CN112818418A - Information security management method and device - Google Patents

Information security management method and device Download PDF

Info

Publication number
CN112818418A
CN112818418A CN202110073540.2A CN202110073540A CN112818418A CN 112818418 A CN112818418 A CN 112818418A CN 202110073540 A CN202110073540 A CN 202110073540A CN 112818418 A CN112818418 A CN 112818418A
Authority
CN
China
Prior art keywords
screen
peep
pupils
user
camera
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110073540.2A
Other languages
Chinese (zh)
Inventor
陈兴春
张凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN202110073540.2A priority Critical patent/CN112818418A/en
Publication of CN112818418A publication Critical patent/CN112818418A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Ophthalmology & Optometry (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Studio Devices (AREA)

Abstract

The embodiment of the application relates to an information security management method and device. The method comprises the steps of acquiring the number of pupils in the monitoring range of a camera under the condition that the electronic equipment starts the peep-proof screen detection function, and entering into a peep-proof screen state under the condition that the number of the pupils is larger than a first threshold value. The privacy and safety of the user can be effectively protected on the premise of not influencing the screen display and the screen function.

Description

Information security management method and device
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method and an apparatus for information security management.
Background
With the gradual improvement of living standard, electronic equipment is used for daily communication and work, and people pay more and more attention to the protection of privacy. In public areas with dense population, such as public offices, subways, buses and the like, screens of electronic equipment used by people can be peeped at any time.
The current peep-proof method is mainly to add an peep-proof protective film at a specific angle in a display area of the electronic equipment. The method can only prevent peeking at a specific angle and can affect the display effect of the screen and some functions of the screen, such as touch, fingerprint identification under the screen and card swiping under the screen.
Disclosure of Invention
In view of the foregoing deficiencies of the prior art, an object of the present application is to provide an information security management method and apparatus, which can effectively protect the security of the private information of the user without affecting the screen display and the screen function.
The embodiment of the application provides an information security management method, which is applied to electronic equipment and is characterized by comprising the following steps:
acquiring the number of pupils in the monitoring range of the camera under the condition that the electronic equipment starts the peep-proof screen detection function;
and entering a peep-proof screen state under the condition that the number of the pupils is greater than a first threshold value.
In the embodiment of the application, whether the screen is peeped is judged according to the number of pupils in front of the screen, and the screen enters the peep-proof state under the condition that the number of the pupils is larger than the first threshold, so that the privacy and safety of a user can be effectively protected on the premise that the screen display and the screen function are not influenced, and the hardware cost is reduced.
In one possible embodiment, the entering into the privacy screen state includes:
changing the display content of the screen;
or changing the display effect of the screen;
or outputting a prompt message.
In the embodiment of the application, entering the peep-proof screen state may include changing display content of the screen, changing a display effect of the screen, or outputting prompt information, so as to remind a user of peeping while preventing further peeping of screen privacy, thereby effectively protecting information security of the user.
In one possible embodiment, the changing the display content of the screen includes:
popping up a warning window;
after the popping up of the warning window, the method further comprises:
and within a preset time, closing the peep-proof screen detection function.
In the embodiment of the application, after the state of the peep-proof screen is entered, the warning window can be popped up or the screen display can be changed to prevent the screen from being further peeped, the privacy of the screen of a user is protected, the peep-proof screen detection function is closed within the preset time after the warning window is popped up, the memory space can be saved, and the energy consumption is reduced.
In a possible embodiment, before acquiring the number of pupils in the monitoring range of the camera, the method further includes:
detecting whether a first application program running in a foreground belongs to a target application program set or not;
and if so, starting the peep-proof screen detection function.
In the embodiment of the application, when the application running in the foreground is the application needing to open the peep-proof screen detection function, the peep-proof screen detection function is opened, so that the privacy safety of a user can be effectively protected.
In one possible embodiment, the method further comprises:
under the condition that the first application program running in the foreground is detected to belong to the target application program set, determining a first threshold corresponding to the first application program according to a corresponding relation between the target application program set and a pupil number threshold set, wherein the target application program set comprises at least two application programs, the pupil number threshold set comprises at least two pupil number threshold values, two application programs with different privacy protection levels exist in the at least two application programs, and mapping from the at least two pupil number threshold values to the privacy protection levels of the at least two application programs is a monotone decreasing function.
In the embodiment of the application, different first threshold values can be set for different application programs, the smaller the first threshold value of the application program with the higher privacy protection level is, the pupil number is set for the application program in a targeted manner, and the privacy safety of a user can be better protected.
In a possible embodiment, before acquiring the number of pupils in the monitoring range of the camera, the method further includes:
judging whether the brightness of the current environment is greater than a second threshold value;
and if so, starting the peep-proof screen detection function.
In this application embodiment, when ambient brightness is greater than the second threshold value, the camera can catch the pupil image's in the monitoring range under the condition, opens peep-proof screen and detects the function, can practice thrift the memory space, reduces the power consumption.
In a possible embodiment, before acquiring the number of pupils in the monitoring range of the camera, the method further includes:
acquiring display information of a screen display interface;
judging whether the display information contains privacy information;
and if so, starting the peep-proof screen detection function.
In the embodiment of the application, the peep-proof screen detection function is started under the condition that the screen display interface displays the privacy information, so that the privacy safety of a user can be effectively protected.
In a possible implementation, in a case that the number of pupils is greater than a first threshold, the method further includes:
detecting whether the duration of the number of pupils in the monitoring range of the camera, which is greater than the first threshold, is greater than a third threshold;
and if so, executing the step of entering the peep-proof screen state.
In the embodiment of the application, under the condition that the duration of the detection that the number of pupils in the monitoring range of the camera is greater than the first threshold is greater than the third threshold, the screen is confirmed to be peeped, and the screen enters a peep-proof state. Whether the screen is peeped or not can be accurately judged by detecting whether the duration of the pupil number in the image head monitoring range larger than the first threshold is larger than a third threshold or not.
In a possible implementation, in a case that the number of pupils is greater than a first threshold, the method further includes:
acquiring pupil information within a camera monitoring range;
judging whether the user corresponding to the pupil information is a trusted user or not;
and if not, executing the step of entering the peep-proof screen state.
In the embodiment of the application, under the condition that the user corresponding to the pupil information in the monitoring range of the camera is not a trusted user, the screen is confirmed to be peeped, and the screen enters the peep-proof screen state. Whether the screen is peeped or not can be accurately judged by judging whether the user corresponding to the pupil information in the monitoring range of the camera is a trusted user or not.
An embodiment of the present application further provides an information security management apparatus, which is applied to an electronic device, and includes:
the first acquisition module is used for acquiring the number of pupils in the monitoring range of the camera under the condition that the electronic equipment starts the peep-proof screen detection function;
and the peep-proof screen module is used for entering a peep-proof screen state under the condition that the number of the pupils is greater than a first threshold value.
The present application further provides an electronic device, which includes a processor and a memory, where the memory is used to store one or more programs, and the one or more programs are configured to be executed by the processor, and the programs include methods for executing the foregoing embodiments and any possible implementation manner thereof.
The present invention also provides a computer-readable storage medium, which is characterized in that the computer-readable storage medium stores a computer program, and the computer program includes program instructions, and when the program instructions are executed by a processor, the processor is caused to execute the method of the foregoing embodiment and any one of the possible implementation manners.
