described screen control method when the program runs.
According to another aspect of the embodiment of the present application, there is also provided a processor for running a program, where the program executes the screen control method described above.
In the embodiment of the application, under the condition that the target object is detected in the preset range of the large screen, the current risk level of the large screen is firstly determined, then the target image source device is determined based on the current risk level and the security levels of a plurality of image source devices, the target image source device is further controlled to display the preset image, the display image of the image source device is not displayed any more, the large screen shields the image of the image source device with higher security level when a suspected peeping event occurs, the user cannot see the image from the image source device from the large screen, the technical effect of avoiding key information leakage is achieved, and the technical problem of lower security of the large screen in the related art is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a flowchart of a screen control method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative large screen system according to an embodiment of the present application;
FIG. 3 is a flow chart of the process flow of an alternative large screen system with privacy functionality according to an embodiment of the present application;
FIG. 4 is a schematic illustration of the masking results of an alternative large screen system according to an embodiment of the application;
fig. 5 is a schematic view of a screen control apparatus according to an embodiment of the present application; and
fig. 6 is a schematic diagram of a screen control system according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
According to an embodiment of the present application, there is provided a screen control method, it being noted that the steps shown in the flowcharts of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that herein.
Fig. 1 is a flowchart of a screen control method according to an embodiment of the present application, as shown in fig. 1, including the steps of:
step S102, under the condition that the target object is detected in the preset range of the large screen, determining the current risk level of the large screen.
The preset range in the above steps may be a range in which the content displayed on the large screen can be viewed or a range in which a peeping event easily occurs. The target object may be a sensitive target, for example, an illegal person, a person performing a peeping action, a peeping device, a peeping action, etc., where the peeping device may include, but is not limited to, a mobile phone, a tablet, a camera, a micro device with a lens, etc., and the peeping action may include a hand or an arm being placed in front of a screen, or a face being too close to the screen, etc., but is not limited to this, and may be set according to practical situations.
The current risk level in the above step is used for representing the leakage degree of the key information displayed on the large screen, and the higher the risk level is, the easier the key information displayed on the large screen is leaked.
Step S104, determining a target image source device based on the current risk level and the security levels of the plurality of image source devices, wherein the large screen is formed by splicing a plurality of screens, and each screen is used for displaying the display image of the corresponding image source device.
The importance of the information in the image is different for different image source devices, and the more important the information in the image is, the higher the security level of the image source device is, so that different security levels can be set in advance for different image source devices. For example, the security level may include a primary security level, a secondary security level and a tertiary security level from high to low, but is not limited thereto, and may be set according to actual needs.
The target image source device in the above step may be an image source device that needs to mask the display image.
For example, for a large screen system as shown in fig. 2, the large screen may be composed of 4 display screens spliced, that is, a screen 1, a screen 2, a screen 3, and a screen 4, the 4 display screens being connected to four image source devices through an image server, wherein the screen 1 is used for displaying a display image of the image source device 1, the screen 2 is used for displaying a display image of the image source device 2, the screen 3 is used for displaying a display image of the image source device 3, and the screen 4 is used for displaying a display image of the image source device 4.
In an alternative embodiment, the higher the current risk level, the more likely the information displayed on the large screen is leaked, and at this time, the higher the security level, the higher the leakage risk of the image source device, and thus, the image source device that needs to be shielded can be determined as the target image source device under the current risk level.
Step S106, the target screen corresponding to the target image source device is controlled to display the preset image.
The preset image in the above step may be a preset replacement image, and the replacement image may be a specific image, for example, may be a solid color image, such as a blue image.
For example, with the large screen system as shown in fig. 2, if it is determined that the image source device 1 is a target image source device, the screen 1 may be controlled to stop displaying the display image of the image source device 1, and display a preset image, for example, display a blue image.
According to the scheme provided by the embodiment of the application, under the condition that the target object is detected in the preset range of the large screen, the current risk level of the large screen is firstly determined, then the target image source equipment is determined based on the current risk level and the security levels of the plurality of image source equipment, the target image source equipment is further controlled to display the preset image, the display image of the image source equipment is not displayed any more, the image of the image source equipment with higher security level is shielded by the large screen when a suspected shooting event occurs, the image from the image source equipment cannot be seen by a user from the large screen, the technical effect of avoiding key information leakage is achieved, and the technical problem of lower security of the large screen in the related art is solved.
