Nothing Special   »   [go: up one dir, main page]

CN104537289A - Method and device for protecting intended target in terminal device - Google Patents

Method and device for protecting intended target in terminal device Download PDF

Info

Publication number
CN104537289A
CN104537289A CN201410796212.5A CN201410796212A CN104537289A CN 104537289 A CN104537289 A CN 104537289A CN 201410796212 A CN201410796212 A CN 201410796212A CN 104537289 A CN104537289 A CN 104537289A
Authority
CN
China
Prior art keywords
application file
file folder
face
default application
intended target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410796212.5A
Other languages
Chinese (zh)
Inventor
米宏伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leshi Zhixin Electronic Technology Tianjin Co Ltd filed Critical Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority to CN201410796212.5A priority Critical patent/CN104537289A/en
Publication of CN104537289A publication Critical patent/CN104537289A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a method and device for protecting an intended target in a terminal device and belongs to the technical field of electronic communication. The method includes the steps that an instruction for opening a preset application folder is acquired, wherein the intended target is stored in the preset application folder; a human face image is collected and human face identification is conducted; when identification is successful, the preset application folder is opened, and the intended target in the preset application folder is displayed. The device comprises an acquisition module, a processing module and a display module. After the instruction for opening the preset application folder is acquired, the human face image is collected, human face identification is conducted, and after identification is successful, the preset application folder is opened, and the intended target in the preset application folder is displayed. The intended target in the terminal device can be protected and the functions of the terminal device are increased.