In the embodiment of the application, under the condition that the peep-proof screen detection function is started, the number of pupils in the monitoring range of the camera is obtained, and whether the screen is peeped or not is judged according to the number of the pupils. Under the condition that pupil quantity is greater than first threshold value, get into peep-proof screen state, can effectively protect user privacy safety under the prerequisite that does not influence screen display and screen function, reduce the hardware cost simultaneously.
Drawings
Fig. 1 is a schematic flowchart of an information security management method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another information security management method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another information security management method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another information security management method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another information security management method according to an embodiment of the present application;
fig. 6 is a schematic flowchart of another information security management method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an information security management apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
To facilitate an understanding of the present application, the present application will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present application are given in the accompanying drawings. This application may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
The following describes embodiments of the present application in detail.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating an information security management method according to an embodiment of the present disclosure. As shown in fig. 1, the information security management method includes the following steps.
101, acquiring the number of pupils in the monitoring range of the camera under the condition that the electronic device starts the peep-proof screen detection function.
In this embodiment, when a user browses information using an electronic device, in order to protect information displayed on a screen and prevent privacy of the user from being peeped, the information security management method may include: under the condition that the electronic equipment starts the peep-proof screen detection function, the camera is started, and the image of the picture in front of the screen is collected by the camera. And processing the image collected by the camera to obtain the number of pupils in front of the screen. The number of pupils in front of the screen is monitored in real time through the camera, and whether the screen display interface is peeped or not is judged according to the number of the pupils.
Specifically, the number of pupils in the image can be determined by performing face detection or eye detection on the image and then detecting the pupils, or the image can be directly subjected to pupil detection. And carrying out human eye detection on the image to determine a human eye area. And after the human eye region is detected, carrying out binarization processing on the human eye region to obtain a binarized image. And filtering the obtained binary image to filter black noise points to obtain a pupil region. After the pupil position in the image is determined, the number of pupils in the image can be obtained.
The pupil number can also be directly obtained from the image by a neural network model. When the neural network model is used for obtaining the number of pupils in an image, the neural network model needs to be trained firstly. Training the neural network model first prepares an image set, which is a collection of a large number of images containing different pupil numbers. Each image in the image set has a corresponding label that indicates the number of pupils in that image. The image set is divided into a training set, a verification set and a test set. The training set is used to fit the model, and the classification model is trained by setting the parameters of the classifier, and should be as large as possible for better performance of the trained model. The verification set is used for adjusting model parameters and improving the efficiency of the model. And the test set is used for testing and evaluating the performance of the trained model, and when the performance of the model meets the requirements, for example, the accuracy of the test set is higher than 90%, the training of the neural network model is completed. After the model is trained, the image to be detected is input into the neural network model, and the number of pupils in the image can be obtained.
Further, in order to reduce energy consumption, the step of acquiring the number of pupils within the monitoring range of the camera is executed at a set frequency, and the camera periodically acquires images of a picture in front of a screen and processes the images acquired by the camera to obtain the number of pupils. The set frequency may be fixed or the setting may be changed by the user. The execution frequency of step 101 can be flexibly set according to actual situations, for example, in case of sufficient device power, step 101 is executed at a set frequency, and in case of insufficient device power, the execution frequency of step 101 is reduced. For example, the frequency is set to be twice per second, and in the case that the electric quantity of the device is sufficient, the step 101 is executed at the frequency of twice per second, that is, the camera acquires the image of the picture in front of the screen at the frequency of twice per second, and the image acquired by the camera is processed to obtain the number of pupils in front of the screen; when the power of the device is insufficient, the execution frequency of step 101 is reduced, and the execution frequency of step 101 may be reduced to once per second, that is, the camera acquires the image of the picture in front of the screen at the frequency of once per second, and the image acquired by the camera is processed to obtain the number of pupils in front of the screen.
And 102, entering a peep-proof screen state under the condition that the number of the pupils is larger than a first threshold value.
Specifically, the first threshold is the maximum pupil number allowed to watch the screen, and can be flexibly set according to user requirements, for example, when only the user is allowed to watch the screen in public environments such as a subway square, the first threshold is set to be 2, and when the user watches videos together with the users, the first threshold can be set according to the number of people allowed to watch the videos. Under the condition that the obtained pupil number is larger than the first threshold value, the screen can be considered to be peeped, and the screen enters a peep-proof screen state, so that a user is reminded of peeping and the privacy of the screen is protected. And when the number of the acquired pupils is smaller than or equal to the first threshold, the screen is not peeped, the screen is normally displayed, and the step 101 is continuously executed. For example, the first threshold is 2, that is, the maximum number of pupils allowed to watch the screen is 2, and when the number of pupils acquired within the monitoring range of the camera is 2 or less than 2, it indicates that the current screen is not peeped, the screen normally displays, the step 101 is continuously performed, and when the number of pupils acquired within the monitoring range of the camera is greater than 2, for example, 3, it is determined that the third pupil is peeping, so that the screen enters a peep-proof state, and information displayed on the screen is prevented from being peeped.
In the embodiment of the application, whether the screen is peeped is judged according to the number of pupils in front of the screen, and the screen enters the peep-proof state under the condition that the number of the pupils is larger than the maximum number of the pupils allowing the screen to be watched, so that the privacy and safety of a user can be effectively protected on the premise that the screen display and the screen function are not influenced, and meanwhile, the hardware cost is reduced.
In a possible embodiment, the entering into the peep-proof screen state includes:
changing the display content of the screen;
or changing the display effect of the screen;
or outputting a prompt message.
Specifically, under the condition that the number of the pupils is greater than the first threshold, it is indicated that the screen is peeped and enters a peep-proof screen state, and the user can be reminded that the screen is peeped by changing the display content of the screen, changing the display effect of the screen or outputting prompt information. The user can be directly reminded of peeping by changing the display content of the screen, and meanwhile, the screen information safety of the user is protected. The change of the screen display content may be followed by active intervention by the user, such as turning off the screen display or changing the screen orientation, etc., to prevent further peeping of the screen information. The screen privacy can be protected while the user is reminded of peeping by changing the display effect of the screen. Changing the display effect of the screen may be manifested as blurring the screen display content, changing the brightness of the screen, etc. The outputting of the prompt information may include outputting voice prompt information, vibration prompt, light prompt, and the like to remind the user of peeping.
Furthermore, the user can set the screen performance when entering the peep-proof screen state according to different use scenes. For example, when a privacy picture is browsed, a person who peeps is detected, and the privacy picture is replaced by a picture which does not contain privacy information and is displayed on a screen. When a user browses the privacy picture, if a person peeps, the privacy picture is replaced by other pictures which do not contain privacy information and displayed on a screen, and the replaced pictures can be pictures which are set by the user in advance or pictures which are loaded by equipment from a network and are similar to the privacy picture browsed by the user. When privacy characters are set to be browsed, peeping by a person is detected, and displayed characters are blurred or the brightness of a screen is adjusted. When a user browses the privacy words, the privacy words displayed on the screen are subjected to fuzzy processing or the brightness of the screen is dimmed, so that the privacy words displayed on the screen cannot be seen clearly by other people, and the purpose of protecting the privacy of the screen is achieved.