Optionally, determining the current risk level of the large screen includes: determining the type and the number of the detected target objects; the current risk level is determined based on the type and number of target objects.
The types in the steps can be types such as illegal users, peeping equipment, peeping actions and the like, and the suspected peeping events of different types have different corresponding risk levels. In addition, the more sensitive targets that are detected, the more likely the key information displayed on the large screen will be revealed.
In an alternative embodiment, after the target object is detected, the type of the target object may be identified, the type of each target object may be determined, and the number of target objects of the same type may be determined, so that the current risk level may be determined.
Optionally, determining the current risk level based on the type and number of target objects includes: acquiring a plurality of first intervals, wherein each first interval comprises: preset types and preset numbers and corresponding risk levels; matching the types and the numbers of the target objects with a plurality of first intervals, and determining first intervals successfully matched; and determining the risk level corresponding to the successfully matched first interval as the current risk level.
The plurality of first intervals in the above step may be preset risk level policies, including a correspondence between sensitive targets and risk levels, for example, as shown in table 1, the risk levels may be divided into a first-level risk, a second-level risk and a third-level risk, for the first-level risk, the preset types of the corresponding sensitive targets may be illegal users, and the preset number may be 2 or more; for the first-level risk, the corresponding preset type of the sensitive target can be peeping equipment, and the preset number can be 1 or more than 1; for the secondary risk, the preset type of the corresponding sensitive target can be illegal users, and the preset number can be 1; for three levels of risk, the preset type of the corresponding sensitive target may be a clapping action, and the preset number may be 1 or more than 1.
TABLE 1
In an alternative embodiment, after the type and number of the sensitive targets are identified, the first interval in which the matching is successful may be determined by matching the type and number of the sensitive targets with the sensitive targets in each first interval, and thus, the risk level corresponding to the interval may be determined to be the current risk level. For example, if the type of the sensitive object is currently identified as an illegal user, and the number of the illegal users is 1, it may be determined that the current risk level is a secondary risk.
Optionally, determining the target image source device based on the current risk level and the security levels of the plurality of image source devices includes: determining a target security level corresponding to the current risk level; and acquiring the image source equipment with the security level being greater than or equal to the target security level from the plurality of image source equipment to obtain the target image source equipment.
In an alternative embodiment, the security level to be masked may be set in advance for different risk levels, and further after determining the current risk level, a corresponding target security level may be determined, so that among the plurality of image source devices, an image device having a security level equal to or higher than the target security level may be determined as the target image source device.
Optionally, determining the target security level corresponding to the current risk level includes: acquiring a plurality of second intervals, wherein each second interval comprises: presetting a risk level and a corresponding preset safety level; matching the current risk level with a plurality of second intervals, and determining a second interval successfully matched; and determining the preset security level corresponding to the second interval successfully matched as the target security level.
The plurality of second intervals in the above step may be preset shielding rules, including a corresponding relationship between risk levels and security levels of the image source devices to be shielded, for example, as shown in table 2, the preset risk levels may be divided into a first-level risk, a second-level risk and a third-level risk, for the first-level risk, the current risk level is higher, and the images of all the image source devices need to be shielded, and the corresponding preset security levels may be the first-level security level, the second-level security level and the third-level security level; for the secondary risk, the current risk level is general, the image of the important image source equipment can be shielded, and the corresponding preset security level can be a primary security level and a secondary security level; for the third-level risk, the current risk level is lower, the highest security level, that is, the most important image of the image source device can be shielded, the corresponding preset security level can be the first-level security level, and the image of the image source device with the lower security level can be unshielded.
TABLE 2
Risk level Security level
First-level risk A first level security level; a second level security level; three level security level
Two-stage risk A first level security level; secondary security level
Three-level risk First level security level
In an alternative embodiment, after determining the current risk level, the second interval in which the matching is successful may be determined by matching the current risk level with the risk level in each second interval, and thus the security level corresponding to the interval may be determined as the target security level. For example, if the current risk level is determined to be a primary risk, the target security level may be determined to be a primary security level, a secondary security level, and a tertiary security level.