Description

The method and apparatus of intended target in protection terminal device
Technical field
The present invention relates to technical field of electronic communication, be specifically related to a kind of method and apparatus protecting intended target in terminal device.
Background technology
Along with the development of electronic communication, the function of the terminal devices such as TV, mobile phone, computing machine from strength to strength, can install various application software on the terminal device, realizes various application (such as chat, play, do shopping, transfer accounts and remit money).And for some application and the file etc. on terminal device, user does not wish that other users use or see.Such as: for the game on terminal device, user does not wish that children open object for appreciation; For the classified document on terminal device, user does not wish that other users see.But current terminal device cannot realize above-mentioned functions, function singleness.
Summary of the invention
In order to solve the problem of prior art; the invention provides a kind of method and apparatus protecting intended target in terminal device; after getting the instruction of opening default application file folder; gather facial image, carry out recognition of face, identify successfully; just open default application file folder; the intended target in application file folder is preset in display, can protect the intended target in terminal device, add the function of terminal device.
In order to solve the problem, the invention discloses a kind of method protecting intended target in terminal device, described method comprises:
Obtain the instruction of opening default application file folder; Wherein, intended target is preserved in described default application file folder;
Gather facial image, carry out recognition of face;
When identifying successfully, opening described default application file folder, showing the described intended target in described default application file folder.
Further, carry out recognition of face to comprise:
Extract the face characteristic information in described facial image;
By the described face characteristic information extracted, compare with the face reference feature information prestored, obtain the similarity of described face characteristic information and described face reference feature information;
If the similarity of described face characteristic information and described face reference feature information is greater than default similarity threshold, then determine to identify successfully.
Further, described acquisition also comprises before opening the instruction of default application file folder:
Gather face with reference to image;
Extract described face with reference to the face reference feature information in image;
Described face reference feature information is kept at assigned address.
Further, after obtaining the instruction of opening default application file folder, before gathering facial image, also comprise:
Judge current time whether within the default opening time;
If within the described default opening time, then perform the step of described collection facial image.
Further, before obtaining the instruction of opening default application file folder, also comprise:
The opening time scope that described default application file folder is corresponding is set.
In order to solve the problem, the invention also discloses a kind of device protecting intended target in terminal device, described device comprises:
Acquisition module, for obtaining the instruction of opening default application file folder; Wherein, intended target is preserved in described default application file folder;
Processing module, for gathering facial image, carries out recognition of face;
Display module, for when identifying successfully, opening described default application file folder, showing the described intended target in described default application file folder.
Further, described processing module comprises:
Extraction unit, for extracting the face characteristic information in described facial image;
Comparing unit, for the described face characteristic information that will extract, compares with the face reference feature information prestored, obtains the similarity of described face characteristic information and described face reference feature information;
Determining unit, if be greater than default similarity threshold for the similarity of described face characteristic information and described face reference feature information, then determines to identify successfully.
Further, described device also comprises:
Acquisition module, for before obtaining the instruction of opening default application file folder, gathers face with reference to image;
Extraction module, for extracting described face with reference to the face reference feature information in image;
Preserve module, for described face reference feature information is kept at assigned address.
Further, described device also comprises:
Judge module, for after obtaining the instruction of opening default application file folder, gathers before facial image, judges current time whether within the default opening time;
Notification module, if within the described default opening time, then notifies that described processing module performs the step of described collection facial image.
Further, described device also comprises:
Module is set, for arranging opening time scope corresponding to described default application file folder.
The method and apparatus of intended target in protection terminal device provided by the invention: after getting the instruction of opening default application file folder; gather facial image; carry out recognition of face; identify successfully; just open default application file folder; the intended target in application file folder is preset in display, can protect the intended target in terminal device, add the function of terminal device.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms a part of the present invention, and schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of method flow diagram protecting intended target in terminal device that the embodiment of the present invention one provides;
Fig. 2 is a kind of method flow diagram protecting intended target in terminal device that the embodiment of the present invention two provides;
Fig. 3 is the apparatus structure schematic diagram of intended target in the first protection terminal device of providing of the embodiment of the present invention three;
Fig. 4 is the apparatus structure schematic diagram of intended target in the second protection terminal device of providing of the embodiment of the present invention three;