In the embodiment of the application, entering the peep-proof screen state may include changing display content of the screen, changing a display effect of the screen, or outputting prompt information, so as to remind a user of peeping while preventing further peeping of screen privacy, thereby effectively protecting information security of the user.
Further, the changing the display content of the screen may include:
popping up a warning window;
after the popping up of the warning window, the method further comprises:
and within a preset time, closing the peep-proof screen detection function.
Specifically, the preset duration may be flexibly set by the user according to the need. And under the condition that the screen is judged to be peeped, the screen reminds the user in a mode of popping up a warning window. After the warning window pops up to remind the user, the user can set that the peep-proof screen detection function is not started within the preset time. The equipment receives preset time length set by a user, closes the peep-proof screen detection function within the preset time length, and does not execute the step 101. After the preset time length, whether the peep-proof screen detection function is started or not is judged, and if yes, the step 101 is executed. The preset duration may have a default value and is reset by the user after the warning window is popped up. And when detecting that the number of pupils in the monitoring range of the camera is larger than a first threshold value, popping up a warning window and a preset time length setting window. For example, the preset time is default to 10 minutes, when the user watches the video, the user detects that someone peeps, a warning window and a preset time setting window pop up, the user sets the preset time to 15 minutes, and then the peep-proof screen detection function is turned off within 15 minutes. And after 15 minutes, judging whether the peep-proof screen detection function is started or not, and starting the peep-proof screen detection function under the condition that the peep-proof screen detection function is determined to be required to be started, and executing the step of acquiring the number of pupils within the range of the camera.
In the embodiment of the application, the peep-proof screen detection function is closed within the preset time after the warning window is popped up, so that the memory space can be saved, and the energy consumption can be reduced.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating another information security management method according to an embodiment of the present disclosure. As shown in fig. 2, the information security management method includes the following steps.
And 201, detecting whether the first application program running in the foreground belongs to a target application program set, and if so, starting a peep-proof screen detection function.
In the embodiment of the application, whether the peep-proof screen detection function is started or not is judged by judging whether the first application program currently running in the foreground belongs to the target application program set or not. The first application program refers to an application program which is currently operated in the foreground, displayed in a display window of a screen and directly interacted with a user, and the target application program set is a set of application programs which contain user privacy information and need to be peeped, such as a payment application, a chat communication application and the like. The user can set the application program which is not wanted to be peeped by people in the using process as the target application program according to the using condition, and the target application program is added into the target application program set. When a first application program running in the foreground belongs to the target application program set, information related to the first application program is displayed in a display window of a screen, and in order to prevent privacy disclosure, a peep-proof screen detection function needs to be started. And under the condition that the first application program does not belong to the target application program set, the screen display information is irrelevant to the target application program, and the peep-proof screen detection function can not be started. Therefore, the peep-proof screen detection function is started under the condition that the first application program running in the foreground is detected to belong to the target application program set.
For example, the payment application is set as a target application program, when the payment application runs in the foreground, the screen may display the identity information or the property information and other privacy information of the user, and therefore when the application program running in the foreground is detected to be the payment application, in order to prevent the privacy of the user from being leaked, the peep-proof screen detection function needs to be started, and the user information is prevented from being peeped. However, when the payment application runs in the background or does not run, the content displayed on the screen is irrelevant to the privacy information such as the identity information and property information of the user in the payment application, so that the peep-proof screen detection function does not need to be started.
202, acquiring the number of pupils in the range of the camera under the condition that the electronic device starts the peep-proof screen detection function.
The specific implementation of step 202 may refer to the specific description of step 101 shown in fig. 1, and is not described herein again.
And 203, determining a first threshold corresponding to the first application according to the corresponding relation between the target application set and the pupil number threshold set.
Specifically, under the condition that it is detected that the first application running in the foreground belongs to the target application set, a first threshold corresponding to the first application is determined according to a correspondence between the target application set and a pupil number threshold set, where the target application set includes at least two applications, the pupil number threshold set includes at least two pupil number thresholds, two applications with different privacy protection levels exist in the at least two applications, and mapping from the at least two pupil number thresholds to the privacy protection levels of the at least two applications is a monotonic decreasing function.
The corresponding relationship between the target application program set and the pupil number threshold value set may be stored in a nonvolatile memory of the electronic device in advance, and when step 203 needs to be executed, the electronic device may obtain the corresponding relationship from the target application program set to the pupil number threshold value set from the nonvolatile memory, and obtain the first threshold value corresponding to the first application program according to the corresponding relationship from the target application program set to the pupil number threshold value set. The correspondence of the set of target applications to the set of pupil number thresholds may be stored in a non-volatile memory in the form of a mapping table. For example, as shown in table 1, table 1 is a mapping table from a target application set to a pupil number threshold set disclosed in the embodiment of the present application.
TABLE 1
Figure BDA0002906759640000101
The higher the privacy protection level of the target application, the smaller its corresponding pupil number threshold. As shown in table 1, the protection level of the application a is level 1, and the corresponding threshold of the number of pupils is 8; the protection level of the application program B is 2 levels, and the corresponding pupil number threshold is 6; the protection level of the application program C is 3 levels, and the corresponding pupil number threshold is 4; the protection level of application D is level 4, and the corresponding threshold for the number of pupils is 2. When the first application running in the foreground is application a, the corresponding first threshold is 8. As can be seen from table 1, after the electronic device obtains the first application program currently running in the foreground, the first threshold corresponding to the first application program can be obtained through the mapping table from the target application program set to the pupil number threshold set in table 1, and whether the screen is peeped or not is determined by using the first threshold corresponding to the first application program. For example, if the first application running in the foreground is application B and the corresponding first threshold is 6, the peep-proof screen mode is entered when the number of pupils in the acquired camera monitoring range is greater than 6.
And 204, entering a peep-proof screen state under the condition that the number of the pupils is larger than the first threshold value.
The specific implementation of step 204 may refer to the specific description of step 102 shown in fig. 1, and is not described herein again.
In the embodiment of the application, the peep-proof screen detection function is started under the condition that the application program containing the privacy information and needing to start the peep-proof screen detection function runs in the foreground, so that the privacy safety of a user can be effectively protected, the memory space is saved, and the energy consumption is reduced. Meanwhile, different first threshold values are set for different application programs, the first threshold values can be determined according to the application programs running in the foreground in the using process of the user, and the information safety of the user can be better protected.
Optionally, in a possible implementation manner, before step 203, the information security management method further includes the following steps:
and judging whether the brightness of the current environment is greater than a second threshold value, if so, starting a peep-proof screen detection function.