Optionally, controlling the target screen corresponding to the target image source device to display the preset image includes: the method comprises the steps of sending a target instruction to a target acquisition end corresponding to target image source equipment, wherein the target acquisition end is used for stopping acquiring a display image of the target image source equipment based on the target instruction; and sending the preset image to a target receiving end corresponding to the target screen, wherein the target receiving end is used for controlling the target screen to display the preset image.
The target instruction in the above step may be a masking instruction, that is, stopping capturing the display image of the target image source device, and stopping sending the image data to the image server.
In an alternative embodiment, after determining the target image source device, the image server may send a masking instruction to the target acquisition end S corresponding to the target image source device, where after receiving the masking instruction, the S end stops sending the image data to the image server. The image server can send preset replacement image data to a receiving end R end corresponding to the image source equipment to be shielded, the R end decodes the received replacement image data, and then the replacement image is displayed on a connected screen.
It should be noted that, because the image server is usually placed in the machine room near the large-screen device, not only the large-screen device will not display the display image of the target image source device, but also the image server will not receive the display image of the target image source device any more, so that the security can be higher.
Optionally, detecting the target object within the preset range includes: acquiring a second image in a preset range; the second image is identified and it is determined whether the second image contains the target object.
In an alternative embodiment, the user image, namely the second image, can be obtained through a camera arranged on the large screen, and whether the user image comprises a sensitive target is further identified through an AI algorithm; or directly matching the acquired user image with a preset standard image of the sensitive target in an image matching mode, and if the similarity reaches a threshold value, determining that the two images are identical, namely that the user image contains the sensitive target.
Optionally, identifying the second image, determining whether the second image contains the target object includes: identifying a second image, determining at least one object contained in the second image; judging whether at least one object is a target object or not; if any one object is a target object, determining that the second image contains the target object; if none of the at least one object is a target object, it is determined that the target object is not contained in the second image.
In an alternative embodiment, at least one object in the user image can be identified directly through an AI algorithm, so as to judge whether the at least one object comprises a sensitive target, and if any one object is the sensitive target, the user image can be determined to contain the target object; if all of the objects are not sensitive targets, it may be determined that the target object is not contained in the user image.
Optionally, identifying the second image, determining whether the second image contains the target object includes: identifying a second image, determining an image of at least one object contained in the second image; matching the image of the at least one object with the image of the target object; if the image of any one object is successfully matched with the image of the target object, determining that the second image contains the target object; if the at least one object fails to match the images of the target object, it is determined that the target object is not contained in the second image.
The image of the target object in the above step may be a face image of an illegal user set in advance, an image of a peeping device, a body image of an execution action, or the like, but is not limited thereto.
In an alternative embodiment, a standard image of the sensitive object may be set in the image server, where the standard image of the sensitive object includes: at least one of a face image of an illegal user, an image of a peeping device, a body image of a peeping action performed, and the like. After the image of at least one object is identified from the user image, the image of each object can be matched with the standard image of the sensitive target, if the image of a certain object is identical with the face image of an illegal user, the successful matching of the image of any object with the image of the target object can be determined, and the user image is determined to contain the illegal user; if the image of a certain object is the same as the image of the peeping device, the successful matching of the image of any object with the image of the target object can be determined, and the peeping device is contained in the user image; if the image of a certain object is the same as the body image for executing the action, the successful matching of any object with the image of the target object can be determined, and the peeping action is included in the user image.
It should be noted that, since the second image is acquired in real time, the above steps may be repeatedly performed, and the acquired user image may be repeatedly detected.
A preferred embodiment of the present application will be described in detail with reference to fig. 2 to 4.