Fig. 5 is the apparatus structure schematic diagram of intended target in the third protection terminal device of providing of the embodiment of the present invention three;
Fig. 6 is the apparatus structure schematic diagram of intended target in the first protection terminal device of providing of the embodiment of the present invention four;
Fig. 7 is the apparatus structure schematic diagram of intended target in the second protection terminal device of providing of the embodiment of the present invention four;
Fig. 8 is the apparatus structure schematic diagram of intended target in the third protection terminal device of providing of the embodiment of the present invention four;
Fig. 9 is the apparatus structure schematic diagram of intended target in the embodiment of the present invention four provide the 4th kind protection terminal device.
Embodiment
Describe cooperation drawings and Examples in detail embodiments of the present invention below, by this to the present invention how application technology means solve technical matters and the implementation procedure reaching technology effect can fully understand and implement according to this.
Typically can realize in the configuration of the present embodiment at one, this configuration comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, and the forms such as random access memory (RAM) and/or Nonvolatile memory, as ROM (read-only memory) (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computing machine comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic RAM (DRAM), the random access memory (RAM) of other types, ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc ROM (read-only memory) (CD-ROM), digital versatile disc (DVD) or other optical memory, magnetic magnetic tape cassette, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise non-temporary computer readable media (transitory media), as data-signal and the carrier wave of modulation.
As employed some vocabulary to censure specific components in the middle of instructions and claim.Those skilled in the art should understand, and hardware manufacturer may call same assembly with different noun.This specification and claims are not used as with the difference of title the mode distinguishing assembly, but are used as the criterion of differentiation with assembly difference functionally." comprising " as mentioned in the middle of instructions and claim is in the whole text an open language, therefore should be construed to " comprise but be not limited to "." roughly " refer to that in receivable error range, those skilled in the art can solve the technical problem within the scope of certain error, reach described technique effect substantially.In addition, " couple " word and comprise directly any and indirectly electric property coupling means at this.Therefore, if describe a first device in literary composition to be coupled to one second device, then represent described first device and directly can be electrically coupled to described second device, or be indirectly electrically coupled to described second device by other devices or the means that couple.Instructions subsequent descriptions is for implementing better embodiment of the present invention, and right described description is to illustrate for the purpose of rule of the present invention, and is not used to limit scope of the present invention.Protection scope of the present invention is when being as the criterion depending on the claims person of defining.
Also it should be noted that, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the commodity of a series of key element or system not only comprises those key elements, but also comprise other key elements clearly do not listed, or also comprise by this commodity or the intrinsic key element of system.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within the commodity or system comprising described key element and also there is other identical element.
embodiment one
A kind of method protecting intended target in terminal device that Fig. 1 provides for the embodiment of the present invention one; As shown in Figure 1, it can specifically comprise:
S101: obtain the instruction of opening default application file folder; Wherein, preset in application file folder and preserve intended target.
Particularly; can realize in the application layer of terminal device (TV, mobile phone, computing machine etc.) application program (can be described as application file to press from both sides) that is similar to file, the application program in terminal device, file etc. be wished the intended target of protection is saved in application file folder by modes such as towing, shearing copy.Such as: the application program desktop of TV being not suitable for children is pulled into this application file underedge.
S102: gather facial image, carry out recognition of face.
Particularly, the process gathering facial image is: the interface calling the similar devices such as the camera (camera) that can gather image, opens the first-class similar devices of shooting; First-class similar devices of making a video recording calls and gathers the facial image that image interface collection is positioned at first-class front of making a video recording.
Particularly, before obtaining the instruction of opening default application file folder, can also comprise: gather face with reference to image; Extract face with reference to the face reference feature information in image; Face reference feature information is kept at assigned address.Namely before obtaining the instruction of opening default application file folder, the user having and open default application file folder authority can be pre-set, collection has the facial image of the user opening default application file folder authority as face reference image, the use when carrying out recognition of face.And, having the user opening default application file folder authority can be set to multiple, multiple facial image with the user opening default application file folder authority can be gathered in advance, multiple face is set with reference to image, has corresponding face all to have with reference to the user of image the authority opening default application file folder.
Wherein, assigned address can be the place that user oneself cannot revise, as: under/system/etc/picture.
Particularly, carry out recognition of face can comprise: extract the face characteristic information in facial image; By the face characteristic information extracted, compare with the face reference feature information prestored; If the similarity of face characteristic information and face reference feature information is greater than default similarity threshold, then identify successfully; If the similarity of face characteristic information and face reference feature information is less than or equal to default similarity threshold, then recognition failures.