The ambient brightness can be used as a standard for judging whether to start the peep-proof screen detection function, and the peep-proof screen detection function is started under the condition that the brightness of the environment where the electronic equipment is located is greater than the second threshold value. The second threshold is a brightness value, the pupil in the image collected by the camera can be identified when the brightness of the environment is greater than the second threshold, and the quality of the image collected by the camera is poor and the ability of identifying the pupil in the image collected by the camera is low when the brightness of the environment is less than the second threshold. The second threshold value can be set according to the situation, so that the pupils in the image acquired by the camera can be clearly identified under the condition that the brightness of the environment is greater than the second threshold value, and the accurate pupil number is obtained. Under the condition that the ambient brightness is lower than the second threshold, the quality of the image acquired by the camera is poor, the identification capability of the pupil in the image acquired by the camera is low, and the number of the acquired pupils is inaccurate. Therefore, under the condition that the brightness of the environment is smaller than the second threshold value, the peep-proof screen detection function does not need to be started.
It can be understood that when the electronic device is in a dark environment, the image collected by the camera is not clear and has poor quality, pupils cannot be identified from the image collected by the camera, and the number of the accurate pupils in front of the screen cannot be obtained, so that the peep-proof screen detection function does not need to be started. Under the condition that the brightness of the environment where the electronic equipment is located is larger than the second threshold value, the camera can acquire clear pupil images, and it is guaranteed that pupils can be identified from the images acquired by the camera, so that the number of the pupils can be monitored.
Specifically, the brightness of the current environment can be obtained by sensing the intensity of the external environment light through a light sensor of the electronic device. Under the environment that light is sufficient, the luminance of environment is big, and the image of camera collection, under the environment that light is not enough, the luminance of environment is little, and the image of camera collection is unclear, can't distinguish the pupil therefrom, even open the camera under this kind of circumstances and acquire the image and also can't realize peep-proof screen detection function, consequently under the circumstances that ambient brightness is less than the second threshold value, do not open peep-proof screen detection function. For example, under the condition that the user uses the mobile phone after turning off the light in a room at night, pupils cannot be identified from the image collected by the camera due to insufficient ambient brightness, and the user does not need to worry about peeping the screen in the room environment, so that the peep-proof screen detection function does not need to be started.
In this application embodiment, when ambient brightness is greater than the second threshold value, the camera can catch the pupil image's in the monitoring range under the condition, opens peep-proof screen and detects the function, can practice thrift the memory space, reduces the power consumption.
Optionally, please refer to fig. 3, and fig. 3 is a schematic flowchart of another information security management method according to an embodiment of the present application. As shown in fig. 3, the information security management method includes the following steps.
301, display information of the screen display interface is acquired.
In the embodiment of the application, the display information of the screen display interface is acquired, and whether the peep-proof screen detection function is started or not is judged by taking the display information of the screen display interface as a basis.
302, determining whether the display information contains privacy information. If yes, starting the peep-proof screen detection function.
Information that the user does not want or is not convenient to see and know by others, such as confidential documents, personal identification information, and the like, is set as the private information. When the display information of the screen display interface contains the privacy information, the peep-proof screen detection function is started, the privacy information of the user is prevented from being peeped, and the privacy safety of the user is protected. In the case that the private information can be opened and viewed by using a plurality of different application programs, no matter what application program the user uses to view the private information, as long as the screen display interface displays information related to the private information, the peep-proof screen detection function is started. And when the display information of the screen display interface does not contain the privacy information, the peep-proof screen detection function is not started.
For example, a user sets a confidential document as private information, the user can view the commercial confidential document by using office software or a browser, the content of the confidential document is displayed on the screen display interface, and in order to prevent the confidential document from being leaked due to peeping by other people, the peep-proof screen detection function is started whether the confidential document is viewed by using the office software or the browser.
Further, the target application program in the target application program set may be set. In the foreground operation process of the target application program, the displayed interface does not always contain privacy information, in the foreground operation process of the target application program, the content displayed on one part of the interface is irrelevant to the privacy information of the user, and the privacy information of the user is displayed on the other part of the interface. The interface displayed in the running process of the target application program is divided into a privacy interface and a non-privacy interface, the privacy interface is an interface for displaying the user privacy information in the running process of the target application program, and the non-privacy interface is an interface for displaying the content of the target application program irrelevant to the user privacy information in the running process of the target application program. Under the condition that the target application program runs in the foreground, whether the screen displays a privacy interface or not is further judged, if the screen displays the privacy interface, the display information of the privacy interface is judged to contain privacy information, and a peep-proof screen detection function is started; and if the non-privacy interface displayed on the screen does not contain the privacy information, judging that the display information of the privacy interface does not contain the privacy information, and not starting the peep-proof screen detection function.
For example, the content displayed in the home page interface in the payment application does not include privacy information, so the home page of the payment application belongs to a non-privacy interface, but the display content of the interfaces such as the billing interface, the personal setting interface, the chat recording interface, the transfer interface and the like all include user privacy information and belong to a privacy interface. When the payment application is operated in a foreground, if the screen displays a home page interface, the peep-proof screen detection function is not started, and if the screen displays a bill interface, a personal setting interface, a chat recording interface, a transfer interface and other interfaces, the peep-proof screen detection function is required to be started. 303, acquiring the number of pupils within the range of the camera when the electronic device starts the peep-proof screen detection function.
And 304, entering a peep-proof screen state under the condition that the number of pupils is larger than a first threshold value.
The specific implementation of step 303 and step 304 may refer to the specific description of step 101 and step 102 shown in fig. 1, and is not described herein again.
In the embodiment of the application, the display information of the screen display interface is firstly acquired, the peep-proof screen detection function is started under the condition that the screen display information contains the privacy information, the camera is started, the pupil number in the monitoring range of the camera is acquired, the privacy information is protected, and the peep-proof screen detection function is started under the condition that the display information of the screen display interface contains the privacy information, so that the privacy safety of a user is effectively protected. Under the condition that the peep-proof screen detection function does not need to be started, the peep-proof screen detection function is closed, and the camera is in a closed state. The camera does not need to be kept in an open state to acquire images, so that the memory space is saved, and the energy consumption is reduced.
Referring to fig. 4, fig. 4 is a schematic flowchart illustrating another information security management method according to an embodiment of the present application. As shown in fig. 4, the information security management method includes the following steps.
401, acquiring the number of pupils within the range of the camera when the electronic device starts the peep-proof screen detection function.
The specific implementation of step 401 may refer to the specific description of step 101 shown in fig. 1, and is not described herein again.
402, detecting whether the duration of the number of pupils in the monitoring range of the camera, which is greater than the first threshold, is greater than a third threshold, if so, executing step 403, and otherwise, executing step 401.