For the large screen system shown in fig. 2, the large screen system can be formed by splicing a screen 1, a screen 2, a screen 3 and a screen 4, wherein each display screen is connected with a receiving end R end through a video line (HDMI), as indicated by a bold line in fig. 2, the screen 1 is connected with R1, the screen 2 is connected with R2, the screen 3 is connected with R3, and the screen 4 is connected with R4. Each R end can be connected with the image server through a network cable or a wireless connection mode, and the image server can be connected with the image server through the network cable or the wireless connection mode with 4S ends. Each S terminal corresponds to an image source device, where S1 is connected to the image source device 1, S2 is connected to the image source device 2, S3 is connected to the image source device 3, and S4 is connected to the image source device 4. The S end is used for collecting the display image of the image source equipment, encoding the display image and then sending the encoded display image to the image server. The image server sends the received coded data to the corresponding R end according to a preset connection rule, the R end decodes the coded data and displays the decoded coded data on a corresponding screen, for example, the data collected by S1 is sent to R1, the data collected by S2 is sent to R2, the data collected by S3 is sent to R3, and the data collected by S4 is sent to R4.
At the top of the large screen, a camera 00 is provided, which can send the photographed user image to an image server. The camera is typically provided on the front panel of the large screen device or a separate camera may be used to be placed around the large screen device. The camera can shoot pictures in a certain range in front of the current large screen by adjusting the position of the camera, and the shot images are recorded as user images.
As shown in fig. 3, the processing flow of the large screen system with the peep-proof function is as follows:
in step S31, the camera acquires the user image, and sends the acquired user image to the image server.
Step S32, the image server judges whether a sensitive target exists in the received user image, wherein if so, the step S33 is entered; if not, return to step S31.
Step S33, the image server determines the current risk level corresponding to the user image according to the identified sensitive target and a preset risk level strategy.
Optionally, the preset risk level policy includes a correspondence between the sensitive target and the risk level, as shown in table 1.
In step S34, the image server determines the image source device to be masked based on the preset masking rule according to the current risk level and the security level of each image source device.
Optionally, the preset masking rule includes a corresponding relationship between each risk level and a security level of the image source device to be masked, as shown in table 2.
And step S35, the image server sends a shielding instruction to the S end corresponding to the determined image source equipment to be shielded.
And step S36, after the S-side receives the shielding instruction, stopping sending the image data to the image server.
Step S37, the image server sends preset replacement image data to the R end corresponding to the image source equipment to be shielded.
In step S38, after decoding the preset replacement image data, the R end displays the preset replacement image on the corresponding screen.
As shown in fig. 4, if it is determined that the image source device to be shielded is the image source device 1, the S terminal corresponding to the image source device 1 does not send image data to the image server any more; the image server sends the preset replacement image data to an R1 end corresponding to the image source device 1, for example, the thickened virtual line segment identifier in fig. 4, and the R1 end decodes the preset replacement image data and displays a replacement image (for example, a black box image in fig. 4) in the screen 1.
Example 2
According to the embodiment of the present application, a screen control device is provided, which can execute the screen control method in the above embodiment 1, and the specific implementation scheme and the preferred embodiment are the same as those in the above embodiment, and are not described herein.
Fig. 5 is a schematic view of a screen control apparatus according to an embodiment of the present application, as shown in fig. 5, the apparatus including:
the first determining module 52 is configured to determine a current risk level of the large screen if the target object is detected within a preset range of the large screen;
a second determining module 54, configured to determine a target image source device based on the current risk level and security levels of a plurality of image source devices, where the large screen is formed by stitching a plurality of screens, and each screen is configured to display a display image of a corresponding image source device;
and the control module 56 is used for controlling the target screen corresponding to the target image source device to display the preset image.
Optionally, the first determining module includes: a first determining unit configured to determine a type and a number of detected target objects; and the second determining unit is used for determining the current risk level based on the type and the number of the target objects.
Optionally, the second determining unit includes: a first obtaining subunit, configured to obtain a plurality of first intervals, where each first interval includes: preset types and preset numbers and corresponding risk levels; the first matching subunit is used for matching the types and the numbers of the target objects with a plurality of first intervals and determining first intervals successfully matched; and the first determining subunit is used for determining the risk level corresponding to the successfully matched first interval as the current risk level.