Wherein, the similarity threshold preset can be arranged according to practical application situation, as being set to 80%, 90% etc.
S103: when identifying successfully, opens default application file folder, and the intended target in application file folder is preset in display, then terminates.
When identifying successfully, open default application file folder, the intended target in application file folder is preset in display, the intended target during user can use default application file to press from both sides.
S104: when recognition failures, points out the first presupposed information, then terminates.
Wherein, the default first information can be: you have no right to open default application file folder etc., can arrange the particular content of the first presupposed information, be not specifically limited this according to practical application situation.
Namely when identifying successfully; just open default application file folder; the intended target in application file folder is preset in display; when recognition failures; only prompting the first presupposed information; do not open default application file folder, do not show the intended target in default application file folder yet, thus the intended target during default application file can be protected to press from both sides.
Such as: application programs such as the desktop of TV being not suitable for the game of children is pulled into application file underedge, the head of a family is arranged only has the head of a family just to have to open application file to press from both sides authority, the facial image typing of self (is namely opened the first-class similar devices of shooting as face with reference to image by the head of a family, facial image by the first-class similar devices collection head of a family self that makes a video recording), children do not have open application file folder authority, the application programs such as the game during application file cannot be used to press from both sides, can prevent the application programs such as game from having a negative impact to children.
The method of intended target in protection terminal device described in the present embodiment; after getting the instruction of opening default application file folder; gather facial image; carry out recognition of face; identify successfully, just open default application file folder, the intended target in application file folder is preset in display; the intended target in terminal device can be protected, add the function of terminal device.Gather face in advance with reference to image, extract face with reference to the face reference feature information in image, face reference feature information is kept at assigned address, use when carrying out recognition of face so that follow-up.
embodiment two
A kind of method protecting intended target in terminal device that Fig. 2 provides for the embodiment of the present invention two; After embodiment one S101 obtains the instruction of opening default application file folder, before S102 gathers facial image, as shown in Figure 2, it can also specifically comprise:
S105: judge current time whether within the default opening time, if within the default opening time, then perform S102; If not within the default opening time, then perform S106.
Particularly, before obtaining the instruction of opening default application file folder, the opening time scope that default application file folder is corresponding can also be set.Only within the opening time, and identify successfully, just can open default application file folder, the intended target in application file folder is preset in display.
Wherein, preset opening time scope to arrange according to practical application situation, can daily arrange, also can arrange by Zhou Jinhang, also can arrange etc. according to the moon, the 18:00-20:00 that opening time scope is every day as arranged, opening time scope also can be set for 10:00-12:00,14:00-15:00 etc. on every Saturdays, can arrange according to practical application situation, this is not limited.
Particularly, after getting the instruction of opening default application file folder, when judging that current time is within the default opening time, then perform collection facial image, carry out recognition of face.Namely current time within the opening time, identify that successfully two conditions all meet and just can open default application file folder, the intended target in application file folder is preset in display.
S106: point out the second presupposed information, then terminate.
Wherein, the second presupposed information can be that current time cannot open application file folder, or current unlatching unsuccessfully etc., do not limit, can arrange according to practical application situation the particular content of presupposed information.
Namely current time is within the default opening time, and after recognition of face success, just opens default application file folder, and the intended target in application file folder is preset in display; When current time is not within the default opening time; no longer carry out recognition of face, only prompting the second presupposed information, do not open default application file folder; the intended target in default application file folder is not shown yet, thus the intended target during default application file can be protected to press from both sides.
The method of intended target in protection terminal device described in the present embodiment; when judging that current time is within the default opening time; carry out recognition of face; identify successfully, just can open default application file folder, the intended target in application file folder is preset in display; make the user only having setting; just can open default application file folder in the time of setting, the intended target in application file folder is preset in display, can increase the security of the intended target in default application file folder further.
embodiment three
A kind of device protecting intended target in terminal device that Fig. 3 provides for the embodiment of the present invention three, this device comprises:
Acquisition module 201, for obtaining the instruction of opening default application file folder; Wherein, preset in application file folder and preserve intended target.
Particularly; can realize in the application layer of terminal device (TV, mobile phone, computing machine etc.) application program (can be described as application file to press from both sides) that is similar to file, the intended target application program in terminal device, file etc. protected in advance is saved in application file folder by modes such as towing, shearing copy.Such as: the application program desktop of TV being not suitable for children is pulled into this application file underedge.