The third threshold is a period of time, and can be flexibly set by a user according to a requirement, such as 1 second, 2 seconds, 3 seconds, or other time, which is not limited herein. When the condition that the duration that the number of pupils in the monitoring range of the camera is larger than the first threshold is larger than the third threshold is detected, the condition that people watch the screen except for the user is shown, the screen is peeped, and the screen enters the peep-proof screen state. Under the condition that the duration that the number of pupils in the monitoring range of the camera is greater than the first threshold is less than the third threshold, the situation that others peep the screen intentionally is understood that the screen peeping condition is not met. For example, when the third threshold is 2 seconds, the timing is started from the fact that the number of pupils in the monitoring range of the camera is detected to be larger than the first threshold, and the number of pupils is still larger than the first threshold in 2 seconds, which indicates that in the 2 seconds, except for the user, someone is watching the screen, and the screen is peeped and enters the peep-proof screen state. And under the condition that the third threshold is 2 seconds, timing is started from the fact that the number of the pupils in the monitoring range of the camera is detected to be larger than the first threshold, and the number of the pupils in the monitoring range of the camera is smaller than the first threshold within 2 seconds, which indicates that a person may not see a screen at all and does not peep intentionally, a peeping behavior does not exist, the screen displays normally, and step 401 is continuously executed to continuously detect whether the screen is peeped or not.
And 403, entering a peep-proof screen state.
The specific implementation of step 403 may refer to the specific description of step 101 shown in fig. 1, and is not described herein again.
In the embodiment of the application, when the duration that the number of pupils in the monitoring range of the detection camera is greater than the first threshold is greater than the third threshold, it indicates that the screen is peeped, and the screen enters a peep-proof screen state. Whether the screen is peeped or not can be accurately judged by detecting whether the duration of the time that the number of pupils in the monitoring range of the camera is larger than the first threshold is larger than a third threshold.
Optionally, please refer to fig. 5, and fig. 5 is a schematic flowchart of another information security management method according to an embodiment of the present application. As shown in fig. 5, the information security management method includes the following steps.
501, acquiring the number of pupils in the range of the camera when the electronic device starts the peep-proof screen detection function.
The specific implementation of step 501 may refer to the specific description of step 101 shown in fig. 1, and is not described herein again.
502, under the condition that the number of pupils is greater than the first threshold value, acquiring the pupil information within the monitoring range of the camera.
In the embodiment of the application, the pupil information is acquired to determine the identity of the person watching the screen at present. Pupil images are extracted from the images collected by the camera, and the pupil images are analyzed to obtain corresponding pupil information. The pupil information may include the size, shape, and corresponding iris information of the pupil.
503, determining whether the user corresponding to the pupil information is a trusted user, if yes, executing step 501, and if not, executing step 504.
The trusted user refers to a user who has authority to view the display content of the equipment, and the display information of the screen watching interface and the screen viewing display interface is not peeped, so that the screen peeping condition is not met when the user is trusted to watch the screen. And under the condition that the number of the obtained pupils in the camera monitoring range is larger than a first threshold value, detecting whether the user corresponding to the pupils in the camera monitoring range is a trusted user. When it is detected that the user corresponding to the pupil in the monitoring range of the camera is not a trusted user, it indicates that the screen is peeped, and step 503 is executed to remind the user of peeping. And when detecting that the user corresponding to the pupil in the monitoring range of the camera is a trusted user, the screen is not peeped, the screen normally displays, and step 501 is continuously executed to continuously detect whether the screen is peeped.
The number of the trusted users can be one or more, and different trusted users can be set for different application scenarios. For example, the user a is a trusted user in a scene where the electronic device plays a video, and is not a trusted user in a scene where the device views a picture. In the case that the device plays a video, the user a watches the screen without peeping, and the screen is not peeped, then step 501 is continuously executed. However, in the scene that the electronic device views the picture, the user a watches the screen and is peeping, which indicates that the screen is peeped, then step 503 is executed.
Specifically, whether the user corresponding to the pupil is a trusted user or not can be identified through an iris identification technology. Iris recognition is the determination of the identity of a user by comparing the similarity between features of iris images. The method comprises the steps of determining the identity requirement of a user by using an iris recognition technology, inputting an iris feature image of a trusted user into a database, obtaining an iris image corresponding to each pupil under the condition that the number of the pupils in the monitoring range of a camera is larger than a first threshold value, carrying out normalization processing on the iris images, and adjusting the size of the iris in the image to be a fixed size. After the iris images with uniform sizes are obtained, the iris images can be processed by brightness, contrast, smoothness and the like so as to improve the accuracy of iris recognition. Extracting the iris characteristics from the processed iris image to obtain an iris characteristic image. And matching the iris characteristic image with the iris characteristic image of the trusted user in the database to determine whether the user corresponding to the iris is the trusted user, if the matching is successful, indicating that the user corresponding to the iris and the pupil is the trusted user, and if the matching is unsuccessful, indicating that the user corresponding to the iris and the pupil is not the trusted user.
503, enter the peep-proof state.
And under the condition that the peeping of a person is determined, entering a peeping-proof screen state to remind the user that the person peeps and protect the screen privacy of the user.
In the embodiment of the application, under the condition that the user corresponding to the pupil information in the monitoring range of the camera is not a trusted user, the screen is peeped and enters a peep-proof screen state, and the watching of the trusted user is not judged to be peeping. Whether the user corresponding to the pupil information in the camera monitoring range is a trusted user or not can be judged, so that the accuracy of judging that the screen is peeped can be improved, and the privacy safety of the user can be effectively protected.
Referring to fig. 6, fig. 6 is a schematic flowchart illustrating another information security management method according to an embodiment of the present application. As shown in fig. 6, the information security management method includes the following steps.
601, judging whether the peep-proof screen detection function is started. If yes, go to step 602, otherwise go to step 609.
Before the step of acquiring the number of pupils in the monitoring range of the camera is executed, whether the peep-proof screen detection function is started or not is judged, and under the condition that the peep-proof screen detection function is determined to be started, the step of acquiring the number of pupils in the monitoring range of the camera is executed to start monitoring the number of pupils in front of the screen. Under the condition that the peep-proof screen detection function is not required to be started, the peep-proof screen detection function is closed, the step of acquiring the number of pupils in the monitoring range of the camera is not executed, and the camera is in a closed state.
Specifically, the judgment of whether to start the peep-proof screen detection function can be judged according to a set rule, and the judgment can also be in response to the operation of a user. Judging whether to start the peep-proof screen detection function according to the set rule means that the equipment automatically starts the peep-proof screen detection function under the condition that the set condition is met. The operation responding to the user is to judge whether to start the peep-proof screen detection function according to the operation of the user, and the user can manually start or close the peep-proof screen detection function according to the requirement. The user can open or close the peep-proof screen detection function through modes such as voice operation, key operation and gesture operation.
And 602, starting the camera to acquire the number of pupils in the monitoring range of the camera.
603, determining whether the pupil number is larger than a first threshold. If yes, go to step 604, otherwise go to step 602.
And 604, judging whether the peeping condition is met. If yes, go to step 605, otherwise go to step 602.
Under the condition that the number of the pupils is larger than the first threshold value, whether a screen peeping condition is met or not and whether the screen is peeped or not are further judged, and under the condition that the screen peeping condition is determined to be met, a screen peeping prevention state is entered to remind a user of peeping so as to protect privacy safety of the user. If the peep condition is not satisfied, it indicates that the screen is not peeped, and the screen does not enter the peep-proof state, and step 602 is continued.
605, a warning window pops up.
And 606, judging whether the user closes the warning window. If yes, go to step 607, otherwise go to step 608.
607, the screen display is normal, and the peep-proof screen detection function is closed in a specific time.
And 608, changing the screen display effect.
609, end.
The implementation of each method in fig. 6 can refer to the method embodiments shown in fig. 1 to fig. 5, and is not described herein again.