Optionally, the second determining module includes: the second determining unit is used for determining a target security level corresponding to the current risk level; the first acquisition unit is used for acquiring the image source equipment with the security level being greater than or equal to the target security level from the plurality of image source equipment to obtain the target image source equipment.
Optionally, the second determining unit includes: a second obtaining subunit, configured to obtain a plurality of second intervals, where each second interval includes: presetting a risk level and a corresponding preset safety level; the second matching subunit is used for matching the current risk level with a plurality of second intervals and determining a second interval successfully matched; and the second determining subunit is used for determining the preset security level corresponding to the second interval successfully matched as the target security level.
Optionally, the control module includes: the first sending unit is used for sending a target instruction to a target acquisition end corresponding to the target image source equipment, wherein the target acquisition end is used for stopping acquiring a display image of the target image source equipment based on the target instruction; the second sending unit is used for sending the preset image to a target receiving end corresponding to the target screen, wherein the target receiving end is used for controlling the target screen to display the preset image.
Optionally, the apparatus further comprises: the detection module is used for detecting the target object in a preset range, wherein the detection module comprises: a second acquisition unit configured to acquire a second image within a preset range; and the identification unit is used for identifying the second image and determining whether the second image contains the target object.
Optionally, the identification unit includes: a first recognition subunit configured to recognize the second image, and determine at least one object included in the second image; a judging subunit, configured to judge whether at least one object is a target object; a first determining subunit, configured to determine that the second image includes the target object if any one of the objects is the target object; and a second determining subunit configured to determine that the second image does not contain the target object if none of the at least one object is the target object.
Optionally, the identification unit includes: a second recognition subunit configured to recognize a second image, and determine an image of at least one object contained in the second image; a matching subunit, configured to match an image of at least one object with an image of a target object; a third determining subunit, configured to determine that the second image includes the target object if the image of any one object is successfully matched with the image of the target object; and a fourth determining subunit, configured to determine that the second image does not contain the target object if at least one object fails to match with the image of the target object.
Example 3
According to the embodiment of the present application, a screen control device is provided, which can execute the screen control method in the above embodiment 1, and the specific implementation scheme and the preferred embodiment are the same as those in the above embodiment, and are not described herein.
Fig. 6 is a schematic diagram of a screen control system according to an embodiment of the present application, as shown in fig. 6, including:
a large screen 62 formed by splicing a plurality of screens 622, each screen 622 being for displaying a display image of a corresponding image source device 64;
the image server 66 is connected to the plurality of screens 622, and is configured to determine a current risk level of the large screen 62 in a case where a target object is detected within a preset range of the large screen 62, determine a target image source device based on the current risk level and the security levels of the plurality of image source devices 64, and control a target screen corresponding to the target image source device to display a preset image.
Optionally, the image server is further configured to determine a type and a number of detected target objects, and determine the current risk level based on the type and the number of target objects.
Optionally, the image server is further configured to obtain a plurality of first intervals, match types and numbers of target objects with the plurality of first intervals, determine a first interval that is successfully matched, and determine a risk level corresponding to the first interval that is successfully matched as a current risk level, where each first interval includes: preset types and preset numbers, and corresponding risk levels.
Optionally, the image server is further configured to determine a target security level corresponding to the current risk level, and obtain, from among the plurality of image source devices, an image source device having a security level greater than or equal to the target security level, to obtain the target image source device.
Optionally, the image server is further configured to obtain a plurality of second intervals, match the current risk level with the plurality of second intervals, determine a second interval that is successfully matched, and determine a preset security level corresponding to the second interval that is successfully matched as the target security level, where each second interval includes: preset risk level and corresponding preset security level.
Optionally, the system further comprises:
the image acquisition system comprises a plurality of acquisition terminals, an image server and a plurality of image source devices, wherein each acquisition terminal is used for acquiring display images of the corresponding image source devices;
a plurality of receiving terminals connected with the image server and the plurality of screens;
the image server is also used for sending a target instruction to a target acquisition end corresponding to the target image source equipment and sending a preset image to a target receiving end corresponding to the target screen;
the target acquisition end is used for stopping acquiring the display image of the target image source equipment based on the target instruction;
the target receiving end is used for controlling the target screen to display a preset image.