Processing module 202, for gathering facial image, carries out recognition of face.
Particularly, the process gathering facial image is: the interface calling the similar devices such as the camera (camera) that can gather image, opens the first-class similar devices of shooting; First-class similar devices of making a video recording calls and gathers the facial image that image interface collection is positioned at first-class front of making a video recording.
Display module 203, for when identifying successfully, open default application file folder, the intended target in application file folder is preset in display.
Correspondingly, when recognition failures, do not open default application file folder, do not show the intended target in default application file folder yet, thus the intended target during default application file can be protected to press from both sides.
Preferably, see Fig. 4, processing module 202 comprises:
Extraction unit 202a, for extracting the face characteristic information in facial image;
Comparing unit 202b, for the face characteristic information that will extract, compares with the face reference feature information prestored, obtains the similarity of face characteristic information and face reference feature information;
Determining unit 202c, if be greater than default similarity threshold for the similarity of face characteristic information and face reference feature information, then determines to identify successfully.
Wherein, the similarity threshold preset can be arranged according to practical application situation, as being set to 80%, 90% etc.
Preferably, see Fig. 5, this device also comprises:
Acquisition module 204, for before obtaining the instruction of opening default application file folder, gathers face with reference to image;
Extraction module 205, for extracting face with reference to the face reference feature information in image;
Preserve module 206, for face reference feature information is kept at assigned address.
Namely open the instruction of default application file folder in acquisition before, the user that can open default application file folder can being pre-set, gathering the facial image of the user that can open default application file folder as face reference image, the use when carrying out recognition of face.And, the user that can open default application file folder can be set to multiple, multiple facial image can opening the user of default application file folder can be gathered in advance, multiple face is set with reference to image, have the user of corresponding face reference image can open default application file folder.
Wherein, assigned address can be the place that user oneself cannot revise, as: under/system/etc/picture.
The device of intended target in protection terminal device described in the present embodiment; after getting the instruction of opening default application file folder; gather facial image; carry out recognition of face; identify successfully, just open default application file folder, the intended target in application file folder is preset in display; the intended target in terminal device can be protected, add the function of terminal device.Gather face in advance with reference to image, extract face with reference to the face reference feature information in image, face reference feature information is kept at assigned address, use when carrying out recognition of face so that follow-up.
embodiment four
A kind of device protecting intended target in terminal device that Fig. 6 or Fig. 7 provides for the embodiment of the present invention four, on the basis of embodiment three; As shown in Fig. 6 or Fig. 7, described device also comprises:
Judge module 207, for after obtaining the instruction of opening default application file folder, gathers before facial image, judges current time whether within the default opening time.
Particularly, before obtaining the instruction of opening default application file folder, the opening time scope that default application file folder is corresponding can also be set.Only within the opening time, and identify successfully, just can open default application file folder, the intended target in application file folder is preset in display.
Notification module 208, if within the default opening time, then notification handler module 202 performs the step gathering facial image.
Particularly, after getting the instruction of opening default application file folder, when judging that current time is within the default opening time, then perform collection facial image, carry out recognition of face.Namely current time within the opening time, identify that successfully two conditions all meet and just can open default application file folder, the intended target in application file folder is preset in display.
Preferably, see Fig. 8 or Fig. 9, this device also comprises:
Module 209 is set, for arranging opening time scope corresponding to default application file folder.
Wherein, preset opening time scope to arrange according to practical application situation, can daily arrange, also can arrange by Zhou Jinhang, also can arrange etc. according to the moon, the 18:00-20:00 that opening time scope is every day as arranged, opening time scope also can be set for 10:00-12:00,14:00-15:00 etc. on every Saturdays, can arrange according to practical application situation, this is not limited.
The device of intended target in protection terminal device described in the present embodiment; when judging that current time is within the default opening time; carry out recognition of face; identify successfully, just can open default application file folder, the intended target in application file folder is preset in display; make the user only having setting; just can open default application file folder in the time of setting, the intended target in application file folder is preset in display, can increase the security of the intended target in default application file folder further.
Described device describes corresponding with aforesaid method flow, and weak point describing with reference to said method flow process, repeats no longer one by one.
Above-mentioned explanation illustrate and describes some preferred embodiments of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the form disclosed by this paper, should not regard the eliminating to other embodiments as, and can be used for other combinations various, amendment and environment, and can in invention contemplated scope described herein, changed by the technology of above-mentioned instruction or association area or knowledge.And the change that those skilled in the art carry out and change do not depart from the spirit and scope of the present invention, then all should in the protection domain of claims of the present invention.