In public areas with dense population, such as public offices, subways, buses and the like, screens of electronic equipment need to be prevented from being peeped. The user uses the information security management method shown in fig. 6 to prevent the device screen from being peeped, and when the privacy of the device screen is protected, after the user device is started, the user device first sets the peep-proof screen detection function, including setting the application, privacy information, trusted user and the maximum pupil number of the allowed gaze screen, which need to start the peep-proof screen detection function.
In step 601, when one or more of the following conditions are met, the peep-proof screen detection function is turned on.
(1) The application that needs to open peep-proof screen detection function runs in the foreground.
The application requiring the function of opening the peep-proof screen detection is an application that a user does not want to be peeped by others in the using process, and is set by the user, such as an instant messaging application of chat and communication.
(2) The brightness of the environment where the current equipment is located meets the requirement.
The requirement that the brightness of the environment where the current device is located meets the requirement means that the camera can capture a clear pupil image in the environment, or the device can identify the number of pupils in the image from the image captured by the camera.
(3) The information displayed on the screen includes private information.
The privacy information is information which the user does not want or is inconvenient to see by people, and can be in the form of files, pictures and the like, and the user can set the files, pictures or other privacy information on the equipment.
Under the condition that one or more conditions are met, the equipment automatically starts the peep-proof screen detection function, and when the conditions are not met, the peep-proof screen detection function is not started.
In step 604, the peep condition is satisfied when the following condition is satisfied.
(1) And detecting that the duration of the pupil number in the monitoring range of the camera which is larger than the first threshold is larger than a set value.
(2) The user looking into the screen is not a trusted user.
For example, the user a sets the WeChat as an application that needs to start the peep-proof screen detection function, sets the user B as a trusted user, and sets the number of pupils of the maximum allowable gazing screen to 2. When the user A uses WeChat chat in an open office, the condition (1) and the condition (2) for judging whether to start the peep-proof screen detection function are met, and then the peep-proof screen detection function is started. After the peep-proof screen detection function is started, the device continuously acquires the number of pupils in the monitoring range of the camera through the camera, and when only the user A watches the screen, the acquired number of pupils is 2, and the step 602 is continuously executed. When the user B is also peeping the screen, the number of the acquired pupils is greater than 2, and since the user B is a trusted user, the peeping condition is not satisfied, and the step 602 is continuously executed. When the user C peeks at the screen, the obtained number of pupils is larger than the set maximum number of pupils of the operating watching screen, and then the peeking duration of the user C is further detected. When the peeping time of the user C is longer than a set value, determining that the user C has a peeping behavior, meeting the peeping condition, and popping up a warning window to remind the user A that the screen is peeped. When the peeking time of the user C is less than the set value, the user C is considered to have no intention to see the screen, the user C does not intentionally peek, and the screen peeking condition is not satisfied, and then the step 602 is executed. The user A receives the prompt, observes the surrounding environment, manually closes the warning window and does not start the peep-proof screen detection function within a set specific time length under the condition that the user C is not peeped or the user A allows the user C to watch the screen, and normally displays the screen and closes the peep-proof screen detection function within the specific time length set by the user. After a certain time, the device judges whether to start the peep-proof screen detection function again. Or the user A considers that the watching of the user C belongs to peeping behaviors, and the screen can be prevented from being further peeped in a mode of closing screen display or adjusting screen brightness and the like.
In the embodiment of the application, under the condition that certain conditions are met, the peep-proof screen detection function is started, the image of the picture in front of the screen is acquired through the camera, and the number of pupils watching the screen is acquired. And judging whether the peep risk exists or not according to the number of the pupils. And when the number of the pupils is larger than the maximum number of the pupils which are allowed to watch the screen, further judging whether the screen peeping condition is met. When the peeping condition is met, the user is reminded of peeping the screen in a mode of popping up a warning window. Under the condition that the peeping behavior judged by the equipment is allowed by the user, the user closes the warning window and does not start the peeping-proof screen detection function within a set specific time, and under the condition that the peeping behavior judged by the equipment is not allowed by the user, the screen display is changed to prevent the screen privacy from being further peeped. Whether the screen is peeped or not is accurately judged, the privacy of a user is effectively protected on the premise that the screen display and the screen function of the screen display are not influenced, and meanwhile the hardware cost is reduced.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an information security management apparatus according to an embodiment of the present disclosure. The information security management apparatus is applied to an electronic device, and as shown in fig. 7, the information security management apparatus 70 includes a first obtaining module 701 and a peep-proof screen module 702.
The first obtaining module 701 is configured to obtain the number of pupils within a monitoring range of the camera when the electronic device starts the peep-proof screen detection function.
The peep-proof screen module 702 is configured to enter a peep-proof screen state when the number of pupils is greater than a first threshold.
Optionally, the screen privacy protecting apparatus 70 further includes an opening module 703 for opening the peep-proof screen detection function.
Optionally, the information security management apparatus 70 further includes a first detection module 704, configured to detect whether the first application running in the foreground belongs to the target application set.
Optionally, the information security management apparatus 70 further includes a first determining module 705, configured to determine whether the brightness of the current environment is greater than a second threshold.
Optionally, the information security management apparatus 70 further includes a second obtaining module 706, configured to obtain display information of the screen display interface.
Optionally, the information security management apparatus 70 further includes a second determining module 707, configured to determine whether the display information of the screen display interface includes privacy information.
Optionally, the information security management apparatus 70 further includes a second detecting module 708, configured to detect whether a duration of the number of pupils in the camera monitoring range that is greater than the first threshold is greater than a third threshold.
Optionally, the information security management apparatus 70 further includes a third obtaining module 709, configured to obtain pupil information within a monitoring range of the camera.
Optionally, the information security management apparatus 70 further includes a third determining module 710, configured to determine whether the user corresponding to the pupil information is a trusted user.
With regard to the information security management apparatus 70 in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be described in detail here.
In the embodiment of the application, whether the screen is peeped is judged according to the number of the pupils on the front of the screen, and the screen enters the peep-proof state under the condition that the number of the pupils is larger than the first threshold, so that the privacy and safety of a user can be effectively protected on the premise that the screen display effect and the screen function are not influenced, and the hardware cost is reduced.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 8, the electronic device 80 includes a processor 801 and a memory 802. The processor 801 and the memory 802 may be connected to each other by a communication bus 803. The communication bus 803 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 803 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 8, but this is not intended to represent only one bus or type of bus. The memory 802 is used for storing a computer program comprising program instructions, and the processor 801 is configured to call the program instructions, the program comprising instructions for performing some or all of the steps of the methods shown in fig. 1 to 6.
The electronic device 80 further comprises a camera module 804, and the camera module 804 can be a front camera, a rear camera and a combination of the front camera and the rear camera.
The processor 801 may be a general purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs according to the above schemes.
The Memory 802 may be a Read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these. The memory may be self-contained and coupled to the processor via a bus. The memory may also be integral to the processor.
In addition, the electronic device 80 may further include general components such as a communication interface, an antenna, and the like, which are not described in detail herein.
Embodiments of the present application also provide a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute some or all of the steps of any one of the information security management methods described in the method embodiments shown in fig. 1 to 6.
It should be understood that the application of the present application is not limited to the above examples, and that modifications or changes may be made by those skilled in the art based on the above description, and all such modifications and changes are intended to fall within the scope of the appended claims.