Optionally, the image server is further configured to acquire a second image within a preset range, identify the second image, and determine whether the second image includes the target object.
Optionally, the image server is further configured to identify the second image, determine at least one object contained in the second image, and determine whether the at least one object is a target object, where if any one object is the target object, then determine that the second image contains the target object; if none of the at least one object is a target object, it is determined that the target object is not contained in the second image.
Optionally, the image server is further configured to identify a second image, determine an image of at least one object contained in the second image, and match the image of at least one object with an image of a target object, where if the image of any one object is successfully matched with the image of the target object, it is determined that the second image contains the target object; if the at least one object fails to match the images of the target object, it is determined that the target object is not contained in the second image.
Example 4
According to an embodiment of the present application, there is provided a computer-readable storage medium including a stored program, wherein a device in which the computer-readable storage medium is controlled to execute the screen control method in embodiment 1 described above when the program is run.
Example 5
According to an embodiment of the present application, there is provided a processor for running a program, wherein the program runs to execute the screen control method in embodiment 1 described above.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.

Claims (12)

1. A screen control method, characterized by comprising:
under the condition that a target object is detected in a preset range of a large screen, determining the current risk level of the large screen;
determining a target image source device based on the current risk level and the security levels of a plurality of image source devices, wherein the large screen is formed by splicing a plurality of screens, and each screen is used for displaying a display image of the corresponding image source device;
controlling a target screen corresponding to the target image source equipment to display a preset image;
wherein determining the current risk level of the large screen comprises: determining the type and the number of the detected target objects; and determining the current risk level based on the type and the number of the target objects, wherein the current risk level is used for representing the leakage degree of key information displayed on a large screen.
2. The method of claim 1, wherein determining the current risk level based on the type and number of target objects comprises:
acquiring a plurality of first intervals, wherein each first interval comprises: preset types and preset numbers and corresponding risk levels;
matching the types and the numbers of the target objects with the plurality of first intervals, and determining first intervals successfully matched;
and determining the risk level corresponding to the first interval successfully matched as the current risk level.
3. The method of claim 1, wherein determining a target image source device based on the current risk level and security levels of a plurality of image source devices comprises:
determining a target security level corresponding to the current risk level;
and acquiring the image source equipment with the security level larger than or equal to the target security level from the plurality of image source equipment to obtain the target image source equipment.
4. A method according to claim 3, wherein determining a target security level corresponding to the current risk level comprises:
acquiring a plurality of second intervals, wherein each second interval comprises: presetting a risk level and a corresponding preset safety level;
matching the current risk level with the plurality of second intervals, and determining a second interval successfully matched;
and determining the preset security level corresponding to the second interval successfully matched as the target security level.
5. The method of claim 1, wherein controlling the target screen corresponding to the target image source device to display the preset image comprises:
sending a target instruction to a target acquisition end corresponding to the target image source equipment, wherein the target acquisition end is used for stopping acquiring a display image of the target image source equipment based on the target instruction;
and sending the preset image to a target receiving end corresponding to the target screen, wherein the target receiving end is used for controlling the target screen to display the preset image.
6. The method of claim 1, wherein detecting the target object within the preset range comprises:
acquiring a second image in the preset range;
and identifying the second image, and determining whether the second image contains the target object.
7. The method of claim 6, wherein identifying the second image, determining whether the target object is contained in the second image comprises:
identifying the second image and determining at least one object contained in the second image;
judging whether the at least one object is the target object or not;
if any one object is the target object, determining that the second image contains the target object;
if none of the at least one object is the target object, it is determined that the target object is not contained in the second image.
8. The method of claim 6, wherein identifying the second image, determining whether the target object is contained in the second image comprises:
identifying the second image and determining an image of at least one object contained in the second image;
matching the image of the at least one object with the image of the target object;
if the image of any one object is successfully matched with the image of the target object, determining that the second image contains the target object;
and if the at least one object fails to match with the image of the target object, determining that the target object is not contained in the second image.