Claims (10)

1. protect a method for intended target in terminal device, it is characterized in that, described method comprises:
Obtain the instruction of opening default application file folder; Wherein, intended target is preserved in described default application file folder;
Gather facial image, carry out recognition of face;
When identifying successfully, opening described default application file folder, showing the described intended target in described default application file folder.
2. the method for claim 1, is characterized in that, carries out recognition of face and comprises:
Extract the face characteristic information in described facial image;
By the described face characteristic information extracted, compare with the face reference feature information prestored, obtain the similarity of described face characteristic information and described face reference feature information;
If the similarity of described face characteristic information and described face reference feature information is greater than default similarity threshold, then determine to identify successfully.
3. method as claimed in claim 2, is characterized in that, described acquisition also comprises before opening the instruction of default application file folder:
Gather face with reference to image;
Extract described face with reference to the face reference feature information in image;
Described face reference feature information is kept at assigned address.
4. the method as described in claim as arbitrary in claim 1-3, is characterized in that, after obtaining the instruction of opening default application file folder, before gathering facial image, also comprises:
Judge current time whether within the default opening time;
If within the described default opening time, then perform the step of described collection facial image.
5. method as claimed in claim 4, is characterized in that, before obtaining the instruction of opening default application file folder, also comprises:
The opening time scope that described default application file folder is corresponding is set.
6. protect a device for intended target in terminal device, it is characterized in that, described device comprises:
Acquisition module, for obtaining the instruction of opening default application file folder; Wherein, intended target is preserved in described default application file folder;
Processing module, for gathering facial image, carries out recognition of face;
Display module, for when identifying successfully, opening described default application file folder, showing the described intended target in described default application file folder.
7. device as claimed in claim 6, it is characterized in that, described processing module comprises:
Extraction unit, for extracting the face characteristic information in described facial image;
Comparing unit, for the described face characteristic information that will extract, compares with the face reference feature information prestored, obtains the similarity of described face characteristic information and described face reference feature information;
Determining unit, if be greater than default similarity threshold for the similarity of described face characteristic information and described face reference feature information, then determines to identify successfully.
8. device as claimed in claim 7, it is characterized in that, described device also comprises:
Acquisition module, for before obtaining the instruction of opening default application file folder, gathers face with reference to image;
Extraction module, for extracting described face with reference to the face reference feature information in image;
Preserve module, for described face reference feature information is kept at assigned address.
9. the device as described in claim as arbitrary in claim 6-8, is characterized in that, described device also comprises:
Judge module, for after obtaining the instruction of opening default application file folder, gathers before facial image, judges current time whether within the default opening time;
Notification module, if within the described default opening time, then notifies that described processing module performs the step of described collection facial image.
10. device as claimed in claim 9, it is characterized in that, described device also comprises:
Module is set, for arranging opening time scope corresponding to described default application file folder.
CN201410796212.5A 2014-12-18 2014-12-18 Method and device for protecting intended target in terminal device Pending CN104537289A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410796212.5A CN104537289A (en) 2014-12-18 2014-12-18 Method and device for protecting intended target in terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410796212.5A CN104537289A (en) 2014-12-18 2014-12-18 Method and device for protecting intended target in terminal device