Claims (12)

1. An information security management method is applied to electronic equipment, and is characterized by comprising the following steps:
acquiring the number of pupils in the monitoring range of the camera under the condition that the electronic equipment starts the peep-proof screen detection function;
and entering a peep-proof screen state under the condition that the number of the pupils is greater than a first threshold value.
2. The information security management method according to claim 1, wherein the entering into the privacy screen state includes:
changing the display content of the screen;
or changing the display effect of the screen;
or outputting a prompt message.
3. The information security management method according to claim 2, wherein the changing of the display content of the screen includes:
popping up a warning window;
after the popping up of the warning window, the method further comprises:
and within a preset time, closing the peep-proof screen detection function.
4. The information security management method according to claim 1, wherein before the obtaining of the number of pupils in the monitoring range of the camera, the method further comprises:
detecting whether a first application program running in a foreground belongs to a target application program set or not;
and if so, starting the peep-proof screen detection function.
5. The information security management method according to claim 4, wherein the method further comprises:
under the condition that the first application program running in the foreground is detected to belong to the target application program set, determining a first threshold corresponding to the first application program according to a corresponding relation between the target application program set and a pupil number threshold set, wherein the target application program set comprises at least two application programs, the pupil number threshold set comprises at least two pupil number threshold values, two application programs with different privacy protection levels exist in the at least two application programs, and mapping from the at least two pupil number threshold values to the privacy protection levels of the at least two application programs is a monotone decreasing function.
6. The information security management method according to claim 1, wherein before the obtaining of the number of pupils in the monitoring range of the camera, the method further comprises:
judging whether the brightness of the current environment is greater than a second threshold value;
and if so, starting the peep-proof screen detection function.
7. The information security management method according to any one of claims 1 or 2, wherein before the acquiring the number of pupils in the monitoring range of the camera, the method further comprises:
acquiring display information of a screen display interface;
judging whether the display information contains privacy information;
and if so, starting the peep-proof screen detection function.
8. The information security management method according to claim 1, wherein in a case where the number of pupils is greater than a first threshold, the method further comprises:
detecting whether the duration of the number of pupils in the monitoring range of the camera, which is greater than the first threshold, is greater than a third threshold;
and if so, executing the step of entering the peep-proof screen state.
9. The information security management method according to claim 1, wherein in a case where the number of pupils is greater than a first threshold, the method further comprises:
acquiring pupil information within a camera monitoring range;
judging whether the user corresponding to the pupil information is a trusted user or not;
and if not, executing the step of entering the peep-proof screen state.
10. An information security management device applied to an electronic device, comprising:
the first acquisition module is used for acquiring the number of pupils in the monitoring range of the camera under the condition that the electronic equipment starts the peep-proof screen detection function;
and the peep-proof screen module is used for entering a peep-proof screen state under the condition that the number of the pupils is greater than a first threshold value.
11. An electronic device comprising a processor and a memory for storing one or more programs configured for execution by the processor, the programs comprising instructions for performing the method of any of claims 1-9.
12. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the method according to any one of claims 1 to 9.
CN202110073540.2A 2021-01-20 2021-01-20 Information security management method and device Pending CN112818418A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110073540.2A CN112818418A (en) 2021-01-20 2021-01-20 Information security management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110073540.2A CN112818418A (en) 2021-01-20 2021-01-20 Information security management method and device