9. A screen control apparatus, comprising:
the first determining module is used for determining the current risk level of the large screen under the condition that a target object is detected in the preset range of the large screen;
the second determining module is used for determining target image source equipment based on the current risk level and the security levels of the plurality of image source equipment, wherein the large screen is formed by splicing a plurality of screens, and each screen is used for displaying the display image of the corresponding image source equipment;
the control module is used for controlling a target screen corresponding to the target image source equipment to display a preset image;
the third determining module, configured to determine a current risk level of the large screen includes: determining the type and the number of the detected target objects; and determining the current risk level based on the type and the number of the target objects, wherein the current risk level is used for representing the leakage degree of key information displayed on a large screen.
10. A screen control system, comprising:
the large screen is formed by splicing a plurality of screens, and each screen is used for displaying a display image of the corresponding image source equipment;
the image server is connected with the plurality of screens, and is used for determining the current risk level of the large screen under the condition that a target object is detected in the preset range of the large screen, determining target image source equipment based on the current risk level and the security levels of the plurality of image source equipment, and controlling the target screen corresponding to the target image source equipment to display a preset image;
a processor, connected with the plurality of screens and the image server, for determining the type and number of the detected target objects; and determining the current risk level based on the type and the number of the target objects, wherein the current risk level is used for representing the leakage degree of key information displayed on a large screen.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium includes a stored program, wherein the program, when run, controls a device in which the computer-readable storage medium is located to execute the screen control method according to any one of claims 1 to 8.
12. A processor for running a program, wherein the program runs to execute the screen control method according to any one of claims 1 to 8.
CN202010917296.9A 2020-09-03 2020-09-03 Screen control method, device and system Active CN112051977B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010917296.9A CN112051977B (en) 2020-09-03 2020-09-03 Screen control method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010917296.9A CN112051977B (en) 2020-09-03 2020-09-03 Screen control method, device and system

Publications (2)

Publication Number Publication Date
CN112051977A CN112051977A (en) 2020-12-08
CN112051977B true CN112051977B (en) 2023-09-08

Family

ID=73607903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010917296.9A Active CN112051977B (en) 2020-09-03 2020-09-03 Screen control method, device and system

Country Status (1)

Country Link
CN (1) CN112051977B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184723A (en) * 2011-03-28 2011-09-14 广东威创视讯科技股份有限公司 Echoing device and method for multi-screen splicing processing system
CN102855114A (en) * 2012-08-20 2013-01-02 北京小米科技有限责任公司 Multi-mobile-terminal screen splicing method, screen splicing server and mobile terminal
CN105279459A (en) * 2014-11-20 2016-01-27 维沃移动通信有限公司 Terminal anti-peeping method and mobile terminal
CN106569662A (en) * 2016-10-31 2017-04-19 维沃移动通信有限公司 Display method of application interface and mobile terminal
CN107547845A (en) * 2016-06-27 2018-01-05 秦艳 Big data processing method and big data processing unit
WO2018058373A1 (en) * 2016-09-28 2018-04-05 达闼科技(北京)有限公司 Control method and apparatus for electronic device, and electronic device
CN108595278A (en) * 2018-04-13 2018-09-28 Oppo广东移动通信有限公司 Anti-peeping reminding method and Related product
CN109271814A (en) * 2018-10-09 2019-01-25 裕利年电子南通有限公司 Anti- take pictures display system and anti-photographic method based on computer vision
CA3021117A1 (en) * 2017-10-23 2019-04-23 Ingenico Group Display data treatment process, device and corresponding program
CN110443016A (en) * 2019-07-04 2019-11-12 深圳壹账通智能科技有限公司 Information leakage preventing method, electronic device and storage medium