Publications (1)

Publication Number Publication Date
CN104537289A true CN104537289A (en) 2015-04-22

Family

ID=52852813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410796212.5A Pending CN104537289A (en) 2014-12-18 2014-12-18 Method and device for protecting intended target in terminal device

Country Status (1)

Country Link
CN (1) CN104537289A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426095A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Method and apparatus for turning on imaging function of mobile terminal in screen-off state
CN106127011A (en) * 2016-07-08 2016-11-16 山东省产品质量检验研究院 A kind of mobile terminal controls method, system and device and the mobile terminal that application program uses
CN106778198A (en) * 2016-11-23 2017-05-31 北京小米移动软件有限公司 Perform the safety certifying method and device of operation
CN107479703A (en) * 2017-08-07 2017-12-15 深圳天珑无线科技有限公司 Automatic speech gives the correct time method, equipment and computer-readable recording medium
WO2018023755A1 (en) * 2016-08-05 2018-02-08 胡明祥 Method for preventing misoperation of child on computer according to facial recognition, and recognition system
CN108573129A (en) * 2018-03-06 2018-09-25 李明霞 The anti-modification platform of intelligent computer file
CN108804903A (en) * 2018-06-12 2018-11-13 平安科技(深圳)有限公司 File viewing method and device and computer readable storage medium
CN108959953A (en) * 2018-03-06 2018-12-07 李明霞 The anti-amending method of intelligent computer file
CN110210194A (en) * 2019-04-18 2019-09-06 深圳壹账通智能科技有限公司 Electronic contract display methods, device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN103051809A (en) * 2013-01-05 2013-04-17 深圳市中兴移动通信有限公司 Mobile terminal and file security method and device thereof
CN103607513A (en) * 2013-11-26 2014-02-26 广东欧珀移动通信有限公司 Method for controlling application to be used and intelligent terminal
CN104112091A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 File locking method and device
CN104123509A (en) * 2014-07-21 2014-10-29 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN103051809A (en) * 2013-01-05 2013-04-17 深圳市中兴移动通信有限公司 Mobile terminal and file security method and device thereof
CN103607513A (en) * 2013-11-26 2014-02-26 广东欧珀移动通信有限公司 Method for controlling application to be used and intelligent terminal
CN104112091A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 File locking method and device
CN104123509A (en) * 2014-07-21 2014-10-29 联想(北京)有限公司 Information processing method and electronic device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426095A (en) * 2015-10-28 2016-03-23 广东欧珀移动通信有限公司 Method and apparatus for turning on imaging function of mobile terminal in screen-off state
CN106127011A (en) * 2016-07-08 2016-11-16 山东省产品质量检验研究院 A kind of mobile terminal controls method, system and device and the mobile terminal that application program uses
WO2018023755A1 (en) * 2016-08-05 2018-02-08 胡明祥 Method for preventing misoperation of child on computer according to facial recognition, and recognition system
CN106778198A (en) * 2016-11-23 2017-05-31 北京小米移动软件有限公司 Perform the safety certifying method and device of operation
CN107479703A (en) * 2017-08-07 2017-12-15 深圳天珑无线科技有限公司 Automatic speech gives the correct time method, equipment and computer-readable recording medium
CN108573129A (en) * 2018-03-06 2018-09-25 李明霞 The anti-modification platform of intelligent computer file
CN108959953A (en) * 2018-03-06 2018-12-07 李明霞 The anti-amending method of intelligent computer file
CN108959953B (en) * 2018-03-06 2019-05-07 山东道智盛信息科技有限公司 The anti-amending method of intelligent computer file
CN108804903A (en) * 2018-06-12 2018-11-13 平安科技(深圳)有限公司 File viewing method and device and computer readable storage medium
CN110210194A (en) * 2019-04-18 2019-09-06 深圳壹账通智能科技有限公司 Electronic contract display methods, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104537289A (en) Method and device for protecting intended target in terminal device
US8943546B1 (en) Method and system for detecting and protecting against potential data loss from unknown applications
WO2016101384A1 (en) Dual-system switch based data security processing method and apparatus
Karie et al. Toward a general ontology for digital forensic disciplines
EP3192001A1 (en) Systems and methods for detecting attempts to transmit sensitive information via data-distribution channels
CN102467628A (en) Method for protecting data based on browser kernel intercept technology
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
Faheem et al. Smartphone forensic analysis: A case study for obtaining root access of an android samsung s3 device and analyse the image without an expensive commercial tool
WO2014131306A1 (en) Method and system for detecting network link
CN106327547B (en) A kind of method and apparatus that identifying code generates verifying
CN109583228B (en) Privacy information management method, device and system
CN106789973B (en) Page security detection method and terminal equipment
CN109271228A (en) Interface function recognition methods, device and the electronic equipment of application
CN112800401B (en) Privacy processing method, privacy processing device and terminal
CN115344835A (en) Picture processing method, storage medium and computer terminal
KR101401028B1 (en) Method for protecting personal information in image
US20200026866A1 (en) Method and device for covering private data
CN113553618A (en) File security protection method and device
CN107918550A (en) A kind of method for USB device history service condition of auditing under linux system
CN112181556B (en) Terminal control processing method and device, electronic equipment and storage medium
KR102221684B1 (en) Multiclass classification apparatus, method thereof and computer readable medium having computer program recorded therefor
Ahmed et al. Digital evidence extraction and documentation from mobile devices
CN105681563B (en) The implementation method of intelligent hardware devices picture sharing permission
CN111813475A (en) Dynamic information display method based on negative one-screen combination with face recognition
Ramajayam et al. Saliency-Aware Privacy Protection in Augmented Reality Systems

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160127

Address after: Korea 101300 Beijing city Shunyi District town culture camp north of the village (two Airport Road No. 1)

Applicant after: Mobile intelligent information technology (Beijing) Co., Ltd.

Address before: 300467 Tianjin Binhai New Area, ecological city, animation Middle Road, building, No. two, B1 District, 201-427

Applicant before: LESHI ZHIXIN ELECTRONIC SCIENCE & TECHNOLOGY (TIANJIN) CO., LTD.

RJ01 Rejection of invention patent application after publication

Application publication date: 20150422

RJ01 Rejection of invention patent application after publication