Publications (1)

Publication Number Publication Date
CN112818418A true CN112818418A (en) 2021-05-18

Family

ID=75858414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110073540.2A Pending CN112818418A (en) 2021-01-20 2021-01-20 Information security management method and device

Country Status (1)

Country Link
CN (1) CN112818418A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536402A (en) * 2021-07-19 2021-10-22 军事科学院系统工程研究院网络信息研究所 Peep-proof display method based on front camera shooting target identification

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060210167A1 (en) * 2005-03-15 2006-09-21 Omron Corporation Display device, control method thereof, electronic device including display device, display device control program, and recording medium on which display device control program is recorded
CN103377355A (en) * 2012-04-28 2013-10-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and peeping proof method and device thereof
CN106156663A (en) * 2015-04-14 2016-11-23 小米科技有限责任公司 A kind of terminal environments detection method and device
CN106650367A (en) * 2016-09-30 2017-05-10 维沃移动通信有限公司 Private content display method and mobile terminal
CN107077217A (en) * 2016-09-28 2017-08-18 达闼科技(北京)有限公司 For the control method of electronic equipment, device and electronic equipment
CN107241193A (en) * 2017-06-12 2017-10-10 广东欧珀移动通信有限公司 Verification method, electronic installation and computer-readable recording medium
CN107992730A (en) * 2017-11-28 2018-05-04 宇龙计算机通信科技(深圳)有限公司 A kind of screen message guard method and device
US20200034575A1 (en) * 2016-11-04 2020-01-30 Shenzhen University Screen privacy protection method and system for mobile terminal device
CN111801700A (en) * 2019-08-28 2020-10-20 深圳海付移通科技有限公司 Method for preventing peeping in payment process and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060210167A1 (en) * 2005-03-15 2006-09-21 Omron Corporation Display device, control method thereof, electronic device including display device, display device control program, and recording medium on which display device control program is recorded
CN103377355A (en) * 2012-04-28 2013-10-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and peeping proof method and device thereof
CN106156663A (en) * 2015-04-14 2016-11-23 小米科技有限责任公司 A kind of terminal environments detection method and device
CN107077217A (en) * 2016-09-28 2017-08-18 达闼科技(北京)有限公司 For the control method of electronic equipment, device and electronic equipment
CN106650367A (en) * 2016-09-30 2017-05-10 维沃移动通信有限公司 Private content display method and mobile terminal
US20200034575A1 (en) * 2016-11-04 2020-01-30 Shenzhen University Screen privacy protection method and system for mobile terminal device
CN107241193A (en) * 2017-06-12 2017-10-10 广东欧珀移动通信有限公司 Verification method, electronic installation and computer-readable recording medium
CN107992730A (en) * 2017-11-28 2018-05-04 宇龙计算机通信科技(深圳)有限公司 A kind of screen message guard method and device
CN111801700A (en) * 2019-08-28 2020-10-20 深圳海付移通科技有限公司 Method for preventing peeping in payment process and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536402A (en) * 2021-07-19 2021-10-22 军事科学院系统工程研究院网络信息研究所 Peep-proof display method based on front camera shooting target identification

Similar Documents

Publication Publication Date Title
US11093731B2 (en) Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems
US9870700B2 (en) Method and device for avoiding false alarms in monitoring systems
CN106529339A (en) Picture display method, device and terminal
KR20080106426A (en) Personal identification device and personal identification method
EP2336949A1 (en) Apparatus and method for registering plurality of facial images for face recognition
CN107294915B (en) Image acquisition method, system and terminal
CN106296665B (en) Card image fuzzy detection method and apparatus
CN102509053A (en) Authentication and authorization method, processor, equipment and mobile terminal
CN110443016A (en) Information leakage preventing method, electronic device and storage medium
CN110619239A (en) Application interface processing method and device, storage medium and terminal
CN110597426A (en) Bright screen processing method and device, storage medium and terminal
CN112818418A (en) Information security management method and device
CN109828715B (en) Screen recording method and device
JP2002304651A (en) Device and method for managing entering/leaving room, program for executing the same method and recording medium with the same execution program recorded thereon
KR101000130B1 (en) Mobile terminal capable face recognition and method for face recognition thereof
CN111737774B (en) Privacy peep-proof method and intelligent equipment
CN113552989A (en) Screen recording method and device and electronic equipment
CN103902866A (en) File protection system and method
US20200026866A1 (en) Method and device for covering private data
CN111639592A (en) Electronic display screen anti-photographing system and method
CN117037270A (en) Screen anti-shooting system and method based on image processing
JP2009156948A (en) Display control device, display control method, and display control program
CN110134565A (en) Environment light detection method and device
WO2021092769A1 (en) Security protection method and device, mobile terminal, and storage medium
CN111737775A (en) Privacy peep-proof method and intelligent equipment based on user eyeball tracking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210518