WO2020024416A1 (en) * 2018-08-01 2020-02-06 平安科技(深圳)有限公司 Anti-peep method and apparatus for smart terminal, computer device and storage medium
JP2020056793A (en) * 2017-08-29 2020-04-09 株式会社ユピテル Electronic apparatus and program
CN111143906A (en) * 2019-12-31 2020-05-12 联想(北京)有限公司 Control method and control device
CN111523384A (en) * 2020-03-19 2020-08-11 浙江省北大信息技术高等研究院 Vision-based conference anti-candid method and device, storage medium and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9646419B2 (en) * 2015-01-14 2017-05-09 International Business Machines Corporation Augmented reality device display of image recognition analysis matches

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184723A (en) * 2011-03-28 2011-09-14 广东威创视讯科技股份有限公司 Echoing device and method for multi-screen splicing processing system
CN102855114A (en) * 2012-08-20 2013-01-02 北京小米科技有限责任公司 Multi-mobile-terminal screen splicing method, screen splicing server and mobile terminal
CN105279459A (en) * 2014-11-20 2016-01-27 维沃移动通信有限公司 Terminal anti-peeping method and mobile terminal
CN107547845A (en) * 2016-06-27 2018-01-05 秦艳 Big data processing method and big data processing unit
WO2018058373A1 (en) * 2016-09-28 2018-04-05 达闼科技(北京)有限公司 Control method and apparatus for electronic device, and electronic device
CN106569662A (en) * 2016-10-31 2017-04-19 维沃移动通信有限公司 Display method of application interface and mobile terminal
JP2020056793A (en) * 2017-08-29 2020-04-09 株式会社ユピテル Electronic apparatus and program
CA3021117A1 (en) * 2017-10-23 2019-04-23 Ingenico Group Display data treatment process, device and corresponding program
CN108595278A (en) * 2018-04-13 2018-09-28 Oppo广东移动通信有限公司 Anti-peeping reminding method and Related product
WO2020024416A1 (en) * 2018-08-01 2020-02-06 平安科技(深圳)有限公司 Anti-peep method and apparatus for smart terminal, computer device and storage medium
CN109271814A (en) * 2018-10-09 2019-01-25 裕利年电子南通有限公司 Anti- take pictures display system and anti-photographic method based on computer vision
CN110443016A (en) * 2019-07-04 2019-11-12 深圳壹账通智能科技有限公司 Information leakage preventing method, electronic device and storage medium
CN111143906A (en) * 2019-12-31 2020-05-12 联想(北京)有限公司 Control method and control device
CN111523384A (en) * 2020-03-19 2020-08-11 浙江省北大信息技术高等研究院 Vision-based conference anti-candid method and device, storage medium and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Countermeasure for Electromagnetic Screen Image Leakage based on Color Mixing in Human Brain;Takashi Watanabe 等;《Electromagnetic Compatibility (EMC), 2010 IEEE International Symposium on》;全文 *

Also Published As

Publication number Publication date
CN112051977A (en) 2020-12-08

Similar Documents

Publication Publication Date Title
CN110443016B (en) Information leakage prevention method, electronic device and storage medium
CN104469127B (en) Image pickup method and device
CN111711794A (en) Anti-candid image processing method and device, terminal and storage medium
US8326443B2 (en) Computer enabled method for disabling protective safety gear
CN108063979A (en) Video playing control method, device and computer readable storage medium
CN112257124A (en) Image processing method and device
KR102264275B1 (en) Violent behavior management system and method
CN110096972A (en) Data guard method, apparatus and system
CN110619239A (en) Application interface processing method and device, storage medium and terminal
CN113012034A (en) Method, device and system for image display processing
CN112257123A (en) Image processing method and system
CN112051977B (en) Screen control method, device and system
Korshunov et al. UHD video dataset for evaluation of privacy
CN110084076A (en) Evidence display methods and device
CN111783714A (en) Coercion face recognition method, device, equipment and storage medium
CN110135204A (en) Data guard method and device
CN111639592A (en) Electronic display screen anti-photographing system and method
CN107135421A (en) Video features detection method and device
CN111832458A (en) Anti-theft method and system
CN110134565A (en) Environment light detection method and device
CN116094811A (en) Secret information anti-photographing alarm method, system, equipment and readable storage medium
CN112911142B (en) Image processing method, image processing apparatus, non-volatile storage medium, and processor
CN111985305A (en) Screen peeping prevention method and device and terminal equipment
CN112422907A (en) Image processing method, device and system
CN110188576A (en) Data guard method